A bibtex file can be downloaded
here.
Jessica Bavaresco, Ämin Baumeler, Yelena Guryanova, Costantino Budroni
Indefinite causal order in boxworld theories 2024Full version:
[arXiv]William Schober
Extended quantum circuit diagramssubmitted to
QIP 2025, 2024.Full version:
[arXiv]Ämin Baumeler, Stefan Wolf
Flow of dynamical causal structures with an application to correlations 2024Full version:
[arXiv]Eleftherios-Ermis Tselentis, Ämin Baumeler
The Möbius Game: A Quantum-Inspired Test of General Relativity 2024Full version:
[arXiv]Lorenzo Laneve, Stefan Wolf
On multivariate polynomials achievable with quantum signal processingsubmitted to
Quantum, 2024.Full version:
[arXiv]Charles Alexandre Bédard
The Local Account of Bell Nonlocality 2024Full version:
[arXiv]Alberto Montina, Stefan Wolf
Violation of Leggett-Garg Inequalities Implies Information ErasureProceedings of IEEE International Symposium on Information Theory (ISIT), 2024.Full version:
[www]Xavier Coiteux-Roy, Stefan Wolf
Quantum Key Distribution without 'Quantum'submitted to
IEEE International Symposium on Information Theory, 2024.Full version:
[pdf]Lorenzo Laneve
Quantum signal processing over SU(N) 2023Full version:
[arXiv]Charles Alexandre Bédard, Sophie Berthelette, Xavier Coiteux-Roy, Stefan Wolf
Temperature as Joules per Bitto appear in
American Journal of Physics, 2024.Full version:
[arXiv]Ravi Kunjwal, Ämin Baumeler
Trading causal order for localityPhysical Review Letters 131, 120201, 2023.Full version:
[www],
[arXiv]Eleftherios-Ermis Tselentis, Ämin Baumeler
Admissible causal structures and correlationsPhysical Review X Quantum 4, 040307, 2023.Full version:
[www],
[arXiv]Eleftherios-Ermis Tselentis, Ämin Baumeler
The Möbius game and other Bell tests for relativity 2023Full version:
[arXiv]Alberto Montina, Stefan Wolf
Realism and causality imply information erasure by measurementssubmitted to
Physical Review A, 2023.Full version:
[arXiv]Lorenzo Laneve
Robust oracle quantum-state preparation via quantum signal processing 2023Full version:
[arXiv]Charles Alexandre Bédard
Teleportation RevealedQuantum Reports, 5(2), 510-525, 2023.Full version:
[www],
[arXiv]Lorenzo Laneve
Quantum Signal Processing, Phase Extraction, and Proportional Sampling 2023Full version:
[arXiv]Lorenzo Laneve, Francesco Tacchino, Ivano Tavernelli
On Hitting Times for General Quantum Markov ProcessesQuantum 7, 1056, 2023.Full version:
[www],
[arXiv]Cecilia Boschini, Akira Takahashi, Mehdi Tibouchi
MuSig-L: Lattice-Based Multi-signature with Single-Round Online PhaseProceedings of CRYPTO 2022, 2022.Full version:
[www]Cecilia Boschini, Ivan Damgard, Claudio Orlandi
On Access Control Encryption without SanitizationProceedings of SCN 2022, 2022.Full version:
[www]Alberto Montina, Stefan Wolf
An Algebraic-Geometry Approach to Prime Factorizationsubmitted to
Journal of Cryptology, 2022.Full version:
[arXiv]Charles Alexandre Bédard, Geoffroy Bergeron
An Algorithmic Approach to Emergence Entropy, 2022.Full version:
[www],
[arXiv]Xavier Coiteux-Roy, Stefan Wolf
Unconditional Proofs-of-Work and Other Possibilities of Thermodynamic CryptographyProceedings of Information Theory Workshop (ITW), 2022.Full version:
[www]Ämin Baumeler, Carla Rieger, Stefan Wolf
Thermodynamics as combinatorics: A toy modelProceedings of Information Theory Workshop (ITW), 2022.Full version:
[arXiv]Veronika Baumann, Marius Krumm, Philippe Allard Guérin, Časlav Brukner
Noncausal Page-Wootters circuitsPhys. Rev. Research 4, 013180, 2022.Full version:
[www],
[arXiv]Alberto Montina, Stefan Wolf
Generalized Gleason theorem, finite amount of information for the context and causalityPhysical Review A, 2022.Full version:
[www],
[arXiv]Xavier Coiteux-Roy, Stefan Wolf
Key Agreement and Oblivious Transfer from Free-Energy Limitations 2022Full version:
[arXiv]Cecilia Boschini, Dario Fiore, Elena Pagnin
Progressive and Efficient Verification for Digital SignaturesProceedings of ACNS 2022, 2022.Full version:
