Ämin Baumeler
Causal loops: logically consistent correlations, time travel, and computation
Doctoral Dissertation, 2017.
Full version: [pdf]

Ämin Baumeler, Charles Alexandre Bédard, Gilles Brassard, Stefan Wolf
Kolmogorov amplification from Bell correlation
International Symposium on Information Theory (ISIT) 2017, 2017.
Full version: [pdf]

Stefan Wolf
Landauer’s erasure principle and data compression
Full version: [pdf]

Ämin Baumeler, Fabio Costa, Timothy C. Ralph, Stefan Wolf, Magdalena Zych
Reversible time travel with freedom of choice
arXiv:1703.00779 [gr-qc], 2017.
Full version: [arXiv]

Stefan Wolf
An all-or-nothing flavor to the Church-Turing hypothesis
to appear in Proceedings of 14th Annual Conference on Theory and Applications of Models of Computation (TAMC 2017), 2017.
Full version: [arXiv], [pdf]

Ämin Baumeler, Stefan Wolf
Computational tameness of classical non-causal models
arXiv:1611.05641 [quant-ph], 2016.
Full version: [arXiv], [pdf]

Veronika Baumann, Arne Hansen, Stefan Wolf
The measurement problem is the measurement problem is the measurement problem
arXiv:1611.01111 [quant-ph], 2016.
Full version: [arXiv]

Paul Erker, Mark T. Mitchison, Ralph Silva, Mischa P. Woods, Nicolas Brunner, Marcus Huber
Autonomous quantum clocks: how thermodynamics limits our ability to measure time
arXiv:1609.06704 [quant-ph], 2016.
Full version: [arXiv]

Alberto Montina, Stefan Wolf
Can non-local correlations be discriminated in polynomial time?
arXiv:1609.06269 [quant-ph], 2016.
Full version: [arXiv]

Sacha Schwarz, André Stefanov, Stefan Wolf, Alberto Montina
Optimal measurements for nonlocal correlations
Physical Review A, 94(2):022322, 2016.
Full version: [www], [arXiv]

Benno Salwey, Stefan Wolf
Stronger attacks on causality-based key agreement
International Symposium on Information Theory (ISIT) 2016, 2016.
Full version: [www], [arXiv], [pdf]

Ali Asadian, Paul Erker, Marcus Huber, Claude Klöckl
Heisenberg-Weyl observables: Bloch vectors in phase space
Physical Review A, 94(1):010301(R), 2016.
Full version: [www], [arXiv]

Veronika Baumann, Časlav Brukner
Appearance of causality in process matrices when performing fixed-basis measurements for two parties
Physical Review A, 93(6):062324, 2016.
Full version: [www], [arXiv]

Arne Hansen, Alberto Montina, Stefan Wolf
Simple algorithm for computing the communication complexity of quantum communication processes
Physical Review A, 93(4):042315, 2016.
Full version: [www], [arXiv]

Ämin Baumeler, Stefan Wolf
Device-independent test of causal order and relations to fixed-points
New Journal of Physics, 18(3):035014, 2016.
Full version: [www], [arXiv]

Ämin Baumeler, Stefan Wolf
Causality — Complexity — Consistency: Can space-time be based on logic and computation?
arXiv:1602.06987 [quant-ph], 2016.
Full version: [arXiv]

Ämin Baumeler, Stefan Wolf
Non-causal computation
arXiv:1601.06522 [quant-ph], 2016.
Full version: [arXiv]

Alberto Montina, Stefan Wolf
Information-based measure of nonlocality
New Journal of Physics, 18(1):013035, 2016.
Full version: [www], [arXiv]

Ämin Baumeler, Stefan Wolf
The space of logically consistent classical processes without causal order
New Journal of Physics, 18(1):013036, 2016.
Full version: [www], [arXiv]

Stefan Wolf
On bits as fuel
Unpublished, 2016.
Full version: [pdf]

Paul Erker, Mario Krenn, Marcus Huber
Quantifying high dimensional entanglement with cameras and lenses
arXiv:1512.05315 [quant-ph], 2015.
Full version: [arXiv]

Stefan Wolf
Non-locality without counterfactual reasoning
Physical Review A, 92(5):052102, 2015.
Full version: [www], [arXiv], [pdf]

Paul Erker
The quantum hourglass
Master Thesis ETH, 2015.
Full version: [www], [pdf]

