default search action
Stefan Wolf 0001
Person information
- affiliation: University of Lugano, Switzerland
- affiliation (former): ETH Zurich, Switzerland
Other persons with the same name
- Stefan Wolf — disambiguation page
- Stefan Wolf 0002 — Technical University of Dortmund, Germany
- Stefan Wolf 0003 — University of Bamberg, Germany
- Stefan Wolf 0004 — Infinera Corporation, Sunnyvale, CA, USA (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c44]Alberto Montina, Stefan Wolf:
Violation of Leggett-Garg inequalities implies information erasure. ISIT 2024: 783-788 - 2022
- [c43]Ämin Baumeler, Carla Rieger, Stefan Wolf:
Thermodynamics as Combinatorics: A Toy Theory. ITW 2022: 362-367 - [c42]Xavier Coiteux-Roy, Stefan Wolf:
Unconditional Proofs-of-Work and Other Possibilities of Thermodynamic Cryptography. ITW 2022: 452-457 - [i17]Ämin Baumeler, Carla Rieger, Stefan Wolf:
Thermodynamics as Combinatorics: A Toy Theory. CoRR abs/2205.07628 (2022) - [i16]Xavier Coiteux-Roy, Stefan Wolf:
Key Agreement and Oblivious Transfer from Free-Energy Limitations. CoRR abs/2206.01501 (2022) - [i15]Alberto Montina, Stefan Wolf:
An Algebraic-Geometry Approach to Prime Factorization. CoRR abs/2209.11650 (2022) - [i14]Xavier Coiteux-Roy, Stefan Wolf:
Unconditional Proofs-of-Work and Other Possibilities of Thermodynamic Cryptography. CoRR abs/2210.13278 (2022) - 2020
- [c41]Xavier Coiteux-Roy, Stefan Wolf:
On the Advantage of Irreversible Processes in Single-System Games. ISIT 2020: 1921-1926
2010 – 2019
- 2019
- [j19]Alberto Montina, Stefan Wolf:
Discrimination of Non-Local Correlations. Entropy 21(2): 104 (2019) - [c40]Xavier Coiteux-Roy, Stefan Wolf:
Proving Erasure. ISIT 2019: 832-836 - [i13]Xavier Coiteux-Roy, Stefan Wolf:
Proving Erasure. CoRR abs/1902.06656 (2019) - 2018
- [c39]Stefan Wolf:
Second Thoughts on the Second Law. Adventures Between Lower Bounds and Higher Altitudes 2018: 463-476 - 2017
- [j18]Ämin Baumeler, Stefan Wolf:
Non-Causal Computation. Entropy 19(7): 326 (2017) - [c38]Amin Baumeler, Charles Alexandre Bédard, Gilles Brassard, Stefan Wolf:
Kolmogorov amplification from Bell correlation. ISIT 2017: 1544-1558 - [c37]Stefan Wolf:
An All-or-Nothing Flavor to the Church-Turing Hypothesis. TAMC 2017: 39-56 - 2016
- [c36]Benno Salwey, Stefan Wolf:
Stronger attacks on causality-based key agreement. ISIT 2016: 2254-2258 - [i12]Ämin Baumeler, Stefan Wolf:
Non-causal computation avoiding the grandfather and information antinomies. CoRR abs/1601.06522 (2016) - [i11]Sacha Schwarz, André Stefanov, Stefan Wolf, Alberto Montina:
Optimal measurements for nonlocal correlations. CoRR abs/1602.05448 (2016) - [i10]Ämin Baumeler, Stefan Wolf:
Causality - Complexity - Consistency: Can Space-Time Be Based on Logic and Computation? CoRR abs/1602.06987 (2016) - [i9]Alberto Montina, Stefan Wolf:
Can non-local correlations be discriminated in polynomial time? CoRR abs/1609.06269 (2016) - [i8]Ämin Baumeler, Stefan Wolf:
Computational tameness of classical non-causal models. CoRR abs/1611.05641 (2016) - 2015
- [c35]Gilles Brassard, Benno Salwey, Stefan Wolf:
Non-locality distillation as cryptographic game. ITW 2015: 1-5 - [e2]Anja Lehmann, Stefan Wolf:
Information Theoretic Security - 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings. Lecture Notes in Computer Science 9063, Springer 2015, ISBN 978-3-319-17469-3 [contents] - [i7]Arne Hansen, Alberto Montina, Stefan Wolf:
Simple algorithm for computing the communication complexity of quantum communication processes. CoRR abs/1512.03257 (2015) - 2014
- [j17]Helen Ebbe, Stefan Wolf:
Multi-User Non-Locality Amplification. IEEE Trans. Inf. Theory 60(2): 1159-1167 (2014) - [c34]Amin Baumeler, Stefan Wolf:
Perfect signaling among three parties violating predefined causal order. ISIT 2014: 526-530 - [c33]Helen Ebbe, Stefan Wolf:
Trading permutation invariance for communication in multi-party non-locality distillation. ISIT 2014: 1479-1483 - [c32]Alberto Montina, Stefan Wolf:
Lower bounds on the communication complexity of two-party (quantum) processes. ISIT 2014: 1484-1488 - [i6]Alberto Montina, Stefan Wolf:
Lower bounds on the communication complexity of two-party (quantum) processes. CoRR abs/1401.4126 (2014) - [i5]Alberto Montina, Stefan Wolf:
Necessary and sufficient optimality conditions for classical simulations of quantum communication processes. CoRR abs/1402.6299 (2014) - 2013
- [j16]Nicolas Gisin, Sandu Popescu, Valerio Scarani, Stefan Wolf, Jürg Wullschleger:
Oblivious transfer and quantum channels as communication resources. Nat. Comput. 12(1): 13-17 (2013) - [j15]Viktor Galliard, Alain Tapp, Stefan Wolf:
Deterministic quantum non-locality and graph colorings. Theor. Comput. Sci. 486: 20-26 (2013) - [j14]Esther Hänggi, Renato Renner, Stefan Wolf:
The impossibility of non-signaling privacy amplification. Theor. Comput. Sci. 486: 27-42 (2013) - [j13]Renato Renner, Stefan Wolf:
Towards characterizing the non-locality of entangled quantum states. Theor. Comput. Sci. 486: 50-60 (2013) - [j12]Gilles Brassard, Anne Broadbent, Esther Hänggi, André Allan Méthot, Stefan Wolf:
Classical, quantum and nonsignalling resources in bipartite games. Theor. Comput. Sci. 486: 61-72 (2013) - [c31]Helen Ebbe, Stefan Wolf:
Distillation of multi-party non-locality with and without partial communication. ISIT 2013: 739-743 - [c30]Alberto Montina, Marcel Pfaffhauser, Stefan Wolf:
Classical communication rates for simulating quantum resources. ISIT 2013: 744-748 - [i4]Alberto Montina, Marcel Pfaffhauser, Stefan Wolf:
Computing the Communication Complexity of Quantum Channels. CoRR abs/1301.4441 (2013) - [i3]Alberto Montina, Stefan Wolf:
Information-based