[www]Huan Cao, Marc-Olivier Renou, Chao Zhang, Gaäl Massé, Xavier Coiteux-Roy, Bi-Heng Liu, Yun-Feng Huang, Chuan-Feng Li, Guang-Can Guo, Elie Wolfe
Experimental Demonstration that No Tripartite-Nonlocal Causal Theory Explains Nature's CorrelationsPhys. Rev. Lett. 129, 150402, 2022.Full version:
[www],
[arXiv]Cecilia Boschini, Arne Hansen, Stefan Wolf
Discrete Mathematics Verlag der Fachvereine (VdF), Zurich, 2022.Bart van der Vecht, Xavier Coiteux-Roy, Boris Skoric
Can't Touch This: unconditional tamper evidence from short keysQuantum Information and Computation, 2022.Full version:
[arXiv]Philippe Allard Guérin, Veronika Baumann, Flavio Del Santo, Časlav Brukner
A no-go theorem for the persistent reality of Wigner's friend's perceptionCommunications Physics volume 4, 93, 2021.Full version:
[www]Veronika Baumann, Flavio Del Santo, Alexander R. H. Smith, Flaminia Giacomini, Esteban Castro-Ruiz, Časlav Brukner
Generalized probability rules from a timeless formulation of Wigner's friend scenariosQuantum 5, 524, 2021.Full version:
[www],
[arXiv]Xavier Coiteux-Roy, Marc-Olivier Renou, Elie Wolfe
No bipartite-nonlocal causal theory can explain nature's correlationsPhysical Review Letters, 127(20):200401, 2021.Full version:
[www],
[arXiv]Xavier Coiteux-Roy, Marc-Olivier Renou, Elie Wolfe
Any physical theory of nature must be boundlessly multipartite nonlocalPhysical Review A, 104(05):052207, 2021.Full version:
[www],
[arXiv]Charles Alexandre Bédard
The cost of quantum localityProceedings of the Royal Society A, 477(2246), 20200602, 2021.Full version:
[www],
[arXiv]Charles Alexandre Bédard
The ABC of Deutsch-Hayden DescriptorsQuantum Reports, 2021.Full version:
[www],
[arXiv]Cecilia Boschini, Jan Camenisch, Max Ovsiankin, Nicholas Spooner
Efficient Post-quantum SNARKs for RSIS and RLWE and Their Applications to PrivacyProceedings of PQCrypto 2020, 2020.Full version:
[www]Xavier Coiteux-Roy, Stefan Wolf
On the advantage of irreversible processes in single-system gamesProceedings of International Symposium on Information Theory (ISIT) 2020, 2020.Full version:
[www],
[arXiv]Ulla Aeschbacher, Arne Hansen, Stefan Wolf
Invitation to quantum informaticsVerlag der Fachvereine (VdF), Zurich, 2020.Full version:
[www]Arne Hansen, Stefan Wolf
Wigner's isolated friend 2019Full version:
[arXiv]Ämin Baumeler, Stefan Wolf
The free energy of a general computationPhysical Review E, 2019.Full version:
[www]Arne Hansen, Stefan Wolf
Measuring measuring 2019Full version:
[arXiv]Ämin Baumeler, Fabio Costa, Timothy Ralph, Stefan Wolf, Magdalena Zych
Reversible time travel with freedom of choiceClassical and Quantum Gravity, 2019.Full version:
[www],
[arXiv]Arne Hansen, Stefan Wolf
No master (key) No (measurement) problem 2019Full version:
[arXiv]Veronika Baumann, Časlav Brukner
Wigner's friend as a rational agentQuantum, Probability, Logic 91-99, 2020.Full version:
[www],
[arXiv]Veronika Baumann, Flavio Del Santo, Časlav Brukner
Comment on Healey's 'quantum theory and the limits of objectivity'Foundations of Physics volume 49, 741-749, 2019.Full version:
[www],
[arXiv]Xavier Coiteux-Roy, Claude Crépeau
The RGB no-signalling gameProceedings of The 14th Conference on the Theory of Quantum Computation, Communication, and Cryptography (TQC) 2019, 2019.Full version:
[www],
[arXiv]Arne Hansen, Stefan Wolf
Contextuality: It's a feature, not a bug 2019Full version:
[arXiv]Xavier Coiteux-Roy, Stefan Wolf
Proving erasureProceedings of International Symposium on Information Theory (ISIT) 2019, 2019.Full version:
[www],
[arXiv]Alberto Montina, Stefan Wolf
Discrimination of non-local correlationsEntropy, 2019.Full version:
[www],
[arXiv]Arne Hansen, Stefan Wolf
The measurement problem is the "measurement" problem 2018Full version:
[arXiv]Stefan Wolf
Second thoughts on the second lawAdventures Between Lower Bounds and Higher Altitudes, Lecture Notes in Computer Science, LNCS 11011, 2018.Full version:
