Renato Renner

Orcid: 0000-0001-5044-6113

According to our database1, Renato Renner authored at least 94 papers between 2002 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
The debate over QKD: A rebuttal to the NSA's objections.
CoRR, 2023

2022
Operationally meaningful representations of physical systems in neural networks.
Mach. Learn. Sci. Technol., December, 2022

Improved DIQKD protocols with finite-size analysis.
Quantum, September, 2022

Quantum Advantage in Cryptography.
CoRR, 2022

Generalised entropy accumulation.
Proceedings of the 63rd IEEE Annual Symposium on Foundations of Computer Science, 2022

2021
Bounds on Lyapunov Exponents via Entropy Accumulation.
IEEE Trans. Inf. Theory, 2021

Device-independent quantum key distribution from generalized CHSH inequalities.
Quantum, 2021

Device-Independent Quantum Key Distribution.
CoRR, 2021

Security in Quantum Cryptography.
CoRR, 2021

2019
Simple and Tight Device-Independent Security Proofs.
SIAM J. Comput., 2019

Classical Leakage Resilience from Fault-Tolerant Quantum Computation.
J. Cryptol., 2019

A chain rule for the quantum relative entropy.
CoRR, 2019

Bounds on Lyapunov exponents.
CoRR, 2019

2018
Communication Complexity of One-Shot Remote State Preparation.
IEEE Trans. Inf. Theory, 2018

Toward an algebraic theory of systems.
Theor. Comput. Sci., 2018

Discovering physical concepts with neural networks.
CoRR, 2018

2017
Approximate Degradable Quantum Channels.
IEEE Trans. Inf. Theory, 2017

Causal Boxes: Quantum Information-Processing Systems Closed Under Composition.
IEEE Trans. Inf. Theory, 2017

2016
Quantum Key Distribution.
Encyclopedia of Algorithms, 2016

Efficient Approximation of Quantum Channel Capacities.
IEEE Trans. Inf. Theory, 2016

Non-Signaling Parallel Repetition Using de Finetti Reductions.
IEEE Trans. Inf. Theory, 2016

From Indifferentiability to Constructive Cryptography (and Back).
IACR Cryptol. ePrint Arch., 2016

Entropy accumulation.
CoRR, 2016

Universal recoverability in quantum information.
Proceedings of the IEEE International Symposium on Information Theory, 2016

2015
Efficient Quantum Polar Codes Requiring No Preshared Entanglement.
IEEE Trans. Inf. Theory, 2015

Universal recovery map for approximate Markov chains.
CoRR, 2015

Universal recovery from a decrease of quantum relative entropy.
CoRR, 2015

Approximate degradable quantum channels.
Proceedings of the IEEE International Symposium on Information Theory, 2015

2014
Full Security of Quantum Key Distribution From No-Signaling Constraints.
IEEE Trans. Inf. Theory, 2014

Smooth Max-Information as One-Shot Generalization for Mutual Information.
IEEE Trans. Inf. Theory, 2014

Using quantum key distribution for cryptographic purposes: A survey.
Theor. Comput. Sci., 2014

Preface.
Nat. Comput., 2014

The ultimate physical limits of privacy.
Nat., 2014

Cryptographic security of quantum key distribution.
CoRR, 2014

Non-signalling parallel repetition using de Finetti reductions.
CoRR, 2014

Composable Security of Delegated Quantum Computation.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

2013
Chain Rules for Smooth Min- and Max-Entropies.
IEEE Trans. Inf. Theory, 2013

One-Shot Lossy Quantum Data Compression.
IEEE Trans. Inf. Theory, 2013

Towards characterizing the non-locality of entangled quantum states.
Theor. Comput. Sci., 2013

The impossibility of non-signaling privacy amplification.
Theor. Comput. Sci., 2013

True randomness from realistic quantum devices.
CoRR, 2013

Efficient quantum channel coding scheme requiring no preshared entanglement.
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013

Efficient One-Way Secret-Key Agreement and Private Channel Coding via Polarization.
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013

2012
One-Shot Classical Data Compression With Quantum Side Information and the Distillation of Common Randomness or Secret Keys.
IEEE Trans. Inf. Theory, 2012

Trevisan's Extractor in the Presence of Quantum Side Information.
SIAM J. Comput., 2012

An intuitive proof of the data processing inequality.
Quantum Inf. Comput., 2012

Reply to recent scepticism about the foundations of quantum cryptography
CoRR, 2012

Achieving the capacity of any DMC using only polar codes.
Proceedings of the 2012 IEEE Information Theory Workshop, 2012

2011
Leftover Hashing Against Quantum Side Information.
IEEE Trans. Inf. Theory, 2011

Noisy Channel Coding via Privacy Amplification and Information Reconciliation.
IEEE Trans. Inf. Theory, 2011