Paul Erker
How not to Rényi-generalize the quantum conditional mutual information
Journal of Physics A: Mathematical and Theoretical, 48(27):275303, 2015.
Full version: [www], [arXiv]

Benno Salwey
No-signalling attacks and implications for (quantum) nonlocality distillation
Doctoral Dissertation, 2015.
Full version: [pdf]

Gilles Brassard, Benno Salwey, Stefan Wolf
Non-locality distillation as cryptographic game
ITW-IEEE Information Theory Workshop, Jerusalem, 1-5, 2015.
Full version: [www], [pdf]

Alberto Montina
Communication complexity and the reality of the wave-function
Modern Physics Letters A, 30(1):1530001, 2015.
Full version: [www], [arXiv]

Ämin Baumeler, Anne Broadbent
Quantum private information retrieval has linear communication complexity
Journal of Cryptology, 28(1):161-175, 2015.
Full version: [www], [arXiv]

Ämin Baumeler, Adrien Feix, Stefan Wolf
Maximal incompatibility of locally classical behavior and global causal order in multiparty scenarios
Physical Review A, 90(4):042106, 2014.
Full version: [www], [arXiv]

Christof Bernhard, Bänz Bessire, Alberto Montina, Marcel Pfaffhauser, André Stefanov, Stefan Wolf
Non-locality of experimental qutrit pairs
Journal of Physics A: Mathematical and Theoretical, Special issue on 50 Years of Bell's Theorem, 47(42):424013, 2014.
Full version: [www], [arXiv]

Alberto Montina, Stefan Wolf
Necessary and sufficient optimality conditions for classical simulations of quantum communication processes
Physical Review A, 90(1):012309, 2014.
Full version: [www], [arXiv]

Jibran Rashid, Abuzer Yakaryιlmaz
Implications of quantum automata for contextuality
19th International Conference on Implementation and Application of Automata, 2014.
Full version: [www], [arXiv]

Alberto Montina, Stefan Wolf
Lower bounds on the communication complexity of two-party (quantum) processes
International Symposium on Information Theory (ISIT) 2014, 1484-1488, 2014.
Full version: [www], [arXiv]

Helen Ebbe, Stefan Wolf
Trading permutation invariance for communication in multi-party non-locality distillation
International Symposium on Information Theory (ISIT) 2014, 1479-1483, 2014.
Full version: [www], [arXiv]

Ämin Baumeler, Stefan Wolf
Perfect signaling among three parties violating predefined causal order
International Symposium on Information Theory (ISIT) 2014, 526-530, 2014.
Full version: [www], [arXiv]

Helen Ebbe, Stefan Wolf
Multi-user non-locality amplification
IEEE Transactions on Information Theory, 60(2):1159-1167, 2014.
Full version: [www], [arXiv]

Alberto Montina, Marcel Pfaffhauser, Stefan Wolf
Communication complexity of channels in general probabilistic theories
Physical Review Letters, 111(16):160502, 2013.
Full version: [www], [arXiv]

Miguel Onorato, Stefania Residori, Umberto Bortolozzo, Alberto Montina, Fortunato Tito Arecchi
Rogue waves and their generating mechanisms in different physical contexts
Physics Reports, 528(2):47-89, 2013.
Full version: [www]

Peter Høyer, Jibran Rashid
Quantum nonlocal boxes exhibit stronger distillability
Modern Physics Letters A, 28(17):1330012, 2013.
Full version: [www], [arXiv]

Helen Ebbe
Aspects and consequences of multi-party non-locality
Master Thesis ETH, 2013.
Full version: [pdf]

Ämin Baumeler, Anne Broadbent
Quantum private information retrieval has linear communication complexity
QCrypt 2013, 2013.
Full version: [arXiv], [pdf], [slides], [video]

Helen Ebbe, Stefan Wolf
Distillation of multi-party non-locality with and without partial communication
International Symposium on Information Theory (ISIT) 2013, 739-743, 2013.
Full version: [www], [arXiv], [slides]

Alberto Montina, Marcel Pfaffhauser, Stefan Wolf
The classical-communication rate of quantum resources
International Symposium on Information Theory (ISIT) 2013, 744-748, 2013.
Full version: [www], [pdf]

Alberto Montina
Exponential communication gap between weak and strong classical simulations of quantum communication
Physical Review A, 87(4):042331, 2013.
Full version: [www], [arXiv]