[arXiv]Paul Erker
Physics and information Doctoral Dissertation, 2019.Full version:
[pdf]Cecilia Boschini, Jan Camenisch, Gregory Neven
Relaxed lattice-based signatures with short zero-knowledge proofsProceedings of International Conference on Information Security, 2018.Full version:
[www],
[www]Cecilia Boschini, Jan Camenisch, Gregory Neven
Floppy-sized group signatures from latticesProceedings of International Conference on Applied Cryptography and Network Security, 2018.Full version:
[www],
[www]Jessica Bavaresco, Natalia Herrera Valencia, Claude Klöckl, Matej Pivoluska, Paul Erker, Nicolai Friis, Mehul Malik, Markus Huber
Measurements in two bases are sufficient for certifying high-dimensional entanglementNature Physics, 2018.Full version:
[www]Ämin Baumeler, Julien Degorre, Stefan Wolf
Bell correlations and the common futureQuantum Foundations, Probability and Information, 255-268, Springer-Verlag, 2018.Full version:
[www]Veronika Baumann, Stefan Wolf
On formalisms and interpretationsQuantum 2, 99, 2018.Full version:
[www],
[arXiv]Ämin Baumeler, Stefan Wolf
Computational tameness of classical non-causal modelsProceedings of the Royal Society A, 474(2209):20170698, 2018.Full version:
[www],
[arXiv]Ämin Baumeler, Stefan Wolf
Causality — Complexity — Consistency: Can space-time be based on logic and computation?Proceedings of Time in Physics, 69-101, Birkhäuser Verlag, 2017.Full version:
[www],
[arXiv]Mateus Araújo, Philippe Allard Guérin, Ämin Baumeler
Quantum computation with indefinite causal structuresPhysical Review A, 96(5):052315, 2017.Full version:
[www],
[arXiv]Paul Erker, Mario Krenn, Marcus Huber
Quantifying high dimensional entanglement with two mutually unbiased basesQuantum 1, 22, 2017.Full version:
[www],
[arXiv]Paul Erker, Mark T. Mitchison, Ralph Silva, Mischa P. Woods, Nicolas Brunner, Marcus Huber
Autonomous quantum clocks: how thermodynamics limits our ability to measure timePhysical Review X, 7:031022, 2017.Full version:
[www],
[arXiv]Ämin Baumeler, Stefan Wolf
Non-causal computationEntropy, 19(7):326, 2017.Full version:
[www],
[arXiv]Ämin Baumeler, Charles Alexandre Bédard, Gilles Brassard, Stefan Wolf
Kolmogorov amplification from Bell correlationProceedings of International Symposium on Information Theory (ISIT) 2017, 2017.Full version:
[pdf]Ämin Baumeler
Causal loops — logically consistent correlations, time travel, and computation Doctoral Dissertation, 2017.Full version:
[pdf]Stefan Wolf
Landauer's erasure principle and data compression 2017Full version:
[pdf]Stefan Wolf
An all-or-nothing flavor to the Church-Turing hypothesisProceedings of 14th Annual Conference on Theory and Applications of Models of Computation (TAMC), 2017.Full version:
[arXiv],
[pdf]Veronika Baumann, Arne Hansen, Stefan Wolf
The measurement problem is the measurement problem is the measurement problem arXiv:1611.01111 [quant-ph], 2016.Full version:
[arXiv]Sacha Schwarz, André Stefanov, Stefan Wolf, Alberto Montina
Optimal measurements for nonlocal correlationsPhysical Review A, 94(2):022322, 2016.Full version:
[www],
[arXiv]Benno Salwey, Stefan Wolf
Stronger attacks on causality-based key agreement International Symposium on Information Theory (ISIT) 2016, 2016.Full version:
[www],
[arXiv],
[pdf]Ali Asadian, Paul Erker, Marcus Huber, Claude Klöckl
Heisenberg-Weyl observables: Bloch vectors in phase spacePhysical Review A, 94(1):010301(R), 2016.Full version:
[www],
[arXiv]Veronika Baumann, Časlav Brukner
Appearance of causality in process matrices when performing fixed-basis measurements for two partiesPhysical Review A, 93(6):062324, 2016.Full version:
[www],
[arXiv]Arne Hansen, Alberto Montina, Stefan Wolf
Simple algorithm for computing the communication complexity of quantum communication processesPhysical Review A, 93(4):042315, 2016.Full version:
[www],
[arXiv]Ämin Baumeler, Stefan Wolf
