@article{montinaViolation2024_174, notes = {submitted to IEEE International Symposium on Information Theory}, title = {Violation of Leggett-Garg Inequalities Implies Information Erasure}, author = {Alberto Montina and Stefan Wolf}, year = {2024}, doi = {}, url = {}, } @article{coiteux-royQuantum2024_173, notes = {submitted to IEEE International Symposium on Information Theory}, title = {Quantum Key Distribution without `Quantum'}, author = {Xavier Coiteux-Roy and Stefan Wolf}, year = {2024}, doi = {}, url = {}, } @article{laneveQuantum2023_172, title = {Quantum signal processing over SU(N): exponential speed-up for polynomial transformations under Shor-like assumptions}, author = {Lorenzo Laneve}, year = {2023}, doi = {10.48550/arXiv.2311.03949}, url = {https://doi.org/10.48550/arXiv.2311.03949}, archivePrefix = {arXiv}, eprint = {2311.03949}, } @article{bedardTemperature2023_171, title = {Temperature as Joule per Bit}, author = {Charles Alexandre B{\'{e}}dard and Sophie Bertelette and Xavier Coiteux-Roy and Stefan Wolf}, year = {2023}, doi = {10.48550/arXiv.2401.12119}, url = {https://doi.org/10.48550/arXiv.2401.12119}, archivePrefix = {arXiv}, eprint = {2401.12119}, } @article{kunjwalTrading2023_170, title = {Trading causal order for locality}, author = {Ravi Kunjwal and {\"{A}}min Baumeler}, journal = {Physical Review Letters}, volume = {131}, pages = {120201}, number = {}, year = {2023}, doi = {10.1103/PhysRevLett.131.120201}, url = {https://doi.org/10.1103/PhysRevLett.131.120201}, archivePrefix = {arXiv}, eprint = {2202.00440}, } @article{tselentisAdmissible2023_169, title = {Admissible causal structures and correlations}, author = {Eleftherios-Ermis Tselentis and {\"{A}}min Baumeler}, journal = {Physical Review X Quantum}, volume = {4}, pages = {040307}, number = {}, year = {2023}, doi = {10.1103/PRXQuantum.4.040307}, url = {https://doi.org/10.1103/PRXQuantum.4.040307}, archivePrefix = {arXiv}, eprint = {2210.12796}, } @article{tselentisThe2023_168, title = {The Möbius game and other Bell tests for relativity}, author = {Eleftherios-Ermis Tselentis and {\"{A}}min Baumeler}, year = {2023}, doi = {10.48550/arXiv.2309.15752}, url = {https://doi.org/10.48550/arXiv.2309.15752}, archivePrefix = {arXiv}, eprint = {2309.15752}, } @article{montinaRealism2023_167, title = {Realism and causality imply information erasure by measurements}, author = {Alberto Montina and Stefan Wolf}, year = {2023}, doi = {10.48550/arXiv.2307.03134}, url = {https://doi.org/10.48550/arXiv.2307.03134}, archivePrefix = {arXiv}, eprint = {2307.03134}, } @article{laneveRobust2023_166, title = {Robust oracle quantum-state preparation via quantum signal processing}, author = {Lorenzo Laneve}, year = {2023}, doi = {10.48550/arXiv.2305.04705}, url = {https://doi.org/10.48550/arXiv.2305.04705}, archivePrefix = {arXiv}, eprint = {2305.04705}, } @article{bedardTeleportation2023_165, title = {Teleportation Revealed}, author = {Charles Alexandre B{\'{e}}dard}, journal = {Quantum Reports}, volume = {5}, pages = {510-525}, number = {2}, year = {2023}, doi = {10.48550/arXiv.2304.14959}, url = {https://www.mdpi.com/2624-960X/5/2/34}, archivePrefix = {arXiv}, eprint = {2304.14959}, } @article{laneveQuantum2023_164, title = {Quantum Signal Processing, Phase Extraction, and Proportional Sampling}, author = {Lorenzo Laneve}, year = {2023}, doi = {10.48550/arXiv.2303.11077}, url = {https://doi.org/10.48550/arXiv.2303.11077}, archivePrefix = {arXiv}, eprint = {2303.11077}, } @article{laneveOn2023_163, title = {On Hitting Times for General Quantum Markov Processes}, author = {Lorenzo Laneve and Francesco Tacchino and Ivano Tavernelli}, journal = {Quantum}, volume = {7}, pages = {1056}, number = {}, year = {2023}, doi = {10.22331/q-2023-07-12-1056}, url = {https://doi.org/10.22331/q-2023-07-12-1056}, archivePrefix = {arXiv}, eprint = {2210.10188}, } @inproceedings{boschiniOn2022_162, title = {On Access Control Encryption without Sanitization}, author = {Cecilia Boschini and Akira Takahashi and Mehdi Tibouchi}, booktitle = {Proceedings of CRYPTO 2022}, year = {2022}, doi = {10.48550/arXiv.2209.11650}, url = {https://doi.org/10.48550/arXiv.2209.11650}, archivePrefix = {arXiv}, eprint = {2209.11650}, } @inproceedings{boschiniOn2022_161, title = {On Access Control Encryption without Sanitization}, author = {Cecilia Boschini and Ivan Damgard and Claudio Orlandi}, booktitle = {Proceedings of SCN 2022}, year = {2022}, doi = {10.48550/arXiv.2209.11650}, url = {https://doi.org/10.48550/arXiv.2209.11650}, archivePrefix = {arXiv}, eprint = {2209.11650}, } @article{montinaAn2022_160, notes = {submitted to Journal of Cryptology}, title = {An Algebraic-Geometry Approach to Prime Factorization}, author = {Alberto Montina and Stefan Wolf}, year = {2022}, doi = {10.48550/arXiv.2209.11650}, url = {https://doi.org/10.48550/arXiv.2209.11650}, archivePrefix = {arXiv}, eprint = {2209.11650}, } @article{bedardAn2022_159, title = {An Algorithmic Approach to Emergence}, author = {Charles Alexandre B{\'{e}}dard and Geoffroy Bergeron}, year = {2022}, doi = {10.48550/arXiv.2205.12997}, url = {https://www.mdpi.com/1099-4300/24/7/985}, archivePrefix = {arXiv}, eprint = {2205.12997}, } @inproceedings{coiteux-royUnconditional2022_158, title = {Unconditional Proofs-of-Work and Other Possibilities of Thermodynamic Cryptography}, author = {Xavier Coiteux-Roy and Stefan Wolf}, booktitle = {Proceedings of Information Theory Workshop (ITW)}, year = {2022}, doi = {10.1109/ITW54588.2022.9965816}, url = {https://doi.org/10.1109/ITW54588.2022.9965816}, } @inproceedings{baumelerThermodynamics2022_157, title = {Thermodynamics as combinatorics: A toy model}, author = {{\"{A}}min Baumeler and Carla Rieger and Stefan Wolf}, booktitle = {Proceedings of Information Theory Workshop (ITW)}, year = {2022}, doi = {10.48550/arXiv.2205.07628}, url = {https://doi.org/10.48550/arXiv.2205.07628}, archivePrefix = {arXiv}, eprint = {2205.07628}, } @article{baumannNoncausal2022_156, title = {Noncausal Page-Wootters circuits}, author = {Veronika Baumann and Marius Krumm and Philippe Allard Gu{\'{e}}rin and {\v{C}}aslav Brukner}, journal = {Phys. Rev. Research}, volume = {4}, pages = {013180}, number = {}, year = {2022}, doi = {10.48550/arXiv.2105.02304}, url = {https://journals.aps.org/prresearch/abstract/10.1103/PhysRevResearch.4.013180}, archivePrefix = {arXiv}, eprint = {2105.02304}, } @article{montinaGeneralized2022_155, title = {Generalized Gleason theorem, finite amount of information for the context and causality}, author = {Alberto Montina and Stefan Wolf}, journal = {Physical Review A}, volume = {}, pages = {}, number = {}, year = {2022}, doi = {https://journals.aps.org/pra/abstract/10.1103/PhysRevA.107.012218}, url = {https://doi.org/https://journals.aps.org/pra/abstract/10.1103/PhysRevA.107.012218}, archivePrefix = {arXiv}, eprint = {2206.11830}, } @article{coiteux-royKey2022_154, title = {Key Agreement and Oblivious Transfer from Free-Energy Limitations}, author = {Xavier Coiteux-Roy and Stefan Wolf}, year = {2022}, doi = {10.48550/arXiv.2206.01501}, url = {https://doi.org/10.48550/arXiv.2206.01501}, archivePrefix = {arXiv}, eprint = {2206.01501}, } @inproceedings{boschiniProgressive2022_153, title = {Progressive and Efficient Verification for Digital Signatures}, author = {Cecilia Boschini and Dario Fiore and Elena Pagnin}, booktitle = {Proceedings of ACNS 2022}, year = {2022}, doi = {}, url = {https://eprint.iacr.org/2021/832.pdf}, } @article{caoExperimental2022_152, title = {Experimental Demonstration that No Tripartite-Nonlocal Causal Theory Explains Nature's Correlations}, author = {Huan Cao and Marc-Olivier Renou and Chao Zhang and Ga{\"{a}}l Mass{\'{e}} and Xavier Coiteux-Roy and Bi-Heng Liu and Yun-Feng Huang and Chuan-Feng Li and Guang-Can Guo and Elie Wolfe}, journal = {Phys. Rev. Lett.