Martin Schüle, Ruedi Stoop
A full computation-relevant topological dynamics classification of elementary cellular automata
Chaos, 22(4):43143, 2013.
Full version: [www], [arXiv]

Renato Renner, Stefan Wolf
Towards characterizing the non-locality of entangled quantum states
Theoretical Computer Science, 486:50-60, Elsevier, 2013.
Full version: [www], [arXiv], [pdf]

Esther Hänggi, Renato Renner, Stefan Wolf
The impossibility of non-signaling privacy amplification
Theoretical Computer Science, 486:27-42, Elsevier, 2013.
Full version: [www], [arXiv]

Nicolas Gisin, Sandu Popescu, Valerio Scarani, Stefan Wolf, Jürg Wullschleger
Oblivious transfer and quantum channels as communication resources
Natural Computation, 12(1):13-17, 2013.
Full version: [www], [ps]

Gilles Brassard, Anne Broadbent, Esther Hänggi, André Méthot, Stefan Wolf
Classical, quantum and non-signalling resources in bipartite games
Theoretical Computer Science, 486:61-72, Elsevier, 2013.
Full version: [www]

Viktor Galliard, Alain Tapp, Stefan Wolf
Deterministic quantum non-locality and graph colorings
Theoretical Computer Science, 486:20-26, Elsevier, 2013.
Full version: [www], [pdf]

Renato Renner, Stefan Wolf
Ernst Specker and the hidden variables
Elemente der Mathematik, 67(3):122-133, 2012.
Full version: [www], [pdf]

Adarsh Amirtham
The quest for three-partite marginal quantum non-locality and a link to contextuality
Master Thesis ETH, 2012.
Full version: [www], [pdf], [files]

Manuel Forster, Stefan Wolf
Bipartite units of nonlocality
Physical Review A, 84(4):042112, 2011.
Full version: [www]

Severin Winkler, Jürg Wullschleger, Stefan Wolf
Bit commitment from non-signaling correlations
IEEE Transactions on Information Theory, 57(3):1770-1779, 2011.
Full version: [www], [arXiv]

Ivana Černá, Tibor Gyimóthy, Juraj Hromkovič, Keith G. Jeffery, Rastislav Králović, Marko Vukolić, Stefan Wolf
SOFSEM 2011: Theory and practice of computer science
Lecture Notes in Computer Science, 6543, Springer-Verlag, 2011.
Full version: [www]

Sandro Coretti, Esther Hänggi, Stefan Wolf
Non-locality is transitive
Physical Review Letters, 107(10):100402, 2011.
Full version: [www]

Esther Hänggi, Renato Renner, Stefan Wolf
Efficient device-independent quantum cryptography
Advances in Cryptology - EUROCRYPT 2010, Lecture Notes in Computer Science, 6110:216-234, Springer-Verlag, 2010.
Full version: [www], [arXiv]

Matthias Fitzi, Esther Hänggi, Valerio Scarani, Stefan Wolf
The non-locality of n noisy Popescu-Rohrlich boxes
Journal of Physics A, Mathematical and Theoretical, 43(46):465305, 2010.
Full version: [www]

Dejan Dukaric, Manuel Forster, Severin Winkler, Stefan Wolf
On nonlocality distillation
QIP 2009, 2009.
Full version: [slides]

Manuel Forster, Severin Winkler, Stefan Wolf
Distilling nonlocality
Physical Review Letters, 102(12):120401, 2009.
Full version: [www]

Renato Renner, Stefan Wolf, Jürg Wullschleger
Trade-offs in information-theoretic multi-party one-way key agreement
Information Theoretic Security. Lecture Notes in Computer Science, 4883:65-75, Springer-Verlag, 2009.
Full version: [www], [ps]

Gilles Brassard, Anne Broadbent, Esther Hänggi, André Méthot, Stefan Wolf
Classical, quantum and non-signalling resources in bipartite games
Second International Conference on Quantum, Nano and Micro Technologies (ICQNM), 2008.
Full version: [www], [pdf]

Stefan Wolf, Jürg Wullschleger
New monotones and lower bounds in unconditional two-party computation
IEEE Transactions on Information Theory, 54(6):2792-2797, 2008.
Full version: [www], [pdf]

Manuel Forster, Stefan Wolf
The universality of nonlocal boxes
Ninth International Conference on Quantum Communication, Measurement and Computing (QCMC), 2008.
Full version: [www]

