Renato Renner

According to our database1, Renato Renner authored at least 86 papers between 2002 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Operationally meaningful representations of physical systems in neural networks.
CoRR, 2020

2019
Simple and Tight Device-Independent Security Proofs.
SIAM J. Comput., 2019

Classical Leakage Resilience from Fault-Tolerant Quantum Computation.
J. Cryptology, 2019

A chain rule for the quantum relative entropy.
CoRR, 2019

Bounds on Lyapunov exponents.
CoRR, 2019

2018
Communication Complexity of One-Shot Remote State Preparation.
IEEE Trans. Information Theory, 2018

Toward an algebraic theory of systems.
Theor. Comput. Sci., 2018

Discovering physical concepts with neural networks.
CoRR, 2018

2017
Approximate Degradable Quantum Channels.
IEEE Trans. Information Theory, 2017

Causal Boxes: Quantum Information-Processing Systems Closed Under Composition.
IEEE Trans. Information Theory, 2017

2016
Quantum Key Distribution.
Encyclopedia of Algorithms, 2016

Efficient Approximation of Quantum Channel Capacities.
IEEE Trans. Information Theory, 2016

Non-Signaling Parallel Repetition Using de Finetti Reductions.
IEEE Trans. Information Theory, 2016

From Indifferentiability to Constructive Cryptography (and Back).
IACR Cryptology ePrint Archive, 2016

Entropy accumulation.
CoRR, 2016

Universal recoverability in quantum information.
Proceedings of the IEEE International Symposium on Information Theory, 2016

2015
Efficient Quantum Polar Codes Requiring No Preshared Entanglement.
IEEE Trans. Information Theory, 2015

Universal recovery map for approximate Markov chains.
CoRR, 2015

Universal recovery from a decrease of quantum relative entropy.
CoRR, 2015

Approximate degradable quantum channels.
Proceedings of the IEEE International Symposium on Information Theory, 2015

2014
Full Security of Quantum Key Distribution From No-Signaling Constraints.
IEEE Trans. Information Theory, 2014

Smooth Max-Information as One-Shot Generalization for Mutual Information.
IEEE Trans. Information Theory, 2014

Using quantum key distribution for cryptographic purposes: A survey.
Theor. Comput. Sci., 2014

Preface.
Natural Computing, 2014

The ultimate physical limits of privacy.
Nature, 2014

Cryptographic security of quantum key distribution.
CoRR, 2014

Non-signalling parallel repetition using de Finetti reductions.
CoRR, 2014

Composable Security of Delegated Quantum Computation.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

2013
Chain Rules for Smooth Min- and Max-Entropies.
IEEE Trans. Information Theory, 2013

One-Shot Lossy Quantum Data Compression.
IEEE Trans. Information Theory, 2013

Towards characterizing the non-locality of entangled quantum states.
Theor. Comput. Sci., 2013

The impossibility of non-signaling privacy amplification.
Theor. Comput. Sci., 2013

True randomness from realistic quantum devices.
CoRR, 2013

Efficient quantum channel coding scheme requiring no preshared entanglement.
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013

Efficient One-Way Secret-Key Agreement and Private Channel Coding via Polarization.
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013

2012
One-Shot Classical Data Compression With Quantum Side Information and the Distillation of Common Randomness or Secret Keys.
IEEE Trans. Information Theory, 2012

Trevisan's Extractor in the Presence of Quantum Side Information.
SIAM J. Comput., 2012

An intuitive proof of the data processing inequality.
Quantum Information & Computation, 2012

Reply to recent scepticism about the foundations of quantum cryptography
CoRR, 2012

Achieving the capacity of any DMC using only polar codes.
Proceedings of the 2012 IEEE Information Theory Workshop, 2012

2011
Leftover Hashing Against Quantum Side Information.
IEEE Trans. Information Theory, 2011

Noisy Channel Coding via Privacy Amplification and Information Reconciliation.
IEEE Trans. Information Theory, 2011

Sampling of Min-Entropy Relative to Quantum Knowledge.
IEEE Trans. Information Theory, 2011

On the Randomness of Independent Experiments.
IEEE Trans. Information Theory, 2011

The thermodynamic meaning of negative entropy.
Nature, 2011

Efficient Quantum Polar Coding
CoRR, 2011

Information Security in a Quantum World.
Proceedings of the Mathematical and Engineering Methods in Computer Science, 2011

Abstract Cryptography.
Proceedings of the Innovations in Computer Science, 2011

Quantum-Resilient Randomness Extraction - (Invited Talk).
Proceedings of the Information Theoretic Security - 5th International Conference, 2011

2010
Simplifying information-theoretic arguments by post-selection.
Proceedings of the Quantum Cryptography and Computing, 2010

Duality between smooth min- and max-entropies.
IEEE Trans. Information Theory, 2010

Device-Independent Quantum Key Distribution with Commuting Measurements
CoRR, 2010

Composability in quantum cryptography
CoRR, 2010

A Conceptually Simple Proof of the Quantum Reverse Shannon Theorem.
Proceedings of the Theory of Quantum Computation, Communication, and Cryptography, 2010

Efficient Device-Independent Quantum Key Distribution.
Proceedings of the Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30, 2010

2009
A fully quantum asymptotic equipartition property.
IEEE Trans. Information Theory, 2009

The operational meaning of min- and max-entropy.
IEEE Trans. Information Theory, 2009

Smooth entropies and the quantum information spectrum.
IEEE Trans. Information Theory, 2009

Simple channel coding bounds.
Proceedings of the IEEE International Symposium on Information Theory, 2009


2008
Quantum Key Distribution.
Proceedings of the Encyclopedia of Algorithms - 2008 Edition, 2008

Security Bounds for Quantum Cryptography with Finite Resources.
Proceedings of the Theory of Quantum Computation, 2008

Extracting classical randomness in a quantum world.
Proceedings of the 2008 IEEE Information Theory Workshop, 2008

2007
Beweisbare Sicherheit durch Quantenkryptografie (Provable Security in Quantum Cryptography).
it - Information Technology, 2007

A Tight High-Order Entropic Quantum Uncertainty Relation With Applications.
IACR Cryptology ePrint Archive, 2007

SECOQC White Paper on Quantum Key Distribution and Cryptography
CoRR, 2007

Unifying Classical and Quantum Key Distillation.
Proceedings of the Theory of Cryptography, 4th Theory of Cryptography Conference, 2007

Trade-Offs in Information-Theoretic Multi-party One-Way Key Agreement.
Proceedings of the Information Theoretic Security - Second International Conference, 2007

2006
Indistinguishability Amplification.
IACR Cryptology ePrint Archive, 2006

The Single-Serving Channel Capacity.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006

On the Impossibility of Extracting Classical Randomness Using a Quantum Computer.
Proceedings of the Automata, Languages and Programming, 33rd International Colloquium, 2006

2005
On the power of quantum memory.
IEEE Trans. Information Theory, 2005

On the variational distance of independently repeated experiments
CoRR, 2005

Universally Composable Privacy Amplification Against Quantum Adversaries.
Proceedings of the Theory of Cryptography, Second Theory of Cryptography Conference, 2005

Security of quantum key distribution.
Proceedings of the Ausgezeichnete Informatikdissertationen 2005, 2005

One-Way Secret-Key Agreement and Applications to Circuit Polarization and Immunization of Public-Key Encryption.
Proceedings of the Advances in Cryptology, 2005

Simple and Tight Bounds for Information Reconciliation and Privacy Amplification.
Proceedings of the Advances in Cryptology, 2005

2004
Quantum pseudo-telepathy and the kochen-specker theorem.
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004

Smooth Renyi entropy and applications.
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004

Privacy amplification secure against an adversary with selectable knowledge.
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004

On intrinsic information.
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004

The Exact Price for Unconditionally Secure Asymmetric Cryptography.
Proceedings of the Advances in Cryptology, 2004

2003
Indifferentiability, Impossibility Results on Reductions, and Applications to the Random Oracle Methodology.
IACR Cryptology ePrint Archive, 2003

New Bounds in Secret-Key Agreement: The Gap between Formation and Secrecy Extraction.
Proceedings of the Advances in Cryptology, 2003

Unconditional Authenticity and Privacy from an Arbitrarily Weak Secret.
Proceedings of the Advances in Cryptology, 2003

2002
Linking Classical and Quantum Key Agreement: Is There a Classical Analog to Bound Entanglement?
Algorithmica, 2002


  Loading...