Device-independent test of causal order and relations to fixed-points New Journal of Physics, 18(3):035014, 2016.Full version:
[www],
[arXiv]Alberto Montina, Stefan Wolf
Information-based measure of nonlocalityNew Journal of Physics, 18(1):013035, 2016.Full version:
[www],
[arXiv]Ämin Baumeler, Stefan Wolf
The space of logically consistent classical processes without causal orderNew Journal of Physics, 18(1):013036, 2016.Full version:
[www],
[arXiv]Stefan Wolf
On bits as fuel Unpublished, 2016.Full version:
[pdf]Stefan Wolf
Non-locality without counterfactual reasoningPhysical Review A, 92(5):052102, 2015.Full version:
[www],
[arXiv],
[pdf]Paul Erker
The quantum hourglass Master Thesis ETH, 2015.Full version:
[www],
[pdf]Paul Erker
How not to Rényi-generalize the quantum conditional mutual informationJournal of Physics A: Mathematical and Theoretical, 48(27):275303, 2015.Full version:
[www],
[arXiv]Benno Salwey
No-signalling attacks and implications for (quantum) nonlocality distillation Doctoral Dissertation, 2015.Full version:
[pdf]Gilles Brassard, Benno Salwey, Stefan Wolf
Non-locality distillation as cryptographic game ITW-IEEE Information Theory Workshop, Jerusalem, 1-5, 2015.Full version:
[www],
[pdf]Alberto Montina
Communication complexity and the reality of the wave-function Modern Physics Letters A, 30(1):1530001, 2015.Full version:
[www],
[arXiv]Ämin Baumeler, Anne Broadbent
Quantum private information retrieval has linear communication complexityJournal of Cryptology, 28(1):161-175, 2015.Full version:
[www],
[arXiv]Ämin Baumeler, Adrien Feix, Stefan Wolf
Maximal incompatibility of locally classical behavior and global causal order in multiparty scenariosPhysical Review A, 90(4):042106, 2014.Full version:
[www],
[arXiv]Christof Bernhard, Bänz Bessire, Alberto Montina, Marcel Pfaffhauser, André Stefanov, Stefan Wolf
Non-locality of experimental qutrit pairsJournal of Physics A: Mathematical and Theoretical, Special issue on 50 Years of Bell's Theorem, 47(42):424013, 2014.Full version:
[www],
[arXiv]Alberto Montina, Stefan Wolf
Necessary and sufficient optimality conditions for classical simulations of quantum communication processesPhysical Review A, 90(1):012309, 2014.Full version:
[www],
[arXiv]Jibran Rashid, Abuzer Yakaryιlmaz
Implications of quantum automata for contextuality 19th International Conference on Implementation and Application of Automata, 2014.Full version:
[www],
[arXiv]Alberto Montina, Stefan Wolf
Lower bounds on the communication complexity of two-party (quantum) processes International Symposium on Information Theory (ISIT) 2014, 1484-1488, 2014.Full version:
[www],
[arXiv]Helen Ebbe, Stefan Wolf
Trading permutation invariance for communication in multi-party non-locality distillation International Symposium on Information Theory (ISIT) 2014, 1479-1483, 2014.Full version:
[www],
[arXiv]Ämin Baumeler, Stefan Wolf
Perfect signaling among three parties violating predefined causal order International Symposium on Information Theory (ISIT) 2014, 526-530, 2014.Full version:
[www],
[arXiv]Helen Ebbe, Stefan Wolf
Multi-user non-locality amplification IEEE Transactions on Information Theory, 60(2):1159-1167, 2014.Full version:
[www],
[arXiv]Alberto Montina, Marcel Pfaffhauser, Stefan Wolf
Communication complexity of channels in general probabilistic theories Physical Review Letters, 111(16):160502, 2013.Full version:
[www],
[arXiv]Miguel Onorato, Stefania Residori, Umberto Bortolozzo, Alberto Montina, Fortunato Tito Arecchi
Rogue waves and their generating mechanisms in different physical contextsPhysics Reports, 528(2):47-89, 2013.Full version:
[www]Peter Høyer, Jibran Rashid
Quantum nonlocal boxes exhibit stronger distillabilityModern Physics Letters A, 28(17):1330012, 2013.Full version:
[www],
[arXiv]Helen Ebbe
Aspects and consequences of multi-party non-localityMaster Thesis ETH, 2013.Full version:
[pdf]Ämin Baumeler, Anne Broadbent