Hugues Mercier, Pierre McKenzie, Stefan Wolf, Vijay K. Bhargava
Worst-case nonzero-error interactive communication
IEEE Transactions on Information Theory, 54(7):2857-2867, 2008.
Full version: [www], [pdf]

Matthias Fitzi, Esther Hänggi, Valerio Scarani, Stefan Wolf
How non-local are n noisy Popescu-Rohrlich machines?
Ninth International Conference on Quantum Communication, Measurement and Computing (QCMC), 2008.
Full version: [www], [pdf], [arXiv]

Dejan Dukaric, Stefan Wolf
A limit on non-locality distillation
arXiv:0808.3317 [quant-ph], 2008.
Full version: [arXiv]

Ueli Maurer, Renato Renner, Stefan Wolf
Unbreakable keys from random noise
Security with Noisy Data, 21-44, Springer-Verlag, 2007.
Full version: [www], [ps]

Matthias Fitzi, Jesper Buus Nielsen, Stefan Wolf
How to share a key
45th Annual Allerton Conference on Communication, Control, and Computing, 23-25, 2007.
Full version: [pdf]

Stefan Wolf, Jürg Wullschleger
Unconditionally secure multi-party computation from weak primitives
Security with Noisy Data, 127-139, Springer-Verlag, 2007.
Full version: [www], [pdf]

Stefan Wolf, Jürg Wullschleger
Oblivious transfer is symmetric
Advances in Cryptology - EUROCRYPT 2006, Lecture Notes in Computer Science, 4004:222-232, Springer-Verlag, 2006.
Full version: [www], [www], [pdf]

Mathias Fitzi, Stefan Wolf, Jürg Wullschleger
On the power of imperfect broadcast
International Symposium on Information Theory (ISIT) 2006, 2006.
Full version: [www], [ps]

Renato Renner, Stefan Wolf, Jürg Wullschleger
The single-serving channel capacity
International Symposium on Information Theory (ISIT) 2006, 2006.
Full version: [www], [pdf]

Nicolas Gisin, Sandu Popescu, Valerio Scarani, Stefan Wolf, Jürg Wullschleger
Oblivious transfer and quantum channels
IEEE Information Theory Workshop (ITW) 2006, 2006.
Full version: [www], [arXiv]

Stefan Wolf, Jürg Wullschleger
New monotones and lower bounds in unconditional two-party computation
Advances in Cryptology - CRYPTO 2005, Lecture Notes in Computer Science, 3621:467-477, Springer-Verlag, 2005.
Full version: [www], [ps]

Stefan Wolf, Jürg Wullschleger
Oblivious transfer and quantum non-locality
International Symposium on Information Theory (ISIT) 2005, 2005.
Full version: [www], [arXiv], [pdf]

Renato Renner, Stefan Wolf
Simple and tight bounds for information reconciliation and privacy amplification
Advances in Cryptology - ASIACRYPT 2005, Lecture Notes in Computer Science, 3788:199-216, Springer-Verlag, 2005.
Full version: [www], [pdf]

Stefan Wolf, Jürg Wullschleger
Bit commitment from weak non-locality
IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security 2005, 2005.
Full version: [www], [arXiv], [pdf]

Claude Crepeau, Kirill Morozov, Stefan Wolf
Efficient unconditional oblivious transfer from almost any noisy channel
Security in Communication Networks, Lecture Notes in Computer Science, 3352:47-59, Springer-Verlag, 2005.
Full version: [www], [ps]

Renato Renner, Stefan Wolf
Quantum pseudo-telepathy and the Kochen-Specker theorem
International Symposium on Information Theory (ISIT) 2004, 2004.
Full version: [www], [ps], [ps]

Renato Renner, Stefan Wolf
Smooth Renyi entropy and applications
International Symposium on Information Theory (ISIT) 2004, 2004.
Full version: [www], [ps]

Renato Renner, Stefan Wolf
The exact price for unconditionally secure asymmetric cryptography
Advances in Cryptology - EUROCRYPT 2004, Lecture Notes in Computer Science, 3027:109-125, Springer-Verlag, 2004.
Full version: [www], [ps]

Matthias Fitzi, Stefan Wolf, Jürg Wullschleger
Pseudo-signatures, broadcast, and multi-party computation from correlated randomness
Advances in Cryptology - EUROCRYPT 2004, Lecture Notes in Computer Science, 3027:562-578, Springer-Verlag, 2004.
Full version: [www], [pdf]