Sampling of Min-Entropy Relative to Quantum Knowledge.
IEEE Trans. Inf. Theory, 2011

On the Randomness of Independent Experiments.
IEEE Trans. Inf. Theory, 2011

The thermodynamic meaning of negative entropy.
Nat., 2011

Efficient Quantum Polar Coding
CoRR, 2011

Information Security in a Quantum World.
Proceedings of the Mathematical and Engineering Methods in Computer Science, 2011

Abstract Cryptography.
Proceedings of the Innovations in Computer Science, 2011

Quantum-Resilient Randomness Extraction - (Invited Talk).
Proceedings of the Information Theoretic Security - 5th International Conference, 2011

2010
Simplifying information-theoretic arguments by post-selection.
Proceedings of the Quantum Cryptography and Computing, 2010

Duality between smooth min- and max-entropies.
IEEE Trans. Inf. Theory, 2010

Device-Independent Quantum Key Distribution with Commuting Measurements
CoRR, 2010

Composability in quantum cryptography
CoRR, 2010

A Conceptually Simple Proof of the Quantum Reverse Shannon Theorem.
Proceedings of the Theory of Quantum Computation, Communication, and Cryptography, 2010

Efficient Device-Independent Quantum Key Distribution.
Proceedings of the Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30, 2010

2009
A fully quantum asymptotic equipartition property.
IEEE Trans. Inf. Theory, 2009

The operational meaning of min- and max-entropy.
IEEE Trans. Inf. Theory, 2009

Smooth entropies and the quantum information spectrum.
IEEE Trans. Inf. Theory, 2009

Simple channel coding bounds.
Proceedings of the IEEE International Symposium on Information Theory, 2009


2008
Quantum Key Distribution.
Proceedings of the Encyclopedia of Algorithms - 2008 Edition, 2008

Security Bounds for Quantum Cryptography with Finite Resources.
Proceedings of the Theory of Quantum Computation, 2008

Extracting classical randomness in a quantum world.
Proceedings of the 2008 IEEE Information Theory Workshop, 2008

2007
Beweisbare Sicherheit durch Quantenkryptografie (Provable Security in Quantum Cryptography).
it Inf. Technol., 2007

A Tight High-Order Entropic Quantum Uncertainty Relation With Applications.
IACR Cryptol. ePrint Arch., 2007

SECOQC White Paper on Quantum Key Distribution and Cryptography
CoRR, 2007

Unifying Classical and Quantum Key Distillation.
Proceedings of the Theory of Cryptography, 4th Theory of Cryptography Conference, 2007

Trade-Offs in Information-Theoretic Multi-party One-Way Key Agreement.
Proceedings of the Information Theoretic Security - Second International Conference, 2007

2006
Indistinguishability Amplification.
IACR Cryptol. ePrint Arch., 2006

The Single-Serving Channel Capacity.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006

On the Impossibility of Extracting Classical Randomness Using a Quantum Computer.
Proceedings of the Automata, Languages and Programming, 33rd International Colloquium, 2006

2005
On the power of quantum memory.
IEEE Trans. Inf. Theory, 2005

On the variational distance of independently repeated experiments
CoRR, 2005

Universally Composable Privacy Amplification Against Quantum Adversaries.
Proceedings of the Theory of Cryptography, Second Theory of Cryptography Conference, 2005

Security of quantum key distribution.
Proceedings of the Ausgezeichnete Informatikdissertationen 2005, 2005

One-Way Secret-Key Agreement and Applications to Circuit Polarization and Immunization of Public-Key Encryption.
Proceedings of the Advances in Cryptology, 2005

Simple and Tight Bounds for Information Reconciliation and Privacy Amplification.
Proceedings of the Advances in Cryptology, 2005

2004
Quantum pseudo-telepathy and the kochen-specker theorem.
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004

Smooth Renyi entropy and applications.
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004

Privacy amplification secure against an adversary with selectable knowledge.
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004

On intrinsic information.
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004

The Exact Price for Unconditionally Secure Asymmetric Cryptography.
Proceedings of the Advances in Cryptology, 2004

2003
Indifferentiability, Impossibility Results on Reductions, and Applications to the Random Oracle Methodology.
IACR Cryptol. ePrint Arch., 2003

New Bounds in Secret-Key Agreement: The Gap between Formation and Secrecy Extraction.
Proceedings of the Advances in Cryptology, 2003

Unconditional Authenticity and Privacy from an Arbitrarily Weak Secret.
Proceedings of the Advances in Cryptology, 2003

2002
Linking Classical and Quantum Key Agreement: Is There a Classical Analog to Bound Entanglement?
Algorithmica, 2002


  Loading...