A bibtex file can be downloaded here.

Alberto Montina, Stefan Wolf
Violation of Leggett-Garg Inequalities Implies Information Erasure
submitted to IEEE International Symposium on Information Theory, 2024.
Full version: [pdf]

Xavier Coiteux-Roy, Stefan Wolf
Quantum Key Distribution without `Quantum'
submitted to IEEE International Symposium on Information Theory, 2024.
Full version: [pdf]

Lorenzo Laneve
Quantum signal processing over SU(N): exponential speed-up for polynomial transformations under Shor-like assumptions
2023
Full version: [arXiv]

Charles Alexandre Bédard, Sophie Bertelette, Xavier Coiteux-Roy, Stefan Wolf
Temperature as Joule per Bit
2023
Full version: [arXiv]

Ravi Kunjwal, Ämin Baumeler
Trading causal order for locality
Physical Review Letters 131, 120201, 2023.
Full version: [www], [arXiv]

Eleftherios-Ermis Tselentis, Ämin Baumeler
Admissible causal structures and correlations
Physical Review X Quantum 4, 040307, 2023.
Full version: [www], [arXiv]

Eleftherios-Ermis Tselentis, Ämin Baumeler
The Möbius game and other Bell tests for relativity
2023
Full version: [arXiv]

Alberto Montina, Stefan Wolf
Realism and causality imply information erasure by measurements
2023
Full version: [arXiv]

Lorenzo Laneve
Robust oracle quantum-state preparation via quantum signal processing
2023
Full version: [arXiv]

Charles Alexandre Bédard
Teleportation Revealed
Quantum Reports, 5(2), 510-525, 2023.
Full version: [www], [arXiv]

Lorenzo Laneve
Quantum Signal Processing, Phase Extraction, and Proportional Sampling
2023
Full version: [arXiv]

Lorenzo Laneve, Francesco Tacchino, Ivano Tavernelli
On Hitting Times for General Quantum Markov Processes
Quantum 7, 1056, 2023.
Full version: [www], [arXiv]

Cecilia Boschini, Akira Takahashi, Mehdi Tibouchi
On Access Control Encryption without Sanitization
Proceedings of CRYPTO 2022, 2022.
Full version: [arXiv]

Cecilia Boschini, Ivan Damgard, Claudio Orlandi
On Access Control Encryption without Sanitization
Proceedings of SCN 2022, 2022.
Full version: [arXiv]

Alberto Montina, Stefan Wolf
An Algebraic-Geometry Approach to Prime Factorization
submitted to Journal of Cryptology, 2022.
Full version: [arXiv]

Charles Alexandre Bédard, Geoffroy Bergeron
An Algorithmic Approach to Emergence
Entropy, 2022.
Full version: [www], [arXiv]

Xavier Coiteux-Roy, Stefan Wolf
Unconditional Proofs-of-Work and Other Possibilities of Thermodynamic Cryptography
Proceedings of Information Theory Workshop (ITW), 2022.
Full version: [www]

Ämin Baumeler, Carla Rieger, Stefan Wolf
Thermodynamics as combinatorics: A toy model
Proceedings of Information Theory Workshop (ITW), 2022.
Full version: [arXiv]

Veronika Baumann, Marius Krumm, Philippe Allard Guérin, Časlav Brukner
Noncausal Page-Wootters circuits
Phys. Rev. Research 4, 013180, 2022.
Full version: [www], [arXiv]

Alberto Montina, Stefan Wolf
Generalized Gleason theorem, finite amount of information for the context and causality
Physical Review A, 2022.
Full version: [www], [arXiv]

Xavier Coiteux-Roy, Stefan Wolf
Key Agreement and Oblivious Transfer from Free-Energy Limitations
2022
Full version: [arXiv]

Cecilia Boschini, Dario Fiore, Elena Pagnin
Progressive and Efficient Verification for Digital Signatures
Proceedings of ACNS 2022, 2022.
Full version: [www]

Huan Cao, Marc-Olivier Renou, Chao Zhang, Gaäl Massé, Xavier Coiteux-Roy, Bi-Heng Liu, Yun-Feng Huang, Chuan-Feng Li, Guang-Can Guo, Elie Wolfe
Experimental Demonstration that No Tripartite-Nonlocal Causal Theory Explains Nature's Correlations
Phys. Rev. Lett. 129, 150402, 2022.
Full version: [www], [arXiv]

Cecilia Boschini, Arne Hansen, Stefan Wolf
Discrete Mathematics
Verlag der Fachvereine (VdF), Zurich, 2022.