Stefan Wolf, Jürg Wullschleger
Zero-error information and applications in cryptography
IEEE Information Theory Workshop (ITW) 2004, 2004.
Full version: [www], [pdf]

Gilles Brassard, Claude Crepeau, Stefan Wolf
Oblivious transfers and privacy amplification
Journal of Cryptology, 16(4):219-237, Springer-Verlag, 2003.
Full version: [www], [pdf]

Ueli Maurer, Stefan Wolf
Secret-key agreement over unauthenticated public channels - Part III: Privacy amplification
IEEE Transactions on Information Theory, 49(4):839-851, 2003.
Full version: [www], [ps]

Ueli Maurer, Stefan Wolf
Secret-key agreement over unauthenticated public channels - Part II: The simulatability condition
IEEE Transactions on Information Theory, 49(4):832-838, 2003.
Full version: [www], [ps]

Ueli Maurer, Stefan Wolf
Secret-key agreement over unauthenticated public channels - Part I: Definitions and a completeness result
IEEE Transactions on Information Theory, 49(4):822-831, 2003.
Full version: [www], [ps]

Renato Renner, Stefan Wolf
New bounds in secret-key agreement: the gap between formation and secrecy extraction
Advances in Cryptology - EUROCRYPT 2003, Lecture Notes in Computer Science, 2656:562-577, Springer-Verlag, 2003.
Full version: [www], [ps]

Viktor Galliard, Alain Tapp, Stefan Wolf
The impossibility of pseudo-telepathy without quantum entanglement
International Symposium on Information Theory (ISIT) 2003, 2003.
Full version: [www], [arXiv], [ps]

Renato Renner, Stefan Wolf
Towards characterizing the non-local information of entangled quantum states
International Symposium on Information Theory (ISIT) 2003, 2003.
Full version: [www], [ps], [ps]

Matthias Christandl, Renato Renner, Stefan Wolf
A property of the intrinsic mutual information
International Symposium on Information Theory (ISIT) 2003, 2003.
Full version: [www], [ps]

Renato Renner, Stefan Wolf
Unconditional authenticity and privacy from an arbitrarily weak secret
Advances in Cryptology - CRYPTO 2003, Lecture Notes in Computer Science, 2729:78-95, Springer-Verlag, 2003.
Full version: [www], [ps]

Renato Renner, Juraj Skripsky, Stefan Wolf
A new measure for conditional mutual information and its properties
International Symposium on Information Theory (ISIT) 2003, 2003.
Full version: [www], [ps]

Douglas Stebila, Stefan Wolf
Efficient oblivious transfer from any non-trivial binary-symmetric channel
International Symposium on Information Theory (ISIT) 2002, 2002.
Full version: [www], [ps]

Renato Renner, Stefan Wolf
Towards proving the existence of bound information
International Symposium on Information Theory (ISIT) 2002, 2002.
Full version: [www], [ps]

Viktor Galliard, Stefan Wolf
Pseudo-telepathy, entanglement, and graph colorings
International Symposium on Information Theory (ISIT) 2002, 2002.
Full version: [www], [ps]

Nicolas Gisin, Renato Renner, Stefan Wolf
Linking classical and quantum key agreement: is there a classical analog to bound entanglement?
Algorithmica, 34(4):389-412, Springer-Verlag, 2002.
Full version: [www], [ps]

Ueli Maurer, Stefan Wolf
Information-theoretic key agreement: from weak to strong secrecy for free
Advances in Cryptology - EUROCRYPT 2000, Lecture Notes in Computer Science, 1807:351-368, Springer-Verlag, 2000.
Full version: [www], [ps]

Ueli Maurer, Stefan Wolf
From weak to strong secrecy in information-theoretic key agreement
International Symposium on Information Theory (ISIT) 2000, 2000.
Full version: [www], [ps]

Ueli Maurer, Stefan Wolf
The Diffie-Hellman protocol
Designs, Codes and Cryptography, 19(2/3):147-171, 2000.
Full version: [www], [ps]

Nicolas Gisin, Stefan Wolf
Linking classical and quantum key agreement: is there bound information?
Advances in Cryptology - CRYPTO 2000, Lecture Notes in Computer Science, 1880:482-500, Springer-Verlag, 2000.
Full version: [www], [ps]