Quantum private information retrieval has linear communication complexity QCrypt 2013, 2013.Full version:
[arXiv],
[pdf],
[slides],
[video]Helen Ebbe, Stefan Wolf
Distillation of multi-party non-locality with and without partial communication International Symposium on Information Theory (ISIT) 2013, 739-743, 2013.Full version:
[www],
[arXiv],
[slides]Alberto Montina, Marcel Pfaffhauser, Stefan Wolf
The classical-communication rate of quantum resources International Symposium on Information Theory (ISIT) 2013, 744-748, 2013.Full version:
[www],
[pdf]Alberto Montina
Exponential communication gap between weak and strong classical simulations of quantum communicationPhysical Review A, 87(4):042331, 2013.Full version:
[www],
[arXiv]Martin Schüle, Ruedi Stoop
A full computation-relevant topological dynamics classification of elementary cellular automataChaos, 22(4):43143, 2013.Full version:
[www],
[arXiv]Renato Renner, Stefan Wolf
Towards characterizing the non-locality of entangled quantum statesTheoretical Computer Science, 486:50-60, Elsevier, 2013.Full version:
[www],
[arXiv],
[pdf]Esther Hänggi, Renato Renner, Stefan Wolf
The impossibility of non-signaling privacy amplificationTheoretical Computer Science, 486:27-42, Elsevier, 2013.Full version:
[www],
[arXiv]Nicolas Gisin, Sandu Popescu, Valerio Scarani, Stefan Wolf, Jürg Wullschleger
Oblivious transfer and quantum channels as communication resourcesNatural Computation, 12(1):13-17, 2013.Full version:
[www],
[ps]Gilles Brassard, Anne Broadbent, Esther Hänggi, André Méthot, Stefan Wolf
Classical, quantum and non-signalling resources in bipartite games Theoretical Computer Science, 486:61-72, Elsevier, 2013.Full version:
[www]Viktor Galliard, Alain Tapp, Stefan Wolf
Deterministic quantum non-locality and graph coloringsTheoretical Computer Science, 486:20-26, Elsevier, 2013.Full version:
[www],
[pdf]Renato Renner, Stefan Wolf
Ernst Specker and the hidden variablesElemente der Mathematik, 67(3):122-133, 2012.Full version:
[www],
[pdf]Adarsh Amirtham
The quest for three-partite marginal quantum non-locality and a link to contextuality Master Thesis ETH, 2012.Full version:
[www],
[pdf],
[files]Manuel Forster, Stefan Wolf
Bipartite units of nonlocalityPhysical Review A, 84(4):042112, 2011.Full version:
[www]Severin Winkler, Jürg Wullschleger, Stefan Wolf
Bit commitment from non-signaling correlationsIEEE Transactions on Information Theory, 57(3):1770-1779, 2011.Full version:
[www],
[arXiv]Ivana Černá, Tibor Gyimóthy, Juraj Hromkovič, Keith G. Jeffery, Rastislav Králović, Marko Vukolić, Stefan Wolf
SOFSEM 2011: Theory and practice of computer scienceLecture Notes in Computer Science, 6543, Springer-Verlag, 2011.Full version:
[www]Sandro Coretti, Esther Hänggi, Stefan Wolf
Non-locality is transitivePhysical Review Letters, 107(10):100402, 2011.Full version:
[www]Esther Hänggi, Renato Renner, Stefan Wolf
Efficient device-independent quantum cryptography Advances in Cryptology - EUROCRYPT 2010, Lecture Notes in Computer Science, 6110:216-234, Springer-Verlag, 2010.Full version:
[www],
[arXiv]Matthias Fitzi, Esther Hänggi, Valerio Scarani, Stefan Wolf
The non-locality of n noisy Popescu-Rohrlich boxesJournal of Physics A, Mathematical and Theoretical, 43(46):465305, 2010.Full version:
[www]Dejan Dukaric, Manuel Forster, Severin Winkler, Stefan Wolf
On nonlocality distillation QIP 2009, 2009.Full version:
[slides]Manuel Forster, Severin Winkler, Stefan Wolf
Distilling nonlocalityPhysical Review Letters, 102(12):120401, 2009.Full version:
[www]Renato Renner, Stefan Wolf, Jürg Wullschleger
Trade-offs in information-theoretic multi-party one-way key agreementInformation Theoretic Security. Lecture Notes in Computer Science, 4883:65-75, Springer-Verlag, 2009.Full version:
[www],
[ps]Gilles Brassard, Anne Broadbent, Esther Hänggi, André Méthot, Stefan Wolf