Bart van der Vecht, Xavier Coiteux-Roy, Boris Skoric
Can't Touch This: unconditional tamper evidence from short keys
Quantum Information and Computation, 2022.
Full version: [arXiv]

Philippe Allard Guérin, Veronika Baumann, Flavio Del Santo, Časlav Brukner
A no-go theorem for the persistent reality of Wigner's friend's perception
Communications Physics volume 4, 93, 2021.
Full version: [www]

Veronika Baumann, Flavio Del Santo, Alexander R. H. Smith, Flaminia Giacomini, Esteban Castro-Ruiz, Časlav Brukner
Generalized probability rules from a timeless formulation of Wigner's friend scenarios
Quantum 5, 524, 2021.
Full version: [www], [arXiv]

Xavier Coiteux-Roy, Marc-Olivier Renou, Elie Wolfe
No bipartite-nonlocal causal theory can explain nature's correlations
Physical Review Letters, 127(20):200401, 2021.
Full version: [www], [arXiv]

Xavier Coiteux-Roy, Marc-Olivier Renou, Elie Wolfe
Any physical theory of nature must be boundlessly multipartite nonlocal
Physical Review A, 104(05):052207, 2021.
Full version: [www], [arXiv]

Charles Alexandre Bédard
The cost of quantum locality
Proceedings of the Royal Society A, 477(2246), 20200602, 2021.
Full version: [www], [arXiv]

Charles Alexandre Bédard
The ABC of Deutsch-Hayden Descriptors
Quantum Reports, 2021.
Full version: [www], [arXiv]

Cecilia Boschini, Jan Camenisch, Max Ovsiankin, Nicholas Spooner
Efficient Post-quantum SNARKs for RSIS and RLWE and Their Applications to Privacy
Proceedings of PQCrypto 2020, 2020.
Full version: [www]

Xavier Coiteux-Roy, Stefan Wolf
On the advantage of irreversible processes in single-system games
Proceedings of International Symposium on Information Theory (ISIT) 2020, 2020.
Full version: [www], [arXiv]

Ulla Aeschbacher, Arne Hansen, Stefan Wolf
Invitation to quantum informatics
Verlag der Fachvereine (VdF), Zurich, 2020.
Full version: [www]

Arne Hansen, Stefan Wolf
Wigner's isolated friend
2019
Full version: [arXiv]

Ämin Baumeler, Stefan Wolf
The free energy of a general computation
Physical Review E, 2019.
Full version: [www]

Arne Hansen, Stefan Wolf
Measuring measuring
2019
Full version: [arXiv]

Ämin Baumeler, Fabio Costa, Timothy Ralph, Stefan Wolf, Magdalena Zych
Reversible time travel with freedom of choice
Classical and Quantum Gravity, 2019.
Full version: [www], [arXiv]

Arne Hansen, Stefan Wolf
No master (key) No (measurement) problem
2019
Full version: [arXiv]

Veronika Baumann, Časlav Brukner
Wigner's friend as a rational agent
Quantum, Probability, Logic 91-99, 2020.
Full version: [www], [arXiv]

Veronika Baumann, Flavio Del Santo, Časlav Brukner
Comment on Healey's 'quantum theory and the limits of objectivity'
Foundations of Physics volume 49, 741-749, 2019.
Full version: [www], [arXiv]

Xavier Coiteux-Roy, Claude Crépeau
The RGB no-signalling game
Proceedings of The 14th Conference on the Theory of Quantum Computation, Communication, and Cryptography (TQC) 2019, 2019.
Full version: [www], [arXiv]

Arne Hansen, Stefan Wolf
Contextuality: It's a feature, not a bug
2019
Full version: [arXiv]

Xavier Coiteux-Roy, Stefan Wolf
Proving erasure
Proceedings of International Symposium on Information Theory (ISIT) 2019, 2019.
Full version: [www], [arXiv]

Alberto Montina, Stefan Wolf
Discrimination of non-local correlations
Entropy, 2019.
Full version: [www], [arXiv]

Arne Hansen, Stefan Wolf
The measurement problem is the "measurement" problem
2018
Full version: [arXiv]

Stefan Wolf
Second thoughts on the second law
Adventures Between Lower Bounds and Higher Altitudes, Lecture Notes in Computer Science, LNCS 11011, 2018.
Full version: [arXiv]

Paul Erker
Physics and information
Doctoral Dissertation, 2019.
Full version: [pdf]