}, volume = {129}, pages = {150402}, number = {}, year = {2022}, doi = {10.48550/arXiv.2201.12754}, url = {https://journals.aps.org/prl/abstract/10.1103/PhysRevLett.129.150402}, archivePrefix = {arXiv}, eprint = {2201.12754}, } @script{boschiniDiscrete2022_151, title = {Discrete Mathematics}, author = {Cecilia Boschini and Arne Hansen and Stefan Wolf}, year = {2022}, doi = {}, url = {}, } @article{vechtCant2022_150, title = {Can't Touch This: unconditional tamper evidence from short keys}, author = {Bart van der Vecht and Xavier Coiteux-Roy and Boris Skoric}, journal = {Quantum Information and Computation}, volume = {}, pages = {}, number = {}, year = {2022}, doi = {10.48550/arXiv.2006.02476}, url = {https://doi.org/10.48550/arXiv.2006.02476}, archivePrefix = {arXiv}, eprint = {2006.02476}, } @article{guerinA2021_149, title = {A no-go theorem for the persistent reality of Wigner's friend's perception}, author = {Philippe Allard Gu{\'{e}}rin and Veronika Baumann and Flavio Del Santo and {\v{C}}aslav Brukner}, journal = {Communications Physics}, volume = {4}, pages = {93}, number = {}, year = {2021}, doi = {}, url = {https://www.nature.com/articles/s42005-021-00589-1}, } @article{baumannGeneralized2021_148, title = {Generalized probability rules from a timeless formulation of Wigner's friend scenarios}, author = {Veronika Baumann and Flavio Del Santo and Alexander R. H. Smith and Flaminia Giacomini and Esteban Castro-Ruiz and {\v{C}}aslav Brukner}, journal = {Quantum}, volume = {5}, pages = {524}, number = {}, year = {2021}, doi = {10.48550/arXiv.1911.09696}, url = {https://quantum-journal.org/papers/q-2021-08-16-524/}, archivePrefix = {arXiv}, eprint = {1911.09696}, } @article{coiteux-royNo2021_147, title = {No bipartite-nonlocal causal theory can explain nature's correlations}, author = {Xavier Coiteux-Roy and Marc-Olivier Renou and Elie Wolfe}, journal = {Physical Review Letters}, volume = {127}, pages = {200401}, number = {20}, year = {2021}, doi = {10.1103/PhysRevLett.127.200401}, url = {https://doi.org/10.1103/PhysRevLett.127.200401}, archivePrefix = {arXiv}, eprint = {2105.09381}, } @article{coiteux-royAny2021_146, title = {Any physical theory of nature must be boundlessly multipartite nonlocal}, author = {Xavier Coiteux-Roy and Marc-Olivier Renou and Elie Wolfe}, journal = {Physical Review A}, volume = {104}, pages = {052207}, number = {05}, year = {2021}, doi = {10.1103/PhysRevA.104.052207}, url = {https://doi.org/10.1103/PhysRevA.104.052207}, archivePrefix = {arXiv}, eprint = {2105.09380}, } @article{bedardThe2021_145, title = {The cost of quantum locality}, author = {Charles Alexandre B{\'{e}}dard}, journal = {Proceedings of the Royal Society A}, volume = {477}, pages = {20200602}, number = {2246}, year = {2021}, doi = {10.1098/rspa.2020.0602}, url = {https://doi.org/10.1098/rspa.2020.0602}, archivePrefix = {arXiv}, eprint = {2001.09646}, } @article{bedardThe2021_144, title = {The ABC of Deutsch-Hayden Descriptors}, author = {Charles Alexandre B{\'{e}}dard}, journal = {Quantum Reports}, volume = {}, pages = {}, number = {}, year = {2021}, doi = {10.48550/arXiv.2012.11189}, url = {https://www.mdpi.com/2624-960X/3/2/17}, archivePrefix = {arXiv}, eprint = {2012.11189}, } @inproceedings{boschiniEfficient2020_143, title = {Efficient Post-quantum SNARKs for RSIS and RLWE and Their Applications to Privacy}, author = {Cecilia Boschini and Jan Camenisch and Max Ovsiankin and Nicholas Spooner}, booktitle = {Proceedings of PQCrypto 2020}, year = {2020}, doi = {}, url = {https://eprint.iacr.org/2020/1190.pdf}, } @inproceedings{coiteux-royOn2020_142, title = {On the advantage of irreversible processes in single-system games}, author = {Xavier Coiteux-Roy and Stefan Wolf}, booktitle = {Proceedings of International Symposium on Information Theory (ISIT) 2020}, year = {2020}, doi = {10.1109/ISIT44484.2020.9174303}, url = {https://doi.org/10.1109/ISIT44484.2020.9174303}, archivePrefix = {arXiv}, eprint = {2001.04713}, } @script{aeschbacherInvitation2020_141, title = {Invitation to quantum informatics}, author = {Ulla Aeschbacher and Arne Hansen and Stefan Wolf}, year = {2020}, doi = {}, url = {https://vdf.ch/invitation-to-quantum-informatics.html}, } @article{hansenWigners2019_140, title = {Wigner's isolated friend}, author = {Arne Hansen and Stefan Wolf}, year = {2019}, doi = {10.48550/arXiv.1912.03248}, url = {https://doi.org/10.48550/arXiv.1912.03248}, archivePrefix = {arXiv}, eprint = {1912.03248}, } @article{baumelerThe2019_139, title = {The free energy of a general computation}, author = {{\"{A}}min Baumeler and Stefan Wolf}, journal = {Physical Review E}, volume = {}, pages = {}, number = {}, year = {2019}, doi = {10.1103/PhysRevE.100.052115}, url = {https://doi.org/10.1103/PhysRevE.100.052115}, } @article{hansenMeasuring2019_138, title = {Measuring measuring}, author = {Arne Hansen and Stefan Wolf}, year = {2019}, doi = {10.48550/arXiv.1910.06123}, url = {https://doi.org/10.48550/arXiv.1910.06123}, archivePrefix = {arXiv}, eprint = {1910.06123}, } @article{baumelerReversible2019_137, title = {Reversible time travel with freedom of choice}, author = {{\"{A}}min Baumeler and Fabio Costa and Timothy Ralph and Stefan Wolf and Magdalena Zych}, journal = {Classical and Quantum Gravity}, volume = {}, pages = {}, number = {}, year = {2019}, doi = {10.1088/1361-6382/ab4973}, url = {https://doi.org/10.1088/1361-6382/ab4973}, archivePrefix = {arXiv}, eprint = {1703.00779}, } @article{hansenNo2019_136, title = {No master (key) No (measurement) problem}, author = {Arne Hansen and Stefan Wolf}, year = {2019}, doi = {10.48550/arXiv.1905.00295}, url = {https://doi.org/10.48550/arXiv.1905.00295}, archivePrefix = {arXiv}, eprint = {1905.00295}, } @article{baumannWigners2020_135, title = {Wigner's friend as a rational agent}, author = {Veronika Baumann and {\v{C}}aslav Brukner}, journal = {Quantum}, volume = {}, pages = {}, number = {}, year = {2020}, doi = {10.48550/arXiv.1901.11274}, url = {https://link.springer.com/book/10.1007/978-3-030-34316-3}, archivePrefix = {arXiv}, eprint = {1901.11274}, } @article{baumannComment2019_134, title = {Comment on Healey's 'quantum theory and the limits of objectivity'}, author = {Veronika Baumann and Flavio Del Santo and {\v{C}}aslav Brukner}, journal = {Foundations of Physics}, volume = {49}, pages = {741-749}, number = {}, year = {2019}, doi = {10.48550/arXiv.1901.10331}, url = {https://link.springer.com/article/10.1007/s10701-019-00276-w}, archivePrefix = {arXiv}, eprint = {1901.10331}, } @inproceedings{coiteux-royThe2019_133, title = {The RGB no-signalling game}, author = {Xavier Coiteux-Roy and Claude Cr{\'{e}}peau}, booktitle = {Proceedings of The 14th Conference on the Theory of Quantum Computation, Communication, and Cryptography (TQC) 2019}, year = {2019}, doi = {10.4230/LIPIcs.TQC.2019.4}, url = {https://doi.org/10.4230/LIPIcs.TQC.2019.4}, archivePrefix = {arXiv}, eprint = {1901.05062}, } @article{hansenContextuality2019_132, title = {Contextuality: It's a feature, not a bug}, author = {Arne Hansen and Stefan Wolf}, year = {2019}, doi = {10.48550/arXiv.1902.02088}, url = {https://doi.org/10.48550/arXiv.1902.02088}, archivePrefix = {arXiv}, eprint = {1902.02088}, } @inproceedings{coiteux-royProving2019_131, title = {Proving erasure}, author = {Xavier Coiteux-Roy and Stefan Wolf}, booktitle = {Proceedings of International Symposium on Information Theory (ISIT) 2019}, year = {2019}, doi = {10.1109/ISIT.2019.8849661}, url = {https://doi.org/10.1109/ISIT.2019.8849661}, archivePrefix = {arXiv}, eprint = {1902.06656}, } @article{montinaDiscrimination2019_130, title = {Discrimination of non-local correlations}, author = {Alberto Montina and Stefan Wolf}, journal = {Entropy}, volume = {}, pages = {}, number = {}, year = {2019}, doi = {10.48550/arXiv.1609.06269}, url = {https://www.mdpi.com/1099-4300/21/2/104}, archivePrefix = {arXiv}, eprint = {1609.06269}, } @article{hansenThe2018_129, title = {The measurement problem is the "measurement" problem}, author = {Arne Hansen and Stefan Wolf}, year = {2018}, doi = {10.48550/arXiv.1810.04573}, url = {https://doi.org/10.48550/arXiv.1810.04573}, archivePrefix = {arXiv}, eprint = {1810.04573}, } @article{wolfSecond2018_128, title = {Second thoughts on the second law}, author = {Stefan Wolf}, journal = {Adventures Between Lower Bounds and Higher Altitudes}, volume = {}, pages = {}, number = {}, year = {2018}, doi = {10.48550/arXiv.1810.05276}, url = {https://doi.org/10.48550/arXiv.1810.05276}, archivePrefix = {arXiv}, eprint = {1810.05276}, } @thesis{erkerPhysics2019_127, title = {Physics and information}, author = {Paul Erker}, year = {2019}, doi = {}, url = {}, } @inproceedings{boschiniRelaxed2018_126, title = {Relaxed lattice-based signatures with short zero-knowledge proofs}, author = {Cecilia Boschini and Jan Camenisch and Gregory Neven}, booktitle = {Proceedings of International Conference on Information Security}, year = {2018}, doi = {}, url = {https://eprint.iacr.org/2017/1123}, } @inproceedings{boschiniFloppysized2018_125, title = {Floppy-sized group signatures from lattices}, author = {Cecilia Boschini and Jan Camenisch and Gregory Neven}, booktitle = {Proceedings of International Conference on Applied Cryptography and Network Security}, year = {2018}, doi = {10.1007/978-3-319-93387-0_9}, url = {https://eprint.iacr.org/2018/453}, } @article{bavarescoMeasurements2018_124, title = {Measurements in two bases are sufficient for certifying high-dimensional entanglement}, author = {Jessica Bavaresco and Natalia Herrera Valencia and Claude Kl{\"{o}}ckl and Matej Pivoluska and Paul Erker and Nicolai Friis and Mehul Malik and Markus Huber}, journal = {Nature Physics}, volume = {}, pages = {}, number = {}, year = {2018}, doi = {10.1038/s41567-018-0203-z}, url = {https://doi.org/10.1038/s41567-018-0203-z}, } @article{baumelerBell2018_123, title = {Bell correlations and the common future}, author = {{\"{A}}min Baumeler and Julien Degorre and Stefan Wolf}, journal = {Quantum Foundations}, volume = {}, pages = {}, number = {}, year = {2018}, doi = {10.1007/978-3-319-74971-6_18}, url = {https://doi.org/10.1007/978-3-319-74971-6_18}, } @article{baumannOn2018_122, title = {On formalisms and interpretations}, author = {Veronika Baumann and Stefan Wolf}, journal = {Quantum}, volume = {2}, pages = {99}, number = {}, year = {2018}, doi = {10.22331/q-2018-10-15-99}, url = {https://doi.org/10.22331/q-2018-10-15-99}, archivePrefix = {arXiv}, eprint = {1710.07212}, } @article{baumelerComputational2018_121, title = {Computational tameness of classical non-causal models}, author = {{\"{A}}min Baumeler and Stefan Wolf}, journal = {Proceedings of the Royal Society A}, volume = {474}, pages = {20170698}, number = {2209}, year = {2018}, doi = {10.1098/rspa.2017.0698}, url = {https://doi.org/10.1098/rspa.2017.0698}, archivePrefix = {arXiv}, eprint = {1611.05641}, } @inproceedings{baumelerCausality2017_120, title = {Causality --- Complexity --- Consistency: Can space-time be based on logic and computation?}, author = {{\"{A}}min Baumeler and Stefan Wolf}, booktitle = {Proceedings of Time in Physics, 69-101, Birkhäuser Verlag}, year = {2017}, doi = {10.1007/978-3-319-68655-4_6}, url = {https://doi.org/10.1007/978-3-319-68655-4_6}, archivePrefix = {arXiv}, eprint = {1602.06987}, } @article{araujoQuantum2017_119, title = {Quantum computation with indefinite causal structures}, author = {Mateus Ara{\'{u}}jo and Philippe Allard Gu{\'{e}}rin and {\"{A}}min Baumeler}, journal = {Physical Review A}, volume = {96}, pages = {052315}, number = {5}, year = {2017}, doi = {10.1103/PhysRevA.96.052315}, url = {https://doi.org/10.1103/PhysRevA.96.052315}, archivePrefix = {arXiv}, eprint = {1706.09854}, } @article{erkerQuantifying2017_118, title = {Quantifying high dimensional entanglement with two mutually unbiased bases}, author = {Paul Erker and Mario Krenn and Marcus Huber}, journal = {Quantum}, volume = {1}, pages = {22}, number = {}, year = {2017}, doi = {10.22331/q-2017-07-28-22}, url = {https://doi.org/10.22331/q-2017-07-28-22}, archivePrefix = {arXiv}, eprint = {1512.05315}, } @article{erkerAutonomous2017_117, title = {Autonomous quantum clocks: how thermodynamics limits our ability to measure time}, author = {Paul Erker and Mark T. Mitchison and Ralph Silva and Mischa P. Woods and Nicolas Brunner and Marcus Huber}, journal = {Physical Review X}, volume = {7}, pages = {031022}, number = {}, year = {2017}, doi = {10.1103/PhysRevX.7.031022}, url = {https://doi.org/10.1103/PhysRevX.7.031022}, archivePrefix = {arXiv}, eprint = {1609.06704}, } @article{baumelerNoncausal2017_116, title = {Non-causal computation}, author = {{\"{A}}min Baumeler and Stefan Wolf}, journal = {Entropy}, volume = {19}, pages = {326}, number = {7}, year = {2017}, doi = {10.48550/arXiv.1601.06522}, url = {http://www.mdpi.com/1099-4300/19/7/326}, archivePrefix = {arXiv}, eprint = {1601.06522}, } @inproceedings{baumelerKolmogorov2017_115, title = {Kolmogorov amplification from Bell correlation}, author = {{\"{A}}min Baumeler and Charles Alexandre