Stefan Wolf

Orcid: 0000-0001-6823-3255

Affiliations:
  • University of Lugano, Switzerland
  • ETH Zurich, Switzerland (former)


According to our database1, Stefan Wolf authored at least 72 papers between 1996 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
An Algebraic-Geometry Approach to Prime Factorization.
CoRR, 2022

Key Agreement and Oblivious Transfer from Free-Energy Limitations.
CoRR, 2022

Unconditional Proofs-of-Work and Other Possibilities of Thermodynamic Cryptography.
Proceedings of the IEEE Information Theory Workshop, 2022

Thermodynamics as Combinatorics: A Toy Theory.
Proceedings of the IEEE Information Theory Workshop, 2022

2020
On the Advantage of Irreversible Processes in Single-System Games.
Proceedings of the IEEE International Symposium on Information Theory, 2020

2019
Discrimination of Non-Local Correlations.
Entropy, 2019

Proving Erasure.
Proceedings of the IEEE International Symposium on Information Theory, 2019

2018
Second Thoughts on the Second Law.
Proceedings of the Adventures Between Lower Bounds and Higher Altitudes, 2018

2017
Non-Causal Computation.
Entropy, 2017

An All-or-Nothing Flavor to the Church-Turing Hypothesis.
Proceedings of the Theory and Applications of Models of Computation, 2017

Kolmogorov amplification from Bell correlation.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

2016
Optimal measurements for nonlocal correlations.
CoRR, 2016

Can non-local correlations be discriminated in polynomial time?
CoRR, 2016

Computational tameness of classical non-causal models.
CoRR, 2016

Causality - Complexity - Consistency: Can Space-Time Be Based on Logic and Computation?
CoRR, 2016

Non-causal computation avoiding the grandfather and information antinomies.
CoRR, 2016

Stronger attacks on causality-based key agreement.
Proceedings of the IEEE International Symposium on Information Theory, 2016

2015
Simple algorithm for computing the communication complexity of quantum communication processes.
CoRR, 2015

Non-locality distillation as cryptographic game.
Proceedings of the 2015 IEEE Information Theory Workshop, 2015

2014
Multi-User Non-Locality Amplification.
IEEE Trans. Inf. Theory, 2014

Necessary and sufficient optimality conditions for classical simulations of quantum communication processes.
CoRR, 2014

Lower bounds on the communication complexity of two-party (quantum) processes.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

Trading permutation invariance for communication in multi-party non-locality distillation.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

Perfect signaling among three parties violating predefined causal order.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

2013
Towards characterizing the non-locality of entangled quantum states.
Theor. Comput. Sci., 2013

The impossibility of non-signaling privacy amplification.
Theor. Comput. Sci., 2013

Deterministic quantum non-locality and graph colorings.
Theor. Comput. Sci., 2013

Classical, quantum and nonsignalling resources in bipartite games.
Theor. Comput. Sci., 2013

Oblivious transfer and quantum channels as communication resources.
Nat. Comput., 2013

Computing the Communication Complexity of Quantum Channels
CoRR, 2013

Information-based measure of nonlocality.
CoRR, 2013

Classical communication rates for simulating quantum resources.
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013

Distillation of multi-party non-locality with and without partial communication.
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013

2011
Bit Commitment From Nonsignaling Correlations.
IEEE Trans. Inf. Theory, 2011

2010
Efficient Device-Independent Quantum Key Distribution.
Proceedings of the Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30, 2010

2008
New Monotones and Lower Bounds in Unconditional Two-Party Computation.
IEEE Trans. Inf. Theory, 2008

Worst Case Nonzero-Error Interactive Communication.
IEEE Trans. Inf. Theory, 2008

Classical, Quantum and Non-signalling Resources in Bipartite Games.
Proceedings of the Second International Conference on Quantum, 2008

2007
Trade-Offs in Information-Theoretic Multi-party One-Way Key Agreement.
Proceedings of the Information Theoretic Security - Second International Conference, 2007

2006
Oblivious Transfer and Quantum Channels.
Proceedings of the 2006 IEEE Information Theory Workshop, 2006

The Single-Serving Channel Capacity.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006

On the Power of Imperfect Broadcast.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006

2005
Worst-case randomized interactive communication.
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005

Oblivious transfer and quantum non-locality.
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005

Bit commitment from weak non-locality.
Proceedings of the IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security, 2005

Simple and Tight Bounds for Information Reconciliation and Privacy Amplification.
Proceedings of the Advances in Cryptology, 2005

2004
Oblivious Transfer Is Symmetric.
IACR Cryptol. ePrint Arch., 2004

Efficient Unconditional Oblivious Transfer from Almost Any Noisy Channel.
Proceedings of the Security in Communication Networks, 4th International Conference, 2004

Zero-error information and applications in cryptography.
Proceedings of the 2004 IEEE Information Theory Workshop, 2004

Quantum pseudo-telepathy and the kochen-specker theorem.
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004

Smooth Renyi entropy and applications.
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004

The Exact Price for Unconditionally Secure Asymmetric Cryptography.
Proceedings of the Advances in Cryptology, 2004

Pseudo-signatures, Broadcast, and Multi-party Computation from Correlated Randomness.
Proceedings of the Advances in Cryptology, 2004

2003
Secret-key agreement over unauthenticated public channels III: Privacy amplification.
IEEE Trans. Inf. Theory, 2003

Secret-key agreement over unauthenticated public channels II: the simulatability condition.
IEEE Trans. Inf. Theory, 2003

Secret-key agreement over unauthenticated public channels I: Definitions and a completeness result.
IEEE Trans. Inf. Theory, 2003

Oblivious Transfers and Privacy Amplification.
J. Cryptol., 2003

New Bounds in Secret-Key Agreement: The Gap between Formation and Secrecy Extraction.
Proceedings of the Advances in Cryptology, 2003

Unconditional Authenticity and Privacy from an Arbitrarily Weak Secret.
Proceedings of the Advances in Cryptology, 2003

2002
Linking Classical and Quantum Key Agreement: Is There a Classical Analog to Bound Entanglement?
Algorithmica, 2002

2000
The Diffie-Hellman Protocol.
Des. Codes Cryptogr., 2000

Information-Theoretic Key Agreement: From Weak to Strong Secrecy for Free.
Proceedings of the Advances in Cryptology, 2000

Linking Classical and Quantum Key Agreement: Is There "Bound Information"?
Proceedings of the Advances in Cryptology, 2000

1999
Unconditionally Secure Key Agreement and the Intrinsic Conditional Information.
IEEE Trans. Inf. Theory, 1999

The Relationship Between Breaking the Diffie-Hellman Protocol and Computing Discrete Logarithms.
SIAM J. Comput., 1999

Pseudonym Systems.
Proceedings of the Selected Areas in Cryptography, 6th Annual International Workshop, 1999

1998
Lower Bounds on Generic Algorithms in Groups.
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998

Strong Security Against Active Attacks in Information-Theoretic Secret-Key Agreement.
Proceedings of the Advances in Cryptology, 1998

Unconditional Security in Cryptography.
Proceedings of the Lectures on Data Security, 1998

1997
Privacy Amplification Secure Against Active Adversaries.
Proceedings of the Advances in Cryptology, 1997

1996
Diffie-Hellman Oracles.
Proceedings of the Advances in Cryptology, 1996

Towards Characterizing When Information-Theoretic Secret Key Agreement Is Possible.
Proceedings of the Advances in Cryptology, 1996


  Loading...