Stefan Wolf
Reducing string oblivious transfer to universal oblivious transfer
International Symposium on Information Theory (ISIT) 2000, 2000.
Full version: [www], [ps]

Nicolas Gisin, Renato Renner, Stefan Wolf
Bound information: the classical analog to bound entanglement
European Congress of Mathematics, Progress in Mathematics, 202:439-447, Birkhäuser Verlag, 2000.
Full version: [www], [ps]

Stefan Wolf
A simple and efficiently verifiable characterization of the possibility of information-theoretic key agreement secure against active adversaries
International Symposium on Information Theory (ISIT) 2000, 2000.
Full version: [www], [ps]

Ueli Maurer, Stefan Wolf
The relationship between breaking the Diffie-Hellman protocol and computing discrete logarithms
SIAM Journal on Computing, 28(5):1689-1721, 1999.
Full version: [www], [ps]

Stefan Wolf
Information-theoretically and computationally secure key agreement in cryptography
ETH dissertation No. 13138, ETH Zurich, 1999.
Full version: [www], [ps]

Anna Lysyanskaya, Ronald Rivest, Amit Sahai, Stefan Wolf
Pseudonym systems
Selected Areas in Cryptography, Lecture Notes in Computer Science, 1758:184-199, Springer-Verlag, 1999.
Full version: [www], [ps]

Stefan Wolf
Unconditional security in cryptography
Lectures on Data Security, Lecture Notes in Computer Science, 1561:217-250, Springer-Verlag, 1999.
Full version: [www], [ps]

Nicolas Gisin, Stefan Wolf
Quantum cryptography on noisy channels: quantum versus classical key-agreement protocols
Physical Review Letters, 83(20):4200-4203, 1999.
Full version: [www], [ps]

Ueli Maurer, Stefan Wolf
Unconditionally secure key agreement and the intrinsic conditional information
IEEE Transactions on Information Theory, 45(2):499-514, 1999.
Full version: [www], [ps]

Ueli Maurer, Stefan Wolf
On the hardness of the Diffie-Hellman decision problem
manuscript, ETH Zurich, 1998.
Full version: [ps]

Ueli Maurer, Stefan Wolf
Lower bounds on generic algorithms in groups
Advances in Cryptology - EUROCRYPT '98, Lecture Notes in Computer Science, 1403:72-84, Springer-Verlag, 1998.
Full version: [www], [ps]

Stefan Wolf
Strong security against active attacks in information-theoretic secret-key agreement
Advances in Cryptology - ASIACRYPT '98, Lecture Notes in Computer Science, 1514:405-419, Springer-Verlag, 1998.
Full version: [www], [ps]

Ueli Maurer, Stefan Wolf
Diffie-Hellman, decision Diffie-Hellman, and discrete logarithms
International Symposium on Information Theory (ISIT) 1998, 1998.
Full version: [www], [ps]

Ueli Maurer, Stefan Wolf
The intrinsic conditional mutual information and perfect secrecy
International Symposium on Information Theory (ISIT) 1997, 1997.
Full version: [www], [ps]

Ueli Maurer, Stefan Wolf
Unconditionally secure secret-key agreement and the intrinsic conditional mutual information
Tech. Rep. 268, Department of Computer Science, ETH Zurich, May, 1997.

Ueli Maurer, Stefan Wolf
Privacy amplification secure against active adversaries
Advances in Cryptology - CRYPTO '97, Lecture Notes in Computer Science, 1294:307-321, Springer-Verlag, 1997.
Full version: [www], [ps]

Ueli Maurer, Stefan Wolf
On the complexity of breaking the Diffie-Hellman protocol
Tech. Rep. 244, Department of Computer Science, ETH Zurich, April, 1996.
Full version: [ps]

Ueli Maurer, Stefan Wolf
Diffie-Hellman oracles
Advances in Cryptology - CRYPTO '96, Lecture Notes in Computer Science, 1109:268-282, Springer-Verlag, 1996.
Full version: [www], [ps]

Ueli Maurer, Stefan Wolf
Towards characterizing when information-theoretic secret key agreement is possible
Advances in Cryptology - ASIACRYPT '96, Lecture Notes in Computer Science, 1163:196-209, Springer-Verlag, 1996.
Full version: [www], [ps]

Stefan Wolf
Diffie-Hellman and discrete logarithms
Diploma Thesis, ETH Zurich, May, 1995.