Cecilia Boschini, Jan Camenisch, Gregory Neven
Relaxed lattice-based signatures with short zero-knowledge proofs
Proceedings of International Conference on Information Security, 2018.
Full version: [www], [www]

Cecilia Boschini, Jan Camenisch, Gregory Neven
Floppy-sized group signatures from lattices
Proceedings of International Conference on Applied Cryptography and Network Security, 2018.
Full version: [www], [www]

Jessica Bavaresco, Natalia Herrera Valencia, Claude Klöckl, Matej Pivoluska, Paul Erker, Nicolai Friis, Mehul Malik, Markus Huber
Measurements in two bases are sufficient for certifying high-dimensional entanglement
Nature Physics, 2018.
Full version: [www]

Ämin Baumeler, Julien Degorre, Stefan Wolf
Bell correlations and the common future
Quantum Foundations, Probability and Information, 255-268, Springer-Verlag, 2018.
Full version: [www]

Veronika Baumann, Stefan Wolf
On formalisms and interpretations
Quantum 2, 99, 2018.
Full version: [www], [arXiv]

Ämin Baumeler, Stefan Wolf
Computational tameness of classical non-causal models
Proceedings of the Royal Society A, 474(2209):20170698, 2018.
Full version: [www], [arXiv]

Ämin Baumeler, Stefan Wolf
Causality — Complexity — Consistency: Can space-time be based on logic and computation?
Proceedings of Time in Physics, 69-101, Birkhäuser Verlag, 2017.
Full version: [www], [arXiv]

Mateus Araújo, Philippe Allard Guérin, Ämin Baumeler
Quantum computation with indefinite causal structures
Physical Review A, 96(5):052315, 2017.
Full version: [www], [arXiv]

Paul Erker, Mario Krenn, Marcus Huber
Quantifying high dimensional entanglement with two mutually unbiased bases
Quantum 1, 22, 2017.
Full version: [www], [arXiv]

Paul Erker, Mark T. Mitchison, Ralph Silva, Mischa P. Woods, Nicolas Brunner, Marcus Huber
Autonomous quantum clocks: how thermodynamics limits our ability to measure time
Physical Review X, 7:031022, 2017.
Full version: [www], [arXiv]

Ämin Baumeler, Stefan Wolf
Non-causal computation
Entropy, 19(7):326, 2017.
Full version: [www], [arXiv]

Ämin Baumeler, Charles Alexandre Bédard, Gilles Brassard, Stefan Wolf
Kolmogorov amplification from Bell correlation
Proceedings of International Symposium on Information Theory (ISIT) 2017, 2017.
Full version: [pdf]

Ämin Baumeler
Causal loops — logically consistent correlations, time travel, and computation
Doctoral Dissertation, 2017.
Full version: [pdf]

Stefan Wolf
Landauer's erasure principle and data compression
2017
Full version: [pdf]

Stefan Wolf
An all-or-nothing flavor to the Church-Turing hypothesis
Proceedings of 14th Annual Conference on Theory and Applications of Models of Computation (TAMC), 2017.
Full version: [arXiv], [pdf]

Veronika Baumann, Arne Hansen, Stefan Wolf
The measurement problem is the measurement problem is the measurement problem
arXiv:1611.01111 [quant-ph], 2016.
Full version: [arXiv]

Sacha Schwarz, André Stefanov, Stefan Wolf, Alberto Montina
Optimal measurements for nonlocal correlations
Physical Review A, 94(2):022322, 2016.
Full version: [www], [arXiv]

Benno Salwey, Stefan Wolf
Stronger attacks on causality-based key agreement
International Symposium on Information Theory (ISIT) 2016, 2016.
Full version: [www], [arXiv], [pdf]

Ali Asadian, Paul Erker, Marcus Huber, Claude Klöckl
Heisenberg-Weyl observables: Bloch vectors in phase space
Physical Review A, 94(1):010301(R), 2016.
Full version: [www], [arXiv]

Veronika Baumann, Časlav Brukner
Appearance of causality in process matrices when performing fixed-basis measurements for two parties
Physical Review A, 93(6):062324, 2016.
Full version: [www], [arXiv]

Arne Hansen, Alberto Montina, Stefan Wolf
Simple algorithm for computing the communication complexity of quantum communication processes
Physical Review A, 93(4):042315, 2016.
Full version: [www], [arXiv]

Ämin Baumeler, Stefan Wolf
Device-independent test of causal order and relations to fixed-points
New Journal of Physics, 18(3):035014, 2016.
Full version: [www], [arXiv]