B{\'{e}}dard and Gilles Brassard and Stefan Wolf}, booktitle = {Proceedings of International Symposium on Information Theory (ISIT) 2017}, year = {2017}, doi = {}, url = {}, } @thesis{baumelerCausal2017_114, title = {Causal loops --- logically consistent correlations, time travel, and computation}, author = {{\"{A}}min Baumeler}, year = {2017}, doi = {}, url = {}, } @article{wolfLandauers2017_113, title = {Landauer's erasure principle and data compression}, author = {Stefan Wolf}, year = {2017}, doi = {}, url = {}, } @inproceedings{wolfAn2017_112, title = {An all-or-nothing flavor to the Church-Turing hypothesis}, author = {Stefan Wolf}, booktitle = {Proceedings of 14th Annual Conference on Theory and Applications of Models of Computation (TAMC)}, year = {2017}, doi = {10.48550/arXiv.1702.00923}, url = {https://doi.org/10.48550/arXiv.1702.00923}, archivePrefix = {arXiv}, eprint = {1702.00923}, } @article{baumannThe2016_111, title = {The measurement problem is the measurement problem is the measurement problem}, author = {Veronika Baumann and Arne Hansen and Stefan Wolf}, year = {2016}, doi = {10.48550/arXiv.1611.01111}, url = {https://doi.org/10.48550/arXiv.1611.01111}, archivePrefix = {arXiv}, eprint = {1611.01111}, } @article{schwarzOptimal2016_110, title = {Optimal measurements for nonlocal correlations}, author = {Sacha Schwarz and Andr{\'{e}} Stefanov and Stefan Wolf and Alberto Montina}, journal = {Physical Review A}, volume = {94}, pages = {022322}, number = {2}, year = {2016}, doi = {10.1103/PhysRevA.94.022322}, url = {https://doi.org/10.1103/PhysRevA.94.022322}, archivePrefix = {arXiv}, eprint = {1602.05448}, } @inproceedings{salweyStronger2016_109, title = {Stronger attacks on causality-based key agreement}, author = {Benno Salwey and Stefan Wolf}, year = {2016}, doi = {10.1109/ISIT.2016.7541700}, url = {https://doi.org/10.1109/ISIT.2016.7541700}, archivePrefix = {arXiv}, eprint = {1601.07833}, } @article{asadianHeisenbergWeyl2016_108, title = {Heisenberg-Weyl observables: Bloch vectors in phase space}, author = {Ali Asadian and Paul Erker and Marcus Huber and Claude Kl{\"{o}}ckl}, journal = {Physical Review A}, volume = {94}, pages = {010301}, number = {1}, year = {2016}, doi = {10.1103/PhysRevA.94.010301}, url = {https://doi.org/10.1103/PhysRevA.94.010301}, archivePrefix = {arXiv}, eprint = {1512.05640}, } @article{baumannAppearance2016_107, title = {Appearance of causality in process matrices when performing fixed-basis measurements for two parties}, author = {Veronika Baumann and {\v{C}}aslav Brukner}, journal = {Physical Review A}, volume = {93}, pages = {062324}, number = {6}, year = {2016}, doi = {10.1103/PhysRevA.93.062324}, url = {https://doi.org/10.1103/PhysRevA.93.062324}, archivePrefix = {arXiv}, eprint = {1601.06620}, } @article{hansenSimple2016_106, title = {Simple algorithm for computing the communication complexity of quantum communication processes}, author = {Arne Hansen and Alberto Montina and Stefan Wolf}, journal = {Physical Review A}, volume = {93}, pages = {042315}, number = {4}, year = {2016}, doi = {10.1103/PhysRevA.93.042315}, url = {https://doi.org/10.1103/PhysRevA.93.042315}, archivePrefix = {arXiv}, eprint = {1512.03257}, } @article{baumelerDeviceindependent2016_105, title = {Device-independent test of causal order and relations to fixed-points}, author = {{\"{A}}min Baumeler and Stefan Wolf}, year = {2016}, doi = {10.1088/1367-2630/18/3/035014}, url = {https://doi.org/10.1088/1367-2630/18/3/035014}, archivePrefix = {arXiv}, eprint = {1511.05444}, } @article{montinaInformationbased2016_104, title = {Information-based measure of nonlocality}, author = {Alberto Montina and Stefan Wolf}, journal = {New Journal of Physics}, volume = {18}, pages = {013035}, number = {1}, year = {2016}, doi = {10.1088/1367-2630/18/1/013035}, url = {https://doi.org/10.1088/1367-2630/18/1/013035}, archivePrefix = {arXiv}, eprint = {1312.6290}, } @article{baumelerThe2016_103, title = {The space of logically consistent classical processes without causal order}, author = {{\"{A}}min Baumeler and Stefan Wolf}, journal = {New Journal of Physics}, volume = {18}, pages = {013036}, number = {1}, year = {2016}, doi = {10.1088/1367-2630/18/1/013036}, url = {https://doi.org/10.1088/1367-2630/18/1/013036}, archivePrefix = {arXiv}, eprint = {1507.01714}, } @article{wolfOn2016_102, title = {On bits as fuel}, author = {Stefan Wolf}, year = {2016}, doi = {}, url = {}, } @article{wolfNonlocality2015_101, title = {Non-locality without counterfactual reasoning}, author = {Stefan Wolf}, journal = {Physical Review A}, volume = {92}, pages = {052102}, number = {5}, year = {2015}, doi = {10.1103/PhysRevA.92.052102}, url = {https://doi.org/10.1103/PhysRevA.92.052102}, archivePrefix = {arXiv}, eprint = {1505.07037}, } @thesis{erkerThe2015_100, title = {The quantum hourglass}, author = {Paul Erker}, year = {2015}, doi = {10.3929/ethz-a-010514644}, url = {https://doi.org/10.3929/ethz-a-010514644}, } @article{erkerHow2015_99, title = {How not to R{\'{e}}nyi-generalize the quantum conditional mutual information}, author = {Paul Erker}, journal = {Journal of Physics A: Mathematical and Theoretical}, volume = {48}, pages = {275303}, number = {27}, year = {2015}, doi = {10.1088/1751-8113/48/27/275303}, url = {https://doi.org/10.1088/1751-8113/48/27/275303}, archivePrefix = {arXiv}, eprint = {1404.3628}, } @thesis{salweyNosignalling2015_98, title = {No-signalling attacks and implications for (quantum) nonlocality distillation}, author = {Benno Salwey}, year = {2015}, doi = {}, url = {}, } @inproceedings{brassardNonlocality2015_97, title = {Non-locality distillation as cryptographic game}, author = {Gilles Brassard and Benno Salwey and Stefan Wolf}, year = {2015}, doi = {10.1109/ITW.2015.7133124}, url = {https://doi.org/10.1109/ITW.2015.7133124}, } @article{montinaCommunication2015_96, title = {Communication complexity and the reality of the wave-function}, author = {Alberto Montina}, year = {2015}, doi = {10.1142/S0217732315300013}, url = {https://doi.org/10.1142/S0217732315300013}, archivePrefix = {arXiv}, eprint = {1412.1723}, } @article{baumelerQuantum2015_95, title = {Quantum private information retrieval has linear communication complexity}, author = {{\"{A}}min Baumeler and Anne Broadbent}, journal = {Journal of Cryptology}, volume = {28}, pages = {161-175}, number = {1}, year = {2015}, doi = {10.1007/s00145-014-9180-2}, url = {https://doi.org/10.1007/s00145-014-9180-2}, archivePrefix = {arXiv}, eprint = {1304.5490}, } @article{baumelerMaximal2014_94, title = {Maximal incompatibility of locally classical behavior and global causal order in multiparty scenarios}, author = {{\"{A}}min Baumeler and Adrien Feix and Stefan Wolf}, journal = {Physical Review A}, volume = {90}, pages = {042106}, number = {4}, year = {2014}, doi = {10.1103/PhysRevA.90.042106}, url = {https://doi.org/10.1103/PhysRevA.90.042106}, archivePrefix = {arXiv}, eprint = {1403.7333}, } @article{bernhardNonlocality2014_93, title = {Non-locality of experimental qutrit pairs}, author = {Christof Bernhard and B{\"{a}}nz Bessire and Alberto Montina and Marcel Pfaffhauser and Andr{\'{e}} Stefanov and Stefan Wolf}, journal = {Journal of Physics A: Mathematical and Theoretical}, volume = {47}, pages = {424013}, number = {42}, year = {2014}, doi = {10.1088/1751-8113/47/42/424013}, url = {https://doi.org/10.1088/1751-8113/47/42/424013}, archivePrefix = {arXiv}, eprint = {1402.5026}, } @article{montinaNecessary2014_92, title = {Necessary and sufficient optimality conditions for classical simulations of quantum communication processes}, author = {Alberto Montina and Stefan Wolf}, journal = {Physical Review A}, volume = {90}, pages = {012309}, number = {1}, year = {2014}, doi = {10.1103/PhysRevA.90.012309}, url = {https://doi.org/10.1103/PhysRevA.90.012309}, archivePrefix = {arXiv}, eprint = {1402.6299}, } @inproceedings{rashidImplications2014_91, title = {Implications of quantum automata for contextuality }, author = {Jibran Rashid and Abuzer Yakaryιlmaz}, year = {2014}, doi = {10.1007/978-3-319-08846-4_24}, url = {https://doi.org/10.1007/978-3-319-08846-4_24}, archivePrefix = {arXiv}, eprint = {1404.2761}, } @inproceedings{montinaLower2014_90, title = {Lower bounds on the communication complexity of two-party (quantum) processes}, author = {Alberto Montina and Stefan Wolf}, year = {2014}, doi = {10.1109/ISIT.2014.6875080}, url = {https://doi.org/10.1109/ISIT.2014.6875080}, archivePrefix = {arXiv}, eprint = {1401.4126}, } @inproceedings{ebbeTrading2014_89, title = {Trading permutation invariance for communication in multi-party non-locality distillation}, author = {Helen Ebbe and Stefan Wolf}, year = {2014}, doi = {10.1109/ISIT.2014.6875079}, url = {https://doi.org/10.1109/ISIT.2014.6875079}, archivePrefix = {arXiv}, eprint = {1312.5072}, } @inproceedings{baumelerPerfect2014_88, title = {Perfect signaling among three parties violating predefined causal order}, author = {{\"{A}}min Baumeler and Stefan Wolf}, year = {2014}, doi = {10.1109/ISIT.2014.6874888}, url = {https://doi.org/10.1109/ISIT.2014.6874888}, archivePrefix = {arXiv}, eprint = {1312.5916}, } @article{ebbeMultiuser2014_87, title = {Multi-user non-locality amplification}, author = {Helen Ebbe and Stefan Wolf}, year = {2014}, doi = {10.1109/TIT.2013.2292515}, url = {https://doi.org/10.1109/TIT.2013.2292515}, archivePrefix = {arXiv}, eprint = {1307.7927}, } @article{montinaCommunication2013_86, title = {Communication complexity of channels in general probabilistic theories}, author = {Alberto Montina and Marcel Pfaffhauser and Stefan Wolf}, year = {2013}, doi = {10.1103/PhysRevLett.111.160502}, url = {https://doi.org/10.1103/PhysRevLett.111.160502}, archivePrefix = {arXiv}, eprint = {1301.4441}, } @article{onoratoRogue2013_85, title = {Rogue waves and their generating mechanisms in different physical contexts}, author = {Miguel Onorato and Stefania Residori and Umberto Bortolozzo and Alberto Montina and Fortunato Tito Arecchi}, journal = {Physics Reports}, volume = {528}, pages = {47-89}, number = {2}, year = {2013}, doi = {10.1016/j.physrep.2013.03.001}, url = {https://doi.org/10.1016/j.physrep.2013.03.001}, } @article{høyerQuantum2013_84, title = {Quantum nonlocal boxes exhibit stronger distillability}, author = {Peter Høyer and Jibran Rashid}, journal = {Modern Physics Letters A}, volume = {28}, pages = {1330012}, number = {17}, year = {2013}, doi = {10.1142/S0217732313300127}, url = {https://doi.org/10.1142/S0217732313300127}, archivePrefix = {arXiv}, eprint = {1204.4622}, } @thesis{ebbeAspects2013_83, title = {Aspects and consequences of multi-party non-locality}, author = {Helen Ebbe}, year = {2013}, doi = {}, url = {}, } title = {Quantum private information retrieval has linear communication complexity}, author = {{\"{A}}min Baumeler and Anne Broadbent}, year = {2013}, doi = {10.48550/arXiv.1304.5490}, url = {https://doi.org/10.48550/arXiv.1304.5490}, archivePrefix = {arXiv}, eprint = {1304.5490}, } @inproceedings{ebbeDistillation2013_81, title = {Distillation of multi-party non-locality with and without partial communication}, author = {Helen Ebbe and Stefan Wolf}, year = {2013}, doi = {10.1109/ISIT.2013.6620324}, url = {https://doi.org/10.1109/ISIT.2013.6620324}, archivePrefix = {arXiv}, eprint = {1301.5875}, } @inproceedings{montinaThe2013_80, title = {The classical-communication rate of quantum resources}, author = {Alberto Montina and Marcel Pfaffhauser and Stefan Wolf}, year = {2013}, doi = {10.1109/ISIT.2013.6620325}, url = {https://doi.org/10.1109/ISIT.2013.6620325}, } @article{montinaExponential2013_79, title = {Exponential communication gap between weak and strong classical simulations of quantum communication}, author = {Alberto Montina}, journal = {Physical Review A}, volume = {87}, pages = {042331}, number = {4}, year = {2013}, doi = {10.1103/PhysRevA.87.042331}, url = {https://doi.org/10.1103/PhysRevA.87.042331}, archivePrefix = {arXiv}, eprint = {1301.3452}, } @article{schueleA2013_78, title = {A full computation-relevant topological dynamics classification of elementary cellular automata}, author = {Martin Sch{\"{u}}le and Ruedi Stoop}, journal = {Chaos}, volume = {22}, pages = {43143}, number = {4}, year = {2013}, doi = {10.1063/1.4771662}, url = {https://doi.org/10.1063/1.4771662}, archivePrefix = {arXiv}, eprint = {1107.2080}, } @article{rennerTowards2013_77, title = {Towards characterizing the non-locality of entangled quantum states}, author = {Renato Renner and Stefan Wolf}, journal = {Theoretical Computer Science}, volume = {486}, pages = {50-60}, number = {}, year = {2013}, doi = {10.1016/j.tcs.2012.12.016}, url = {https://doi.org/10.1016/j.tcs.2012.12.016}, archivePrefix = {arXiv}, eprint = {quant-ph/0211019}, } @article{haenggiThe2013_76, title = {The impossibility of non-signaling privacy amplification}, author = {Esther H{\"{a}}nggi and Renato Renner and Stefan Wolf}, journal = {Theoretical Computer Science}, volume = {486}, pages = {27-42}, number = {}, year = {2013}, doi = {10.1016/j.tcs.2012.12.014}, url = {https://doi.org/10.1016/j.tcs.2012.12.014}, archivePrefix = {arXiv}, eprint = {0906.4760}, } @article{gisinOblivious2013_75, title = {Oblivious transfer and quantum channels as communication resources}, author = {Nicolas Gisin and Sandu Popescu and Valerio Scarani and Stefan Wolf and J{\"{u}}rg Wullschleger}, journal = {Natural Computation}, volume = {12}, pages = {13-17}, number = {1}, year = {2013}, doi = {10.1007/s11047-012-9350-9}, url = {https://doi.org/10.1007/s11047-012-9350-9}, } title = {Classical, quantum and non-signalling resources in bipartite games}, author = {Gilles Brassard and Anne Broadbent and Esther H{\"{a}}nggi and Andr{\'{e}} M{\'{e}}thot and Stefan Wolf}, year = {2013}, doi = {10.1016/j.tcs.2012.12.017}, url = {https://doi.org/10.1016/j.tcs.2012.12.017}, } @article{galliardDeterministic2013_73, title = {Deterministic quantum non-locality