Author pages are created from data sourced from our academic publisher partnerships and public sources.

Publications Influence

Share This Author

Experimental Quantum Cryptography

- C. H. Bennett, F. Bessette, G. Brassard, L. Salvail, J. Smolin
- Mathematics, Computer ScienceEUROCRYPT
- 1 February 1991

TLDR

Secret-Key Reconciliation by Public Discussion

- G. Brassard, L. Salvail
- Computer ScienceEUROCRYPT
- 2 January 1994

TLDR

On the (Im)possibility of Basing Oblivious Transfer and Bit Commitment on Weakened Security Assumptions

- I. Damgård, J. Kilian, L. Salvail
- Computer ScienceEUROCRYPT
- 2 May 1999

TLDR

Secure Two-Party Quantum Evaluation of Unitaries against Specious Adversaries

- F. Dupuis, J. Nielsen, L. Salvail
- Computer Science, PhysicsCRYPTO
- 15 August 2010

We describe how any two-party quantum computation, specified by a unitary which simultaneously acts on the registers of both parties, can be privately implemented against a quantum version of… Expand

Quantum Authentication and Encryption with Key Recycling

- S. Fehr, L. Salvail
- Computer ScienceIACR Cryptol. ePrint Arch.
- 18 October 2016

We propose an information-theoretically secure encryption scheme for classical messages with quantum ciphertexts that offers detection of eavesdropping attacks, and re-usability of the key in case no… Expand

The SECOQC quantum key distribution network in Vienna

- M. Peev, C. Pacher, +54 authors A. Zeilinger
- Physics
- 1 July 2009

In this paper, we present the quantum key distribution (QKD) network designed and implemented by the European project SEcure COmmunication based on Quantum Cryptography (SECOQC) (2004?2008), unifying… Expand

SECOQC White Paper on Quantum Key Distribution and Cryptography

- R. Alléaume, J. Bouda, +20 authors A. Zeilinger
- Mathematics, Computer ScienceArXiv
- 23 January 2007

TLDR

Perfectly Concealing Quantum Bit Commitment from any Quantum One-Way Permutation

- P. Dumais, D. Mayers, L. Salvail
- Mathematics, Computer ScienceEUROCRYPT
- 14 May 2000

We show that although unconditionally secure quantum bit commitment is impossible, it can be based upon any family of quantum one-way permutations. The resulting scheme is unconditionally concealing… Expand

Actively Secure Two-Party Evaluation of Any Quantum Operation

- F. Dupuis, J. Nielsen, L. Salvail
- Computer Science, MathematicsCRYPTO
- 19 August 2012

TLDR

Solving the maximum clique problem using a tabu search approach

- M. Gendreau, P. Soriano, L. Salvail
- Mathematics, Computer ScienceAnn. Oper. Res.
- 1 May 1993

TLDR

...

1

2

3

4

5

...