Alain Tapp

According to our database1, Alain Tapp authored at least 40 papers between 1995 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Noisy Interactive Quantum Communication.
SIAM J. Comput., 2019

Distinction Maximization Loss: Fast, Scalable, Turnkey, and Native Neural Networks Out-of-Distribution Detection simply by Replacing the SoftMax Loss.
CoRR, 2019

Agnostic data debiasing through a local sanitizer learnt from an adversarial network approach.
CoRR, 2019

Fairwashing: the risk of rationalization.
Proceedings of the 36th International Conference on Machine Learning, 2019

Towards Lossless Encoding of Sentences.
Proceedings of the 57th Conference of the Association for Computational Linguistics, 2019

2016
Quantum Algorithm for the Collision Problem.
Encyclopedia of Algorithms, 2016

Efficient Generic Zero-Knowledge Proofs from Commitments (Extended Abstract).
Proceedings of the Information Theoretic Security - 9th International Conference, 2016

2015
Generalizing Efficient Multiparty Computation.
IACR Cryptology ePrint Archive, 2015

2014
Efficient Generic Zero-Knowledge Proofs from Commitments.
IACR Cryptology ePrint Archive, 2014

A new approach in machine learning.
CoRR, 2014

The Crypto-democracy and the Trustworthy.
CoRR, 2014

The Crypto-Democracy and the Trustworthy (Position Paper).
Proceedings of the Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, 2014

2013
Preface.
Theor. Comput. Sci., 2013

Deterministic quantum non-locality and graph colorings.
Theor. Comput. Sci., 2013

Quantum entanglement and the communication complexity of the inner product function.
Theor. Comput. Sci., 2013

Secure Two-Party Computation via Leaky Generalized Oblivious Transfer.
IACR Cryptology ePrint Archive, 2013

Noisy Interactive Quantum Communication.
CoRR, 2013

2012
A Quantum Characterization Of NP.
Computational Complexity, 2012

Trading Robustness for Correctness and Privacy in Certain Multiparty Computations, beyond an Honest Majority.
Proceedings of the Information Theoretic Security - 6th International Conference, 2012

2011
On the Efficiency of Bit Commitment Reductions.
IACR Cryptology ePrint Archive, 2011

An optimal quantum algorithm to approximate the mean and its application for approximating the median of a set of points over an arbitrary distance
CoRR, 2011

Two Provers in Isolation.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011

2010
Exact, Efficient and Information-Theoretically Secure Voting with an Arbitrary Number of Cheaters.
IACR Cryptology ePrint Archive, 2010

2009
A Single Initialization Server for Multi-Party Cryptography.
IACR Cryptology ePrint Archive, 2009

2008
Quantum Algorithm for the Collision Problem.
Proceedings of the Encyclopedia of Algorithms - 2008 Edition, 2008

Can quantum mechanics help distributed computing?
SIGACT News, 2008

Information-Theoretically Secure Voting Without an Honest Majority.
IACR Cryptology ePrint Archive, 2008

2007
Anonymous Quantum Communication - (Extended Abstract).
Proceedings of the Information Theoretic Security - Second International Conference, 2007

Information-Theoretic Security Without an Honest Majority.
Proceedings of the Advances in Cryptology, 2007

Anonymous Quantum Communication.
Proceedings of the Advances in Cryptology, 2007

2005
Minimum entangled state dimension required for pseudo-telepathy.
Quantum Information & Computation, 2005

Recasting mermin's multi-player game into the framework of pseudo-telepathy.
Quantum Information & Computation, 2005

2003
Multi-party Pseudo-Telepathy.
Proceedings of the Algorithms and Data Structures, 8th International Workshop, 2003

2002
Authentication of Quantum Messages.
IACR Cryptology ePrint Archive, 2002

Introduction.
Algorithmica, 2002

2000
Reversible Space Equals Deterministic Space.
J. Comput. Syst. Sci., 2000

Private Quantum Channels.
Proceedings of the 41st Annual Symposium on Foundations of Computer Science, 2000

1998
Quantum Counting.
Proceedings of the Automata, Languages and Programming, 25th International Colloquium, 1998

1997
Quantum cryptanalysis of hash and claw-free functions.
SIGACT News, 1997

1995
Committed Oblivious Transfer and Private Multi-Party Computation.
Proceedings of the Advances in Cryptology, 1995


  Loading...