and graph colorings}, author = {Viktor Galliard and Alain Tapp and Stefan Wolf}, journal = {Theoretical Computer Science}, volume = {486}, pages = {20-26}, number = {}, year = {2013}, doi = {10.1016/j.tcs.2012.12.013}, url = {https://doi.org/10.1016/j.tcs.2012.12.013}, } @article{rennerErnst2012_72, title = {Ernst Specker and the hidden variables}, author = {Renato Renner and Stefan Wolf}, journal = {Elemente der Mathematik}, volume = {67}, pages = {122-133}, number = {3}, year = {2012}, doi = {10.4171/EM/201}, url = {https://doi.org/10.4171/EM/201}, } @thesis{amirthamThe2012_71, title = {The quest for three-partite marginal quantum non-locality and a link to contextuality}, author = {Adarsh Amirtham}, year = {2012}, doi = {10.3929/ethz-a-007554618}, url = {https://doi.org/10.3929/ethz-a-007554618}, } @article{forsterBipartite2011_70, title = {Bipartite units of nonlocality}, author = {Manuel Forster and Stefan Wolf}, journal = {Physical Review A}, volume = {84}, pages = {042112}, number = {4}, year = {2011}, doi = {10.1103/PhysRevA.84.042112}, url = {https://doi.org/10.1103/PhysRevA.84.042112}, } @article{winklerBit2011_69, title = {Bit commitment from non-signaling correlations}, author = {Severin Winkler and J{\"{u}}rg Wullschleger and Stefan Wolf}, journal = {IEEE Transactions on Information Theory}, volume = {57}, pages = {1770-1779}, number = {3}, year = {2011}, doi = {10.1109/TIT.2011.2104471}, url = {https://doi.org/10.1109/TIT.2011.2104471}, archivePrefix = {arXiv}, eprint = {0811.3589}, } @article{vukolićSOFSEM2011_68, title = {SOFSEM 2011: Theory and practice of computer science}, author = {Ivana Černá, Tibor Gyimóthy, Juraj Hromkovič, Keith G. Jeffery, Rastislav Králović, Marko Vukolić and Stefan Wolf}, journal = {Lecture Notes in Computer Science}, volume = {}, pages = {}, number = {}, year = {2011}, doi = {10.1007/978-3-642-18381-2}, url = {https://doi.org/10.1007/978-3-642-18381-2}, } @article{haenggiNonlocality2011_67, title = {Non-locality is transitive}, author = {Sandro Coretti, Esther H{\"{a}}nggi and Stefan Wolf}, journal = {Physical Review Letters}, volume = {107}, pages = {100402}, number = {10}, year = {2011}, doi = {10.1103/PhysRevLett.107.100402}, url = {https://doi.org/10.1103/PhysRevLett.107.100402}, } @inproceedings{rennerEfficient2010_66, title = {Efficient device-independent quantum cryptography}, author = {Esther H{\"{a}}nggi, Renato Renner and Stefan Wolf}, year = {2010}, doi = {10.1007/978-3-642-13190-5_11}, url = {https://doi.org/10.1007/978-3-642-13190-5_11}, archivePrefix = {arXiv}, eprint = {0911.4171}, } @article{scaraniThe2010_65, title = {The non-locality of n noisy Popescu-Rohrlich boxes}, author = {Matthias Fitzi, Esther H{\"{a}}nggi, Valerio Scarani and Stefan Wolf}, journal = {Journal of Physics A}, volume = {43}, pages = {465305}, number = {46}, year = {2010}, doi = {10.1088/1751-8113/43/46/465305}, url = {https://doi.org/10.1088/1751-8113/43/46/465305}, } title = {On nonlocality distillation}, author = {Dejan Dukaric, Manuel Forster, Severin Winkler and Stefan Wolf}, year = {2009}, doi = {}, url = {}, } @article{winklerDistilling2009_63, title = {Distilling nonlocality}, author = {Manuel Forster, Severin Winkler and Stefan Wolf}, journal = {Physical Review Letters}, volume = {102}, pages = {120401}, number = {12}, year = {2009}, doi = {10.1103/PhysRevLett.102.120401}, url = {https://doi.org/10.1103/PhysRevLett.102.120401}, } @article{wullschlegerTradeoffs2009_62, title = {Trade-offs in information-theoretic multi-party one-way key agreement}, author = {Renato Renner, Stefan Wolf, J{\"{u}}rg Wullschleger}, journal = {Information Theoretic Security. Lecture Notes in Computer Science}, volume = {4883}, pages = {65-75}, number = {}, year = {2009}, doi = {10.1007/978-3-642-10230-1_5}, url = {https://doi.org/10.1007/978-3-642-10230-1_5}, } @inproceedings{brassardClassical2008_61, title = {Classical, quantum and non-signalling resources in bipartite games}, author = {Gilles Brassard and Anne Broadbent and Esther H{\"{a}}nggi and Andr{\'{e}} M{\'{e}}thot and Stefan Wolf}, year = {2008}, doi = {10.1109/ICQNM.2008.18}, url = {https://doi.org/10.1109/ICQNM.2008.18}, } @article{wullschlegerNew2008_60, title = {New monotones and lower bounds in unconditional two-party computation}, author = {Stefan Wolf, J{\"{u}}rg Wullschleger}, journal = {IEEE Transactions on Information Theory}, volume = {54}, pages = {2792-2797}, number = {6}, year = {2008}, doi = {10.1109/TIT.2008.921674}, url = {https://doi.org/10.1109/TIT.2008.921674}, } @inproceedings{forsterThe2008_59, title = {The universality of nonlocal boxes}, author = {Manuel Forster and Stefan Wolf}, year = {2008}, doi = {10.1063/1.3131286}, url = {https://doi.org/10.1063/1.3131286}, } @article{bhargavaWorstcase2008_58, title = {Worst-case nonzero-error interactive communication}, author = {Hugues Mercier, Pierre McKenzie, Stefan Wolf, Vijay K. Bhargava}, journal = {IEEE Transactions on Information Theory}, volume = {54}, pages = {2857-2867}, number = {7}, year = {2008}, doi = {10.1109/TIT.2008.924653}, url = {https://doi.org/10.1109/TIT.2008.924653}, } @inproceedings{scaraniHow2008_57, title = {How non-local are n noisy Popescu-Rohrlich machines?}, author = {Matthias Fitzi, Esther H{\"{a}}nggi, Valerio Scarani and Stefan Wolf}, year = {2008}, doi = {10.1063/1.3131285}, url = {https://doi.org/10.1063/1.3131285}, archivePrefix = {arXiv}, eprint = {0811.1649}, } @article{dukaricA2008_56, title = {A limit on non-locality distillation}, author = {Dejan Dukaric and Stefan Wolf}, year = {2008}, doi = {10.48550/arXiv.0808.3317}, url = {https://doi.org/10.48550/arXiv.0808.3317}, archivePrefix = {arXiv}, eprint = {0808.3317}, } @article{rennerUnbreakable2007_55, title = {Unbreakable keys from random noise}, author = {Ueli Maurer, Renato Renner and Stefan Wolf}, journal = {Security with Noisy Data}, volume = {}, pages = {}, number = {}, year = {2007}, doi = {10.1007/978-1-84628-984-2_2}, url = {https://doi.org/10.1007/978-1-84628-984-2_2}, } @inproceedings{nielsenHow2007_54, title = {How to share a key}, author = {Matthias Fitzi, Jesper Buus Nielsen and Stefan Wolf}, year = {2007}, doi = {}, url = {}, } @article{wullschlegerUnconditionally2007_53, title = {Unconditionally secure multi-party computation from weak primitives}, author = {Stefan Wolf, J{\"{u}}rg Wullschleger}, journal = {Security with Noisy Data}, volume = {}, pages = {}, number = {}, year = {2007}, doi = {10.1007/978-1-84628-984-2_8}, url = {https://doi.org/10.1007/978-1-84628-984-2_8}, } @inproceedings{wullschlegerOblivious2006_52, title = {Oblivious transfer is symmetric}, author = {Stefan Wolf, J{\"{u}}rg Wullschleger}, year = {2006}, doi = {10.1007/11761679_14}, url = {http://eprint.iacr.org/2004/336}, } @inproceedings{wullschlegerOn2006_51, title = {On the power of imperfect broadcast}, author = {Mathias Fitzi, Stefan Wolf, J{\"{u}}rg Wullschleger}, year = {2006}, doi = {10.1109/ISIT.2006.261766}, url = {https://doi.org/10.1109/ISIT.2006.261766}, } @inproceedings{wullschlegerThe2006_50, title = {The single-serving channel capacity}, author = {Renato Renner, Stefan Wolf, J{\"{u}}rg Wullschleger}, year = {2006}, doi = {10.1109/ISIT.2006.262081}, url = {https://doi.org/10.1109/ISIT.2006.262081}, } @inproceedings{wullschlegerOblivious2006_49, title = {Oblivious transfer and quantum channels}, author = {Nicolas Gisin, Sandu Popescu, Valerio Scarani, Stefan Wolf, J{\"{u}}rg Wullschleger}, year = {2006}, doi = {10.1109/ITW.2006.1633774}, url = {https://doi.org/10.1109/ITW.2006.1633774}, archivePrefix = {arXiv}, eprint = {quant-ph/0601157}, } @inproceedings{wullschlegerNew2005_48, title = {New monotones and lower bounds in unconditional two-party computation}, author = {Stefan Wolf, J{\"{u}}rg Wullschleger}, year = {2005}, doi = {10.1007/11535218_28}, url = {https://doi.org/10.1007/11535218_28}, } @inproceedings{wullschlegerOblivious2005_47, title = {Oblivious transfer and quantum non-locality}, author = {Stefan Wolf, J{\"{u}}rg Wullschleger}, year = {2005}, doi = {10.1109/ISIT.2005.1523644}, url = {https://doi.org/10.1109/ISIT.2005.1523644}, archivePrefix = {arXiv}, eprint = {quant-ph/0502030}, } @inproceedings{rennerSimple2005_46, title = {Simple and tight bounds for information reconciliation and privacy amplification}, author = {Renato Renner and Stefan Wolf}, year = {2005}, doi = {10.1007/11593447_11}, url = {https://doi.org/10.1007/11593447_11}, } @inproceedings{wullschlegerBit2005_45, title = {Bit commitment from weak non-locality}, author = {Stefan Wolf, J{\"{u}}rg Wullschleger}, year = {2005}, doi = {10.1109/ITWTPI.2005.1543951}, url = {https://doi.org/10.1109/ITWTPI.2005.1543951}, archivePrefix = {arXiv}, eprint = {quant-ph/0508233}, } @article{morozovEfficient2005_44, title = {Efficient unconditional oblivious transfer from almost any noisy channel}, author = {Claude Crepeau, Kirill Morozov and Stefan Wolf}, journal = {Security in Communication Networks}, volume = {3352}, pages = {47-59}, number = {}, year = {2005}, doi = {10.1007/978-3-540-30598-9_4}, url = {https://doi.org/10.1007/978-3-540-30598-9_4}, } @inproceedings{rennerQuantum2004_43, title = {Quantum pseudo-telepathy and the Kochen-Specker theorem}, author = {Renato Renner and Stefan Wolf}, year = {2004}, doi = {10.1109/ISIT.2004.1365359}, url = {https://doi.org/10.1109/ISIT.2004.1365359}, } @inproceedings{rennerSmooth2004_42, title = {Smooth Renyi entropy and applications}, author = {Renato Renner and Stefan Wolf}, year = {2004}, doi = {10.1109/ISIT.2004.1365269}, url = {https://doi.org/10.1109/ISIT.2004.1365269}, } @inproceedings{rennerThe2004_41, title = {The exact price for unconditionally secure asymmetric cryptography}, author = {Renato Renner and Stefan Wolf}, year = {2004}, doi = {10.1007/978-3-540-24676-3_7}, url = {https://doi.org/10.1007/978-3-540-24676-3_7}, } @inproceedings{wullschlegerPseudosignatures2004_40, title = {Pseudo-signatures, broadcast, and multi-party computation from correlated randomness}, author = {Matthias Fitzi, Stefan Wolf, J{\"{u}}rg Wullschleger}, year = {2004}, doi = {10.1007/978-3-540-28628-8_34}, url = {https://doi.org/10.1007/978-3-540-28628-8_34}, } @inproceedings{wullschlegerZeroerror2004_39, title = {Zero-error information and applications in cryptography}, author = {Stefan Wolf, J{\"{u}}rg Wullschleger}, year = {2004}, doi = {10.1109/ITW.2004.1405264}, url = {https://doi.org/10.1109/ITW.2004.1405264}, } @article{crepeauOblivious2003_38, title = {Oblivious transfers and privacy amplification}, author = {Gilles Brassard, Claude Crepeau and Stefan Wolf}, journal = {Journal of Cryptology}, volume = {16}, pages = {219-237}, number = {4}, year = {2003}, doi = {10.1007/s00145-002-0146-4}, url = {https://doi.org/10.1007/s00145-002-0146-4}, } @article{maurerSecretkey2003_37, title = {Secret-key agreement over unauthenticated public channels - Part III: Privacy amplification}, author = {Ueli Maurer and Stefan Wolf}, journal = {IEEE Transactions on Information Theory}, volume = {49}, pages = {839-851}, number = {4}, year = {2003}, doi = {10.1109/TIT.2003.809559}, url = {https://doi.org/10.1109/TIT.2003.809559}, } @article{maurerSecretkey2003_36, title = {Secret-key agreement over unauthenticated public channels - Part II: The simulatability condition}, author = {Ueli Maurer and Stefan Wolf}, journal = {IEEE Transactions on Information Theory}, volume = {49}, pages = {832-838}, number = {4}, year = {2003}, doi = {10.1109/TIT.2003.809560}, url = {https://doi.org/10.1109/TIT.2003.809560}, } @article{maurerSecretkey2003_35, title = {Secret-key agreement over unauthenticated public channels - Part I: Definitions and a completeness result}, author = {Ueli Maurer and Stefan Wolf}, journal = {IEEE Transactions on Information Theory}, volume = {49}, pages = {822-831}, number = {4}, year = {2003}, doi = {10.1109/TIT.2003.809563}, url = {https://doi.org/10.1109/TIT.2003.809563}, } @inproceedings{rennerNew2003_34, title = {New bounds in secret-key agreement: the gap between formation and secrecy extraction}, author = {Renato Renner and Stefan Wolf}, year = {2003}, doi = {10.1007/3-540-39200-9_35}, url = {https://doi.org/10.1007/3-540-39200-9_35}, } @inproceedings{tappThe2003_33, title = {The impossibility of pseudo-telepathy without quantum entanglement}, author = {Viktor Galliard, Alain Tapp and Stefan Wolf}, year = {2003}, doi = {10.1109/ISIT.2003.1228474}, url = {https://doi.org/10.1109/ISIT.2003.1228474}, archivePrefix = {arXiv}, eprint = {quant-ph/0211011}, } @inproceedings{rennerTowards2003_32, title = {Towards characterizing the non-local information of entangled quantum states}, author = {Renato Renner and Stefan Wolf}, year = {2003}, doi = {10.1109/ISIT.2003.1228445}, url = {https://doi.org/10.1109/ISIT.2003.1228445}, } @inproceedings{rennerA2003_31, title = {A property of the intrinsic mutual information}, author = {Matthias Christandl, Renato Renner and Stefan Wolf}, year = {2003}, doi = {10.1109/ISIT.2003.1228272}, url = {https://doi.org/10.1109/ISIT.2003.1228272}, } @inproceedings{rennerUnconditional2003_30, title = {Unconditional authenticity and privacy from an arbitrarily weak secret}, author = {Renato Renner and Stefan Wolf}, year = {2003}, doi = {10.1007/978-3-540-45146-4_5}, url = {https://doi.org/10.1007/978-3-540-45146-4_5}, } @inproceedings{skripskyA2003_29, title = {A new measure for conditional mutual information and its properties}, author = {Renato Renner, Juraj Skripsky and Stefan Wolf}, year = {2003}, doi = {10.1109/ISIT.2003.1228273}, url = {https://doi.org/10.1109/ISIT.2003.1228273}, } @inproceedings{stebilaEfficient2002_28, title = {Efficient oblivious transfer from any non-trivial binary-symmetric channel}, author = {Douglas Stebila and Stefan Wolf}, year = {2002}, doi = {10.1109/ISIT.2002.1023565}, url = {https://doi.org/10.1109/ISIT.2002.1023565}, } @inproceedings{rennerTowards2002_27, title = {Towards proving the existence of bound information}, author = {Renato Renner and Stefan Wolf}, year = {2002}, doi = {10.1109/ISIT.2002.1023375}, url = {https://doi.org/10.1109/ISIT.2002.1023375}, } @inproceedings{galliardPseudotelepathy2002_26, title = {Pseudo-telepathy, entanglement, and graph colorings}, author = {Viktor Galliard and Stefan Wolf}, year = {2002}, doi = {10.1109/ISIT.2002.1023373}, url = {https://doi.org/10.1109/ISIT.2002.1023373}, } @article{rennerLinking2002_25, title = {Linking classical and quantum key agreement: is there a classical analog to bound entanglement?