Alberto Montina, Stefan Wolf
Information-based measure of nonlocality
New Journal of Physics, 18(1):013035, 2016.
Full version: [www], [arXiv]

Ämin Baumeler, Stefan Wolf
The space of logically consistent classical processes without causal order
New Journal of Physics, 18(1):013036, 2016.
Full version: [www], [arXiv]

Stefan Wolf
On bits as fuel
Unpublished, 2016.
Full version: [pdf]

Stefan Wolf
Non-locality without counterfactual reasoning
Physical Review A, 92(5):052102, 2015.
Full version: [www], [arXiv], [pdf]

Paul Erker
The quantum hourglass
Master Thesis ETH, 2015.
Full version: [www], [pdf]

Paul Erker
How not to Rényi-generalize the quantum conditional mutual information
Journal of Physics A: Mathematical and Theoretical, 48(27):275303, 2015.
Full version: [www], [arXiv]

Benno Salwey
No-signalling attacks and implications for (quantum) nonlocality distillation
Doctoral Dissertation, 2015.
Full version: [pdf]

Gilles Brassard, Benno Salwey, Stefan Wolf
Non-locality distillation as cryptographic game
ITW-IEEE Information Theory Workshop, Jerusalem, 1-5, 2015.
Full version: [www], [pdf]

Alberto Montina
Communication complexity and the reality of the wave-function
Modern Physics Letters A, 30(1):1530001, 2015.
Full version: [www], [arXiv]

Ämin Baumeler, Anne Broadbent
Quantum private information retrieval has linear communication complexity
Journal of Cryptology, 28(1):161-175, 2015.
Full version: [www], [arXiv]

Ämin Baumeler, Adrien Feix, Stefan Wolf
Maximal incompatibility of locally classical behavior and global causal order in multiparty scenarios
Physical Review A, 90(4):042106, 2014.
Full version: [www], [arXiv]

Christof Bernhard, Bänz Bessire, Alberto Montina, Marcel Pfaffhauser, André Stefanov, Stefan Wolf
Non-locality of experimental qutrit pairs
Journal of Physics A: Mathematical and Theoretical, Special issue on 50 Years of Bell's Theorem, 47(42):424013, 2014.
Full version: [www], [arXiv]

Alberto Montina, Stefan Wolf
Necessary and sufficient optimality conditions for classical simulations of quantum communication processes
Physical Review A, 90(1):012309, 2014.
Full version: [www], [arXiv]

Jibran Rashid, Abuzer Yakaryιlmaz
Implications of quantum automata for contextuality
19th International Conference on Implementation and Application of Automata, 2014.
Full version: [www], [arXiv]

Alberto Montina, Stefan Wolf
Lower bounds on the communication complexity of two-party (quantum) processes
International Symposium on Information Theory (ISIT) 2014, 1484-1488, 2014.
Full version: [www], [arXiv]

Helen Ebbe, Stefan Wolf
Trading permutation invariance for communication in multi-party non-locality distillation
International Symposium on Information Theory (ISIT) 2014, 1479-1483, 2014.
Full version: [www], [arXiv]

Ämin Baumeler, Stefan Wolf
Perfect signaling among three parties violating predefined causal order
International Symposium on Information Theory (ISIT) 2014, 526-530, 2014.
Full version: [www], [arXiv]

Helen Ebbe, Stefan Wolf
Multi-user non-locality amplification
IEEE Transactions on Information Theory, 60(2):1159-1167, 2014.
Full version: [www], [arXiv]

Alberto Montina, Marcel Pfaffhauser, Stefan Wolf
Communication complexity of channels in general probabilistic theories
Physical Review Letters, 111(16):160502, 2013.
Full version: [www], [arXiv]

Miguel Onorato, Stefania Residori, Umberto Bortolozzo, Alberto Montina, Fortunato Tito Arecchi
Rogue waves and their generating mechanisms in different physical contexts
Physics Reports, 528(2):47-89, 2013.
Full version: [www]

Peter Høyer, Jibran Rashid
Quantum nonlocal boxes exhibit stronger distillability
Modern Physics Letters A, 28(17):1330012, 2013.
Full version: [www], [arXiv]

Helen Ebbe
Aspects and consequences of multi-party non-locality
Master Thesis ETH, 2013.
Full version: [pdf]

Ämin Baumeler, Anne Broadbent
Quantum private information retrieval has linear communication complexity
QCrypt 2013, 2013.
Full version: [arXiv], [pdf], [slides], [video]