Classical, quantum and non-signalling resources in bipartite games Second International Conference on Quantum, Nano and Micro Technologies (ICQNM), 2008.Full version:
[www],
[pdf]Stefan Wolf, Jürg Wullschleger
New monotones and lower bounds in unconditional two-party computationIEEE Transactions on Information Theory, 54(6):2792-2797, 2008.Full version:
[www],
[pdf]Manuel Forster, Stefan Wolf
The universality of nonlocal boxes Ninth International Conference on Quantum Communication, Measurement and Computing (QCMC), 2008.Full version:
[www]Hugues Mercier, Pierre McKenzie, Stefan Wolf, Vijay K. Bhargava
Worst-case nonzero-error interactive communicationIEEE Transactions on Information Theory, 54(7):2857-2867, 2008.Full version:
[www],
[pdf]Matthias Fitzi, Esther Hänggi, Valerio Scarani, Stefan Wolf
How non-local are n noisy Popescu-Rohrlich machines? Ninth International Conference on Quantum Communication, Measurement and Computing (QCMC), 2008.Full version:
[www],
[pdf],
[arXiv]Dejan Dukaric, Stefan Wolf
A limit on non-locality distillation arXiv:0808.3317 [quant-ph], 2008.Full version:
[arXiv]Ueli Maurer, Renato Renner, Stefan Wolf
Unbreakable keys from random noiseSecurity with Noisy Data, 21-44, Springer-Verlag, 2007.Full version:
[www],
[ps]Matthias Fitzi, Jesper Buus Nielsen, Stefan Wolf
How to share a key 45th Annual Allerton Conference on Communication, Control, and Computing, 23-25, 2007.Full version:
[pdf]Stefan Wolf, Jürg Wullschleger
Unconditionally secure multi-party computation from weak primitivesSecurity with Noisy Data, 127-139, Springer-Verlag, 2007.Full version:
[www],
[pdf]Stefan Wolf, Jürg Wullschleger
Oblivious transfer is symmetric Advances in Cryptology - EUROCRYPT 2006, Lecture Notes in Computer Science, 4004:222-232, Springer-Verlag, 2006.Full version:
[www],
[www],
[pdf]Mathias Fitzi, Stefan Wolf, Jürg Wullschleger
On the power of imperfect broadcast International Symposium on Information Theory (ISIT) 2006, 2006.Full version:
[www],
[ps]Renato Renner, Stefan Wolf, Jürg Wullschleger
The single-serving channel capacity International Symposium on Information Theory (ISIT) 2006, 2006.Full version:
[www],
[pdf]Nicolas Gisin, Sandu Popescu, Valerio Scarani, Stefan Wolf, Jürg Wullschleger
Oblivious transfer and quantum channels IEEE Information Theory Workshop (ITW) 2006, 2006.Full version:
[www],
[arXiv]Stefan Wolf, Jürg Wullschleger
New monotones and lower bounds in unconditional two-party computation Advances in Cryptology - CRYPTO 2005, Lecture Notes in Computer Science, 3621:467-477, Springer-Verlag, 2005.Full version:
[www],
[ps]Stefan Wolf, Jürg Wullschleger
Oblivious transfer and quantum non-locality International Symposium on Information Theory (ISIT) 2005, 2005.Full version:
[www],
[arXiv],
[pdf]Renato Renner, Stefan Wolf
Simple and tight bounds for information reconciliation and privacy amplification Advances in Cryptology - ASIACRYPT 2005, Lecture Notes in Computer Science, 3788:199-216, Springer-Verlag, 2005.Full version:
[www],
[pdf]Stefan Wolf, Jürg Wullschleger
Bit commitment from weak non-locality IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security 2005, 2005.Full version:
[www],
[arXiv],
[pdf]Claude Crepeau, Kirill Morozov, Stefan Wolf
Efficient unconditional oblivious transfer from almost any noisy channelSecurity in Communication Networks, Lecture Notes in Computer Science, 3352:47-59, Springer-Verlag, 2005.Full version:
[www],
[ps]Renato Renner, Stefan Wolf
Quantum pseudo-telepathy and the Kochen-Specker theorem International Symposium on Information Theory (ISIT) 2004, 2004.Full version:
[www],
[ps],
[ps]Renato Renner, Stefan Wolf
Smooth Renyi entropy and applications International Symposium on Information Theory (ISIT) 2004, 2004.Full version:
[www],
[ps]Renato Renner, Stefan Wolf
The exact price for unconditionally secure asymmetric cryptography Advances in Cryptology - EUROCRYPT 2004, Lecture Notes in Computer Science, 3027:109-125, Springer-Verlag, 2004.Full version:
