ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1102.0887
  4. Cited By
Fully Simulatable Quantum-Secure Coin-Flipping and Applications
v1v2v3 (latest)

Fully Simulatable Quantum-Secure Coin-Flipping and Applications

International Conference on Cryptology in Africa (Africacrypt), 2011
4 February 2011
Carolin Lunemann
J. Nielsen
ArXiv (abs)PDFHTML

Papers citing "Fully Simulatable Quantum-Secure Coin-Flipping and Applications"

8 / 8 papers shown
Post-Quantum Simulatable Extraction with Minimal Assumptions: Black-Box
  and Constant-Round
Post-Quantum Simulatable Extraction with Minimal Assumptions: Black-Box and Constant-Round
Nai-Hui Chia
Kai-Min Chung
Xiao Liang
Takashi Yamakawa
323
9
0
16 Nov 2021
Oblivious Transfer is in MiniQCrypt
Oblivious Transfer is in MiniQCryptIACR Cryptology ePrint Archive (IACR ePrint), 2020
A. Grilo
Huijia Lin
F. Song
Vinod Vaikuntanathan
300
69
0
30 Nov 2020
Post-Quantum Multi-Party Computation
Post-Quantum Multi-Party Computation
Amit Agarwal
James Bartusek
Vipul Goyal
Dakshita Khurana
Giulio Malavolta
217
8
0
23 May 2020
Post-quantum Zero Knowledge in Constant Rounds
Post-quantum Zero Knowledge in Constant RoundsIACR Cryptology ePrint Archive (IACR ePrint), 2019
Nir Bitansky
Omri Shmueli
184
51
0
10 Dec 2019
Zero-knowledge proof systems for QMA
Zero-knowledge proof systems for QMA
Anne Broadbent
Zhengfeng Ji
F. Song
John Watrous
163
56
0
11 Apr 2016
Classical Cryptographic Protocols in a Quantum World
Classical Cryptographic Protocols in a Quantum WorldIACR Cryptology ePrint Archive (IACR ePrint), 2011
Sean Hallgren
Adam D. Smith
F. Song
155
66
0
06 Jul 2015
A Note on Quantum Security for Post-Quantum Cryptography
A Note on Quantum Security for Post-Quantum CryptographyPost-Quantum Cryptography (PQCrypto), 2014
F. Song
246
83
0
08 Sep 2014
Cryptographic Protocols under Quantum Attacks
Cryptographic Protocols under Quantum Attacks
Carolin Lunemann
310
2
0
04 Feb 2011
1
Page 1 of 1