}, author = {Nicolas Gisin, Renato Renner and Stefan Wolf}, journal = {Algorithmica}, volume = {34}, pages = {389-412}, number = {4}, year = {2002}, doi = {10.1007/s00453-002-0972-7}, url = {https://doi.org/10.1007/s00453-002-0972-7}, } @inproceedings{maurerInformationtheoretic2000_24, title = {Information-theoretic key agreement: from weak to strong secrecy for free}, author = {Ueli Maurer and Stefan Wolf}, year = {2000}, doi = {10.1007/3-540-45539-6_24}, url = {https://doi.org/10.1007/3-540-45539-6_24}, } @inproceedings{maurerFrom2000_23, title = {From weak to strong secrecy in information-theoretic key agreement}, author = {Ueli Maurer and Stefan Wolf}, year = {2000}, doi = {10.1109/ISIT.2000.866308}, url = {https://doi.org/10.1109/ISIT.2000.866308}, } @article{maurerThe2000_22, title = {The Diffie-Hellman protocol}, author = {Ueli Maurer and Stefan Wolf}, journal = {Designs}, volume = {}, pages = {}, number = {}, year = {2000}, doi = {10.1023/A:1008302122286}, url = {https://doi.org/10.1023/A:1008302122286}, } @inproceedings{gisinLinking2000_21, title = {Linking classical and quantum key agreement: is there bound information?}, author = {Nicolas Gisin and Stefan Wolf}, year = {2000}, doi = {10.1007/3-540-44598-6_30}, url = {https://doi.org/10.1007/3-540-44598-6_30}, } @inproceedings{wolfReducing2000_20, title = {Reducing string oblivious transfer to universal oblivious transfer}, author = {Stefan Wolf}, year = {2000}, doi = {10.1109/ISIT.2000.866763}, url = {https://doi.org/10.1109/ISIT.2000.866763}, } @inproceedings{rennerBound2000_19, title = {Bound information: the classical analog to bound entanglement}, author = {Nicolas Gisin, Renato Renner and Stefan Wolf}, year = {2000}, doi = {10.1007/978-3-0348-8266-8_38}, url = {https://doi.org/10.1007/978-3-0348-8266-8_38}, } @inproceedings{wolfA2000_18, title = {A simple and efficiently verifiable characterization of the possibility of information-theoretic key agreement secure against active adversaries}, author = {Stefan Wolf}, year = {2000}, doi = {10.1109/ISIT.2000.866307}, url = {https://doi.org/10.1109/ISIT.2000.866307}, } @article{maurerThe1999_17, title = {The relationship between breaking the Diffie-Hellman protocol and computing discrete logarithms}, author = {Ueli Maurer and Stefan Wolf}, journal = {SIAM Journal on Computing}, volume = {28}, pages = {1689-1721}, number = {5}, year = {1999}, doi = {10.1137/S0097539796302749}, url = {https://doi.org/10.1137/S0097539796302749}, } @thesis{wolfInformationtheoretically1999_16, title = {Information-theoretically and computationally secure key agreement in cryptography}, author = {Stefan Wolf}, year = {1999}, doi = {10.3929/ethz-a-002077162}, url = {https://doi.org/10.3929/ethz-a-002077162}, } @inproceedings{sahaiPseudonym1999_15, title = {Pseudonym systems}, author = {Anna Lysyanskaya, Ronald Rivest, Amit Sahai and Stefan Wolf}, year = {1999}, doi = {10.1007/3-540-46513-8_14}, url = {https://doi.org/10.1007/3-540-46513-8_14}, } @inproceedings{wolfUnconditional1999_14, title = {Unconditional security in cryptography}, author = {Stefan Wolf}, year = {1999}, doi = {10.1007/3-540-48969-X_10}, url = {https://doi.org/10.1007/3-540-48969-X_10}, } @article{gisinQuantum1999_13, title = {Quantum cryptography on noisy channels: quantum versus classical key-agreement protocols}, author = {Nicolas Gisin and Stefan Wolf}, journal = {Physical Review Letters}, volume = {83}, pages = {4200-4203}, number = {20}, year = {1999}, doi = {10.1103/PhysRevLett.83.4200}, url = {https://doi.org/10.1103/PhysRevLett.83.4200}, } @article{maurerUnconditionally1999_12, title = {Unconditionally secure key agreement and the intrinsic conditional information}, author = {Ueli Maurer and Stefan Wolf}, journal = {IEEE Transactions on Information Theory}, volume = {45}, pages = {499-514}, number = {2}, year = {1999}, doi = {10.1109/18.748999}, url = {https://doi.org/10.1109/18.748999}, } @script{maurerOn1998_11, title = {On the hardness of the Diffie-Hellman decision problem}, author = {Ueli Maurer and Stefan Wolf}, year = {1998}, doi = {}, url = {}, } @inproceedings{maurerLower1998_10, title = {Lower bounds on generic algorithms in groups}, author = {Ueli Maurer and Stefan Wolf}, year = {1998}, doi = {10.1007/BFb0054118}, url = {https://doi.org/10.1007/BFb0054118}, } @inproceedings{wolfStrong1998_9, title = {Strong security against active attacks in information-theoretic secret-key agreement}, author = {Stefan Wolf}, year = {1998}, doi = {10.1007/3-540-49649-1_32}, url = {https://doi.org/10.1007/3-540-49649-1_32}, } @inproceedings{maurerDiffieHellman1998_8, title = {Diffie-Hellman, decision Diffie-Hellman, and discrete logarithms}, author = {Ueli Maurer and Stefan Wolf}, year = {1998}, doi = {10.1109/ISIT.1998.708932}, url = {https://doi.org/10.1109/ISIT.1998.708932}, } @inproceedings{maurerThe1997_7, title = {The intrinsic conditional mutual information and perfect secrecy}, author = {Ueli Maurer and Stefan Wolf}, year = {1997}, doi = {10.1109/ISIT.1997.613003}, url = {https://doi.org/10.1109/ISIT.1997.613003}, } @article{maurerUnconditionally1997_6, title = {Unconditionally secure secret-key agreement and the intrinsic conditional mutual information}, author = {Ueli Maurer and Stefan Wolf}, journal = {Tech. Rep.}, volume = {}, pages = {}, number = {}, year = {1997}, doi = {}, url = {}, } @inproceedings{maurerPrivacy1997_5, title = {Privacy amplification secure against active adversaries}, author = {Ueli Maurer and Stefan Wolf}, year = {1997}, doi = {10.1007/BFb0052244}, url = {https://doi.org/10.1007/BFb0052244}, } @article{maurerOn1996_4, title = {On the complexity of breaking the Diffie-Hellman protocol}, author = {Ueli Maurer and Stefan Wolf}, journal = {Tech. Rep.}, volume = {}, pages = {}, number = {}, year = {1996}, doi = {}, url = {}, } @inproceedings{maurerDiffieHellman1996_3, title = {Diffie-Hellman oracles}, author = {Ueli Maurer and Stefan Wolf}, year = {1996}, doi = {10.1007/3-540-68697-5_21}, url = {https://doi.org/10.1007/3-540-68697-5_21}, } @inproceedings{maurerTowards1996_2, title = {Towards characterizing when information-theoretic secret key agreement is possible}, author = {Ueli Maurer and Stefan Wolf}, year = {1996}, doi = {10.1007/BFb0034847}, url = {https://doi.org/10.1007/BFb0034847}, } @thesis{wolfDiffieHellman1995_1, title = {Diffie-Hellman and discrete logarithms}, author = {Stefan Wolf}, year = {1995}, doi = {}, url = {}, }