[www],
[ps]Matthias Fitzi, Stefan Wolf, Jürg Wullschleger
Pseudo-signatures, broadcast, and multi-party computation from correlated randomness Advances in Cryptology - EUROCRYPT 2004, Lecture Notes in Computer Science, 3027:562-578, Springer-Verlag, 2004.Full version:
[www],
[pdf]Stefan Wolf, Jürg Wullschleger
Zero-error information and applications in cryptography IEEE Information Theory Workshop (ITW) 2004, 2004.Full version:
[www],
[pdf]Gilles Brassard, Claude Crepeau, Stefan Wolf
Oblivious transfers and privacy amplificationJournal of Cryptology, 16(4):219-237, Springer-Verlag, 2003.Full version:
[www],
[pdf]Ueli Maurer, Stefan Wolf
Secret-key agreement over unauthenticated public channels - Part III: Privacy amplificationIEEE Transactions on Information Theory, 49(4):839-851, 2003.Full version:
[www],
[ps]Ueli Maurer, Stefan Wolf
Secret-key agreement over unauthenticated public channels - Part II: The simulatability conditionIEEE Transactions on Information Theory, 49(4):832-838, 2003.Full version:
[www],
[ps]Ueli Maurer, Stefan Wolf
Secret-key agreement over unauthenticated public channels - Part I: Definitions and a completeness resultIEEE Transactions on Information Theory, 49(4):822-831, 2003.Full version:
[www],
[ps]Renato Renner, Stefan Wolf
New bounds in secret-key agreement: the gap between formation and secrecy extraction Advances in Cryptology - EUROCRYPT 2003, Lecture Notes in Computer Science, 2656:562-577, Springer-Verlag, 2003.Full version:
[www],
[ps]Viktor Galliard, Alain Tapp, Stefan Wolf
The impossibility of pseudo-telepathy without quantum entanglement International Symposium on Information Theory (ISIT) 2003, 2003.Full version:
[www],
[arXiv],
[ps]Renato Renner, Stefan Wolf
Towards characterizing the non-local information of entangled quantum states International Symposium on Information Theory (ISIT) 2003, 2003.Full version:
[www],
[ps],
[ps]Matthias Christandl, Renato Renner, Stefan Wolf
A property of the intrinsic mutual information International Symposium on Information Theory (ISIT) 2003, 2003.Full version:
[www],
[ps]Renato Renner, Stefan Wolf
Unconditional authenticity and privacy from an arbitrarily weak secret Advances in Cryptology - CRYPTO 2003, Lecture Notes in Computer Science, 2729:78-95, Springer-Verlag, 2003.Full version:
[www],
[ps]Renato Renner, Juraj Skripsky, Stefan Wolf
A new measure for conditional mutual information and its properties International Symposium on Information Theory (ISIT) 2003, 2003.Full version:
[www],
[ps]Douglas Stebila, Stefan Wolf
Efficient oblivious transfer from any non-trivial binary-symmetric channel International Symposium on Information Theory (ISIT) 2002, 2002.Full version:
[www],
[ps]Renato Renner, Stefan Wolf
Towards proving the existence of bound information International Symposium on Information Theory (ISIT) 2002, 2002.Full version:
[www],
[ps]Viktor Galliard, Stefan Wolf
Pseudo-telepathy, entanglement, and graph colorings International Symposium on Information Theory (ISIT) 2002, 2002.Full version:
[www],
[ps]Nicolas Gisin, Renato Renner, Stefan Wolf
Linking classical and quantum key agreement: is there a classical analog to bound entanglement?Algorithmica, 34(4):389-412, Springer-Verlag, 2002.Full version:
[www],
[ps]Ueli Maurer, Stefan Wolf
Information-theoretic key agreement: from weak to strong secrecy for free Advances in Cryptology - EUROCRYPT 2000, Lecture Notes in Computer Science, 1807:351-368, Springer-Verlag, 2000.Full version:
[www],
[ps]Ueli Maurer, Stefan Wolf
From weak to strong secrecy in information-theoretic key agreement International Symposium on Information Theory (ISIT) 2000, 2000.Full version:
[www],
[ps]Ueli Maurer, Stefan Wolf
The Diffie-Hellman protocolDesigns, Codes and Cryptography, 19(2/3):147-171, 2000.Full version:
[www],
[ps]Nicolas Gisin, Stefan Wolf
