Stefan Wolf
Orcid: 0000-0001-6823-3255Affiliations:
- University of Lugano, Switzerland
- ETH Zurich, Switzerland (former)
According to our database1,
Stefan Wolf
authored at least 73 papers
between 1996 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
Proceedings of the IEEE International Symposium on Information Theory, 2024
2022
Proceedings of the IEEE Information Theory Workshop, 2022
Proceedings of the IEEE Information Theory Workshop, 2022
2020
Proceedings of the IEEE International Symposium on Information Theory, 2020
2019
Proceedings of the IEEE International Symposium on Information Theory, 2019
2018
Proceedings of the Adventures Between Lower Bounds and Higher Altitudes, 2018
2017
Proceedings of the Theory and Applications of Models of Computation, 2017
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017
2016
Causality - Complexity - Consistency: Can Space-Time Be Based on Logic and Computation?
CoRR, 2016
CoRR, 2016
Proceedings of the IEEE International Symposium on Information Theory, 2016
2015
Simple algorithm for computing the communication complexity of quantum communication processes.
CoRR, 2015
Proceedings of the 2015 IEEE Information Theory Workshop, 2015
2014
Necessary and sufficient optimality conditions for classical simulations of quantum communication processes.
CoRR, 2014
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014
Trading permutation invariance for communication in multi-party non-locality distillation.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014
2013
Theor. Comput. Sci., 2013
Theor. Comput. Sci., 2013
Nat. Comput., 2013
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013
2011
2010
Proceedings of the Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30, 2010
2008
IEEE Trans. Inf. Theory, 2008
Proceedings of the Second International Conference on Quantum, 2008
2007
Proceedings of the Information Theoretic Security - Second International Conference, 2007
2006
Proceedings of the 2006 IEEE Information Theory Workshop, 2006
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006
2005
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005
Proceedings of the IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security, 2005
Proceedings of the Advances in Cryptology, 2005
2004
Proceedings of the Security in Communication Networks, 4th International Conference, 2004
Proceedings of the 2004 IEEE Information Theory Workshop, 2004
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004
Proceedings of the Advances in Cryptology, 2004
Pseudo-signatures, Broadcast, and Multi-party Computation from Correlated Randomness.
Proceedings of the Advances in Cryptology, 2004
2003
Secret-key agreement over unauthenticated public channels III: Privacy amplification.
IEEE Trans. Inf. Theory, 2003
Secret-key agreement over unauthenticated public channels II: the simulatability condition.
IEEE Trans. Inf. Theory, 2003
Secret-key agreement over unauthenticated public channels I: Definitions and a completeness result.
IEEE Trans. Inf. Theory, 2003
New Bounds in Secret-Key Agreement: The Gap between Formation and Secrecy Extraction.
Proceedings of the Advances in Cryptology, 2003
Proceedings of the Advances in Cryptology, 2003
2002
Linking Classical and Quantum Key Agreement: Is There a Classical Analog to Bound Entanglement?
Algorithmica, 2002
2000
Proceedings of the Advances in Cryptology, 2000
Proceedings of the Advances in Cryptology, 2000
1999
IEEE Trans. Inf. Theory, 1999
The Relationship Between Breaking the Diffie-Hellman Protocol and Computing Discrete Logarithms.
SIAM J. Comput., 1999
Proceedings of the Selected Areas in Cryptography, 6th Annual International Workshop, 1999
1998
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998
Strong Security Against Active Attacks in Information-Theoretic Secret-Key Agreement.
Proceedings of the Advances in Cryptology, 1998
Proceedings of the Lectures on Data Security, 1998
1997
Proceedings of the Advances in Cryptology, 1997
1996
Proceedings of the Advances in Cryptology, 1996