2006 |
22 | EE | Charles H. Bennett:
Quantum Cryptography: Principles and Prospects (Quantumkryptographie: Prinzipien und Ausblick).
it - Information Technology 48(6): 332- (2006) |
2005 |
21 | EE | Charles H. Bennett,
Patrick M. Hayden,
Debbie W. Leung,
Peter W. Shor,
Andreas J. Winter:
Remote preparation of quantum states.
IEEE Transactions on Information Theory 51(1): 56-74 (2005) |
2003 |
20 | EE | Charles H. Bennett:
Improvements to time bracketed authentication
CoRR cs.CR/0308026: (2003) |
19 | | Charles H. Bennett,
Aram Wettroth Harrow,
Debbie W. Leung,
John A. Smolin:
On the capacities of bipartite Hamiltonians and unitary gates.
IEEE Transactions on Information Theory 49(8): 1895-1911 (2003) |
2002 |
18 | EE | Charles H. Bennett,
John A. Smolin:
Trust enhancement by multiple random beacons
CoRR cs.CR/0201003: (2002) |
17 | | Charles H. Bennett,
Peter W. Shor,
John A. Smolin,
Ashish V. Thapliyal:
Entanglement-assisted capacity of a quantum channel and the reverse Shannon theorem.
IEEE Transactions on Information Theory 48(10): 2637-2655 (2002) |
2000 |
16 | EE | Charles H. Bennett:
Rolf Landauer - in Memoriam.
Appl. Algebra Eng. Commun. Comput. 10(4/5): 273-276 (2000) |
15 | EE | Charles H. Bennett:
Notes on the history of reversible computation.
IBM Journal of Research and Development 44(1): 270-278 (2000) |
1998 |
14 | | Charles H. Bennett,
Péter Gács,
Ming Li,
Paul M. B. Vitányi,
Wojciech H. Zurek:
Information Distance.
IEEE Transactions on Information Theory 44(4): 1407-1423 (1998) |
13 | | Charles H. Bennett,
Peter W. Shor:
Quantum Information Theory.
IEEE Transactions on Information Theory 44(6): 2724-2742 (1998) |
1997 |
12 | | Charles H. Bennett,
Ethan Bernstein,
Gilles Brassard,
Umesh V. Vazirani:
Strengths and Weaknesses of Quantum Computing.
SIAM J. Comput. 26(5): 1510-1523 (1997) |
1995 |
11 | | Charles H. Bennett,
Gilles Brassard,
Claude Crépeau,
Ueli M. Maurer:
Generalized privacy amplification.
IEEE Transactions on Information Theory 41(6): 1915-1923 (1995) |
1993 |
10 | EE | Charles H. Bennett,
Péter Gács,
Ming Li,
Paul M. B. Vitányi,
Wojciech H. Zurek:
Thermodynamics of computation and information distance.
STOC 1993: 21-30 |
1992 |
9 | | Charles H. Bennett,
François Bessette,
Gilles Brassard,
Louis Salvail,
John A. Smolin:
Experimental Quantum Cryptography.
J. Cryptology 5(1): 3-28 (1992) |
1991 |
8 | EE | Charles H. Bennett,
Gilles Brassard,
Claude Crépeau,
Marie-Hélène Skubiszewska:
Practical Quantum Oblivious Transfer.
CRYPTO 1991: 351-366 |
1990 |
7 | EE | Charles H. Bennett,
François Bessette,
Gilles Brassard,
Louis Salvail,
John A. Smolin:
Experimental Quantum Cryptography.
EUROCRYPT 1990: 253-265 |
1989 |
6 | | Charles H. Bennett:
Time/Space Trade-Offs for Reversible Computation.
SIAM J. Comput. 18(4): 766-776 (1989) |
1988 |
5 | | Charles H. Bennett,
Gilles Brassard,
Jean-Marc Robert:
Privacy Amplification by Public Discussion.
SIAM J. Comput. 17(2): 210-229 (1988) |
1985 |
4 | EE | Charles H. Bennett,
Gilles Brassard,
Jean-Marc Robert:
How to Reduce Your Enemy's Information (Extended Abstract).
CRYPTO 1985: 468-476 |
1984 |
3 | EE | Charles H. Bennett,
Gilles Brassard:
An Update on Quantum Cryptography.
CRYPTO 1984: 475-480 |
1982 |
2 | | Charles H. Bennett,
Gilles Brassard,
Seth Breidbard,
Stephen Wiesner:
Quantum Cryptography, or Unforgeable Subway Tokens.
CRYPTO 1982: 267-275 |
1981 |
1 | | Charles H. Bennett,
John Gill:
Relative to a Random Oracle A, P^A != NP^A != co-NP^A with Probability 1.
SIAM J. Comput. 10(1): 96-113 (1981) |