Linking classical and quantum key agreement: is there bound information? Advances in Cryptology - CRYPTO 2000, Lecture Notes in Computer Science, 1880:482-500, Springer-Verlag, 2000.Full version:
[www],
[ps]Stefan Wolf
Reducing string oblivious transfer to universal oblivious transfer International Symposium on Information Theory (ISIT) 2000, 2000.Full version:
[www],
[ps]Nicolas Gisin, Renato Renner, Stefan Wolf
Bound information: the classical analog to bound entanglement European Congress of Mathematics, Progress in Mathematics, 202:439-447, Birkhäuser Verlag, 2000.Full version:
[www],
[ps]Stefan Wolf
A simple and efficiently verifiable characterization of the possibility of information-theoretic key agreement secure against active adversaries International Symposium on Information Theory (ISIT) 2000, 2000.Full version:
[www],
[ps]Ueli Maurer, Stefan Wolf
The relationship between breaking the Diffie-Hellman protocol and computing discrete logarithmsSIAM Journal on Computing, 28(5):1689-1721, 1999.Full version:
[www],
[ps]Stefan Wolf
Information-theoretically and computationally secure key agreement in cryptography ETH dissertation No. 13138, ETH Zurich, 1999.Full version:
[www],
[ps]Anna Lysyanskaya, Ronald Rivest, Amit Sahai, Stefan Wolf
Pseudonym systems Selected Areas in Cryptography, Lecture Notes in Computer Science, 1758:184-199, Springer-Verlag, 1999.Full version:
[www],
[ps]Stefan Wolf
Unconditional security in cryptography Lectures on Data Security, Lecture Notes in Computer Science, 1561:217-250, Springer-Verlag, 1999.Full version:
[www],
[ps]Nicolas Gisin, Stefan Wolf
Quantum cryptography on noisy channels: quantum versus classical key-agreement protocolsPhysical Review Letters, 83(20):4200-4203, 1999.Full version:
[www],
[ps]Ueli Maurer, Stefan Wolf
Unconditionally secure key agreement and the intrinsic conditional informationIEEE Transactions on Information Theory, 45(2):499-514, 1999.Full version:
[www],
[ps]Ueli Maurer, Stefan Wolf
On the hardness of the Diffie-Hellman decision problem manuscript, ETH Zurich, 1998.Full version:
[ps]Ueli Maurer, Stefan Wolf
Lower bounds on generic algorithms in groups Advances in Cryptology - EUROCRYPT '98, Lecture Notes in Computer Science, 1403:72-84, Springer-Verlag, 1998.Full version:
[www],
[ps]Stefan Wolf
Strong security against active attacks in information-theoretic secret-key agreement Advances in Cryptology - ASIACRYPT '98, Lecture Notes in Computer Science, 1514:405-419, Springer-Verlag, 1998.Full version:
[www],
[ps]Ueli Maurer, Stefan Wolf
Diffie-Hellman, decision Diffie-Hellman, and discrete logarithms International Symposium on Information Theory (ISIT) 1998, 1998.Full version:
[www],
[ps]Ueli Maurer, Stefan Wolf
The intrinsic conditional mutual information and perfect secrecy International Symposium on Information Theory (ISIT) 1997, 1997.Full version:
[www],
[ps]Ueli Maurer, Stefan Wolf
Unconditionally secure secret-key agreement and the intrinsic conditional mutual informationTech. Rep. 268, Department of Computer Science, ETH Zurich, May, 1997.Ueli Maurer, Stefan Wolf
Privacy amplification secure against active adversaries Advances in Cryptology - CRYPTO '97, Lecture Notes in Computer Science, 1294:307-321, Springer-Verlag, 1997.Full version:
[www],
[ps]Ueli Maurer, Stefan Wolf
On the complexity of breaking the Diffie-Hellman protocolTech. Rep. 244, Department of Computer Science, ETH Zurich, April, 1996.Full version:
[ps]Ueli Maurer, Stefan Wolf
Diffie-Hellman oracles Advances in Cryptology - CRYPTO '96, Lecture Notes in Computer Science, 1109:268-282, Springer-Verlag, 1996.Full version:
[www],
[ps]Ueli Maurer, Stefan Wolf
Towards characterizing when information-theoretic secret key agreement is possible Advances in Cryptology - ASIACRYPT '96, Lecture Notes in Computer Science, 1163:196-209, Springer-Verlag, 1996.Full version:
[www],
[ps]Stefan Wolf
Diffie-Hellman and discrete logarithms Diploma Thesis, ETH Zurich, May, 1995.