Helen Ebbe, Stefan Wolf
Distillation of multi-party non-locality with and without partial communication
International Symposium on Information Theory (ISIT) 2013, 739-743, 2013.
Full version: [www], [arXiv], [slides]

Alberto Montina, Marcel Pfaffhauser, Stefan Wolf
The classical-communication rate of quantum resources
International Symposium on Information Theory (ISIT) 2013, 744-748, 2013.
Full version: [www], [pdf]

Alberto Montina
Exponential communication gap between weak and strong classical simulations of quantum communication
Physical Review A, 87(4):042331, 2013.
Full version: [www], [arXiv]

Martin Schüle, Ruedi Stoop
A full computation-relevant topological dynamics classification of elementary cellular automata
Chaos, 22(4):43143, 2013.
Full version: [www], [arXiv]

Renato Renner, Stefan Wolf
Towards characterizing the non-locality of entangled quantum states
Theoretical Computer Science, 486:50-60, Elsevier, 2013.
Full version: [www], [arXiv], [pdf]

Esther Hänggi, Renato Renner, Stefan Wolf
The impossibility of non-signaling privacy amplification
Theoretical Computer Science, 486:27-42, Elsevier, 2013.
Full version: [www], [arXiv]

Nicolas Gisin, Sandu Popescu, Valerio Scarani, Stefan Wolf, Jürg Wullschleger
Oblivious transfer and quantum channels as communication resources
Natural Computation, 12(1):13-17, 2013.
Full version: [www], [ps]

Gilles Brassard, Anne Broadbent, Esther Hänggi, André Méthot, Stefan Wolf
Classical, quantum and non-signalling resources in bipartite games
Theoretical Computer Science, 486:61-72, Elsevier, 2013.
Full version: [www]

Viktor Galliard, Alain Tapp, Stefan Wolf
Deterministic quantum non-locality and graph colorings
Theoretical Computer Science, 486:20-26, Elsevier, 2013.
Full version: [www], [pdf]

Renato Renner, Stefan Wolf
Ernst Specker and the hidden variables
Elemente der Mathematik, 67(3):122-133, 2012.
Full version: [www], [pdf]

Adarsh Amirtham
The quest for three-partite marginal quantum non-locality and a link to contextuality
Master Thesis ETH, 2012.
Full version: [www], [pdf], [files]

Manuel Forster, Stefan Wolf
Bipartite units of nonlocality
Physical Review A, 84(4):042112, 2011.
Full version: [www]

Severin Winkler, Jürg Wullschleger, Stefan Wolf
Bit commitment from non-signaling correlations
IEEE Transactions on Information Theory, 57(3):1770-1779, 2011.
Full version: [www], [arXiv]

Ivana Černá, Tibor Gyimóthy, Juraj Hromkovič, Keith G. Jeffery, Rastislav Králović, Marko Vukolić, Stefan Wolf
SOFSEM 2011: Theory and practice of computer science
Lecture Notes in Computer Science, 6543, Springer-Verlag, 2011.
Full version: [www]

Sandro Coretti, Esther Hänggi, Stefan Wolf
Non-locality is transitive
Physical Review Letters, 107(10):100402, 2011.
Full version: [www]

Esther Hänggi, Renato Renner, Stefan Wolf
Efficient device-independent quantum cryptography
Advances in Cryptology - EUROCRYPT 2010, Lecture Notes in Computer Science, 6110:216-234, Springer-Verlag, 2010.
Full version: [www], [arXiv]

Matthias Fitzi, Esther Hänggi, Valerio Scarani, Stefan Wolf
The non-locality of n noisy Popescu-Rohrlich boxes
Journal of Physics A, Mathematical and Theoretical, 43(46):465305, 2010.
Full version: [www]

Dejan Dukaric, Manuel Forster, Severin Winkler, Stefan Wolf
On nonlocality distillation
QIP 2009, 2009.
Full version: [slides]

Manuel Forster, Severin Winkler, Stefan Wolf
Distilling nonlocality
Physical Review Letters, 102(12):120401, 2009.
Full version: [www]

Renato Renner, Stefan Wolf, Jürg Wullschleger
Trade-offs in information-theoretic multi-party one-way key agreement
Information Theoretic Security. Lecture Notes in Computer Science, 4883:65-75, Springer-Verlag, 2009.
Full version: [www], [ps]

Gilles Brassard, Anne Broadbent, Esther Hänggi, André Méthot, Stefan Wolf
Classical, quantum and non-signalling resources in bipartite games
Second International Conference on Quantum, Nano and Micro Technologies (ICQNM), 2008.
Full version: [www], [pdf]

Stefan Wolf, Jürg Wullschleger
New monotones and lower bounds in unconditional two-party computation
IEEE Transactions on Information Theory, 54(6):2792-2797, 2008.
Full version: [www], [pdf]

Manuel Forster, Stefan Wolf
The universality of nonlocal boxes
Ninth International Conference on Quantum Communication, Measurement and Computing (QCMC), 2008.
Full version: [www]

Hugues Mercier, Pierre McKenzie, Stefan Wolf, Vijay K. Bhargava
Worst-case nonzero-error interactive communication
IEEE Transactions on Information Theory, 54(7):2857-2867, 2008.
Full version: [www], [pdf]

Matthias Fitzi, Esther Hänggi, Valerio Scarani, Stefan Wolf
How non-local are n noisy Popescu-Rohrlich machines?
Ninth International Conference on Quantum Communication, Measurement and Computing (QCMC), 2008.
Full version: [www], [pdf], [arXiv]

Dejan Dukaric, Stefan Wolf
A limit on non-locality distillation
arXiv:0808.3317 [quant-ph], 2008.
Full version: [arXiv]

Ueli Maurer, Renato Renner, Stefan Wolf
Unbreakable keys from random noise
Security with Noisy Data, 21-44, Springer-Verlag, 2007.
Full version: [www], [ps]

Matthias Fitzi, Jesper Buus Nielsen, Stefan Wolf
How to share a key
45th Annual Allerton Conference on Communication, Control, and Computing, 23-25, 2007.
Full version: [pdf]

Stefan Wolf, Jürg Wullschleger
Unconditionally secure multi-party computation from weak primitives
Security with Noisy Data, 127-139, Springer-Verlag, 2007.
Full version: [www], [pdf]

Stefan Wolf, Jürg Wullschleger
Oblivious transfer is symmetric
Advances in Cryptology - EUROCRYPT 2006, Lecture Notes in Computer Science, 4004:222-232, Springer-Verlag, 2006.
Full version: [www], [www], [pdf]

Mathias Fitzi, Stefan Wolf, Jürg Wullschleger
On the power of imperfect broadcast
International Symposium on Information Theory (ISIT) 2006, 2006.
Full version: [www], [ps]

Renato Renner, Stefan Wolf, Jürg Wullschleger
The single-serving channel capacity
International Symposium on Information Theory (ISIT) 2006, 2006.
Full version: [www], [pdf]

Nicolas Gisin, Sandu Popescu, Valerio Scarani, Stefan Wolf, Jürg Wullschleger
Oblivious transfer and quantum channels
IEEE Information Theory Workshop (ITW) 2006, 2006.
Full version: [www], [arXiv]

Stefan Wolf, Jürg Wullschleger
New monotones and lower bounds in unconditional two-party computation
Advances in Cryptology - CRYPTO 2005, Lecture Notes in Computer Science, 3621:467-477, Springer-Verlag, 2005.
Full version: [www], [ps]

Stefan Wolf, Jürg Wullschleger
Oblivious transfer and quantum non-locality
International Symposium on Information Theory (ISIT) 2005, 2005.
Full version: [www], [arXiv], [pdf]

Renato Renner, Stefan Wolf
Simple and tight bounds for information reconciliation and privacy amplification
Advances in Cryptology - ASIACRYPT 2005, Lecture Notes in Computer Science, 3788:199-216, Springer-Verlag, 2005.
Full version: [www], [pdf]

Stefan Wolf, Jürg Wullschleger
Bit commitment from weak non-locality
IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security 2005, 2005.
Full version: [www], [arXiv], [pdf]

Claude Crepeau, Kirill Morozov, Stefan Wolf
Efficient unconditional oblivious transfer from almost any noisy channel
Security in Communication Networks, Lecture Notes in Computer Science, 3352:47-59, Springer-Verlag, 2005.
Full version: [www], [ps]

Renato Renner, Stefan Wolf
Quantum pseudo-telepathy and the Kochen-Specker theorem
International Symposium on Information Theory (ISIT) 2004, 2004.
Full version: [www], [ps], [ps]

Renato Renner, Stefan Wolf
Smooth Renyi entropy and applications
International Symposium on Information Theory (ISIT) 2004, 2004.
Full version: [www], [ps]

Renato Renner, Stefan Wolf
The exact price for unconditionally secure asymmetric cryptography
Advances in Cryptology - EUROCRYPT 2004, Lecture Notes in Computer Science, 3027:109-125, Springer-Verlag, 2004.
Full version: [www], [ps]

Matthias Fitzi, Stefan Wolf, Jürg Wullschleger
Pseudo-signatures, broadcast, and multi-party computation from correlated randomness
Advances in Cryptology - EUROCRYPT 2004, Lecture Notes in Computer Science, 3027:562-578, Springer-Verlag, 2004.
Full version: [www], [pdf]

Stefan Wolf, Jürg Wullschleger
Zero-error information and applications in cryptography
IEEE Information Theory Workshop (ITW) 2004, 2004.
Full version: [www], [pdf]

Gilles Brassard, Claude Crepeau, Stefan Wolf
Oblivious transfers and privacy amplification
Journal of Cryptology, 16(4):219-237, Springer-Verlag, 2003.
Full version: [www], [pdf]

Ueli Maurer, Stefan Wolf
Secret-key agreement over unauthenticated public channels - Part III: Privacy amplification
IEEE Transactions on Information Theory, 49(4):839-851, 2003.
Full version: [www], [ps]

Ueli Maurer, Stefan Wolf
Secret-key agreement over unauthenticated public channels - Part II: The simulatability condition
IEEE Transactions on Information Theory, 49(4):832-838, 2003.
Full version: [www], [ps]

Ueli Maurer, Stefan Wolf
Secret-key agreement over unauthenticated public channels - Part I: Definitions and a completeness result
IEEE Transactions on Information Theory, 49(4):822-831, 2003.
Full version: [www], [ps]

Renato Renner, Stefan Wolf
New bounds in secret-key agreement: the gap between formation and secrecy extraction
Advances in Cryptology - EUROCRYPT 2003, Lecture Notes in Computer Science, 2656:562-577, Springer-Verlag, 2003.
Full version: [www], [ps]

Viktor Galliard, Alain Tapp, Stefan Wolf
The impossibility of pseudo-telepathy without quantum entanglement
International Symposium on Information Theory (ISIT) 2003, 2003.
Full version: [www], [arXiv], [ps]

Renato Renner, Stefan Wolf
Towards characterizing the non-local information of entangled quantum states
International Symposium on Information Theory (ISIT) 2003, 2003.
Full version: [www], [ps], [ps]

Matthias Christandl, Renato Renner, Stefan Wolf
A property of the intrinsic mutual information
International Symposium on Information Theory (ISIT) 2003, 2003.
Full version: [www], [ps]

Renato Renner, Stefan Wolf
Unconditional authenticity and privacy from an arbitrarily weak secret
Advances in Cryptology - CRYPTO 2003, Lecture Notes in Computer Science, 2729:78-95, Springer-Verlag, 2003.
Full version: [www], [ps]

Renato Renner, Juraj Skripsky, Stefan Wolf
A new measure for conditional mutual information and its properties
International Symposium on Information Theory (ISIT) 2003, 2003.
Full version: [www], [ps]

Douglas Stebila, Stefan Wolf
Efficient oblivious transfer from any non-trivial binary-symmetric channel
International Symposium on Information Theory (ISIT) 2002, 2002.
Full version: [www], [ps]

Renato Renner, Stefan Wolf
Towards proving the existence of bound information
International Symposium on Information Theory (ISIT) 2002, 2002.
Full version: [www], [ps]

Viktor Galliard, Stefan Wolf
Pseudo-telepathy, entanglement, and graph colorings
International Symposium on Information Theory (ISIT) 2002, 2002.
Full version: [www], [ps]

Nicolas Gisin, Renato Renner, Stefan Wolf
Linking classical and quantum key agreement: is there a classical analog to bound entanglement?
Algorithmica, 34(4):389-412, Springer-Verlag, 2002.
Full version: [www], [ps]

Ueli Maurer, Stefan Wolf
Information-theoretic key agreement: from weak to strong secrecy for free
Advances in Cryptology - EUROCRYPT 2000, Lecture Notes in Computer Science, 1807:351-368, Springer-Verlag, 2000.
Full version: [www], [ps]

Ueli Maurer, Stefan Wolf
From weak to strong secrecy in information-theoretic key agreement
International Symposium on Information Theory (ISIT) 2000, 2000.
Full version: [www], [ps]

Ueli Maurer, Stefan Wolf
The Diffie-Hellman protocol
Designs, Codes and Cryptography, 19(2/3):147-171, 2000.
Full version: [www], [ps]

Nicolas Gisin, Stefan Wolf
Linking classical and quantum key agreement: is there bound information?
Advances in Cryptology - CRYPTO 2000, Lecture Notes in Computer Science, 1880:482-500, Springer-Verlag, 2000.
Full version: [www], [ps]

Stefan Wolf
Reducing string oblivious transfer to universal oblivious transfer
International Symposium on Information Theory (ISIT) 2000, 2000.
Full version: [www], [ps]

Nicolas Gisin, Renato Renner, Stefan Wolf
Bound information: the classical analog to bound entanglement
European Congress of Mathematics, Progress in Mathematics, 202:439-447, Birkhäuser Verlag, 2000.
Full version: [www], [ps]

Stefan Wolf
A simple and efficiently verifiable characterization of the possibility of information-theoretic key agreement secure against active adversaries
International Symposium on Information Theory (ISIT) 2000, 2000.
Full version: [www], [ps]

Ueli Maurer, Stefan Wolf
The relationship between breaking the Diffie-Hellman protocol and computing discrete logarithms
SIAM Journal on Computing, 28(5):1689-1721, 1999.
Full version: [www], [ps]

Stefan Wolf
Information-theoretically and computationally secure key agreement in cryptography
ETH dissertation No. 13138, ETH Zurich, 1999.
Full version: [www], [ps]

Anna Lysyanskaya, Ronald Rivest, Amit Sahai, Stefan Wolf
Pseudonym systems
Selected Areas in Cryptography, Lecture Notes in Computer Science, 1758:184-199, Springer-Verlag, 1999.
Full version: [www], [ps]

Stefan Wolf
Unconditional security in cryptography
Lectures on Data Security, Lecture Notes in Computer Science, 1561:217-250, Springer-Verlag, 1999.
Full version: [www], [ps]

Nicolas Gisin, Stefan Wolf
Quantum cryptography on noisy channels: quantum versus classical key-agreement protocols
Physical Review Letters, 83(20):4200-4203, 1999.
Full version: [www], [ps]

Ueli Maurer, Stefan Wolf
Unconditionally secure key agreement and the intrinsic conditional information
IEEE Transactions on Information Theory, 45(2):499-514, 1999.
Full version: [www], [ps]

Ueli Maurer, Stefan Wolf
On the hardness of the Diffie-Hellman decision problem
manuscript, ETH Zurich, 1998.
Full version: [ps]

Ueli Maurer, Stefan Wolf
Lower bounds on generic algorithms in groups
Advances in Cryptology - EUROCRYPT '98, Lecture Notes in Computer Science, 1403:72-84, Springer-Verlag, 1998.
Full version: [www], [ps]

Stefan Wolf
Strong security against active attacks in information-theoretic secret-key agreement
Advances in Cryptology - ASIACRYPT '98, Lecture Notes in Computer Science, 1514:405-419, Springer-Verlag, 1998.
Full version: [www], [ps]

Ueli Maurer, Stefan Wolf
Diffie-Hellman, decision Diffie-Hellman, and discrete logarithms
International Symposium on Information Theory (ISIT) 1998, 1998.
Full version: [www], [ps]

Ueli Maurer, Stefan Wolf
The intrinsic conditional mutual information and perfect secrecy
International Symposium on Information Theory (ISIT) 1997, 1997.
Full version: [www], [ps]

Ueli Maurer, Stefan Wolf
Unconditionally secure secret-key agreement and the intrinsic conditional mutual information
Tech. Rep. 268, Department of Computer Science, ETH Zurich, May, 1997.

Ueli Maurer, Stefan Wolf
Privacy amplification secure against active adversaries
Advances in Cryptology - CRYPTO '97, Lecture Notes in Computer Science, 1294:307-321, Springer-Verlag, 1997.
Full version: [www], [ps]

Ueli Maurer, Stefan Wolf
On the complexity of breaking the Diffie-Hellman protocol
Tech. Rep. 244, Department of Computer Science, ETH Zurich, April, 1996.
Full version: [ps]

Ueli Maurer, Stefan Wolf
Diffie-Hellman oracles
Advances in Cryptology - CRYPTO '96, Lecture Notes in Computer Science, 1109:268-282, Springer-Verlag, 1996.
Full version: [www], [ps]

Ueli Maurer, Stefan Wolf
Towards characterizing when information-theoretic secret key agreement is possible
Advances in Cryptology - ASIACRYPT '96, Lecture Notes in Computer Science, 1163:196-209, Springer-Verlag, 1996.
Full version: [www], [ps]

Stefan Wolf
Diffie-Hellman and discrete logarithms
Diploma Thesis, ETH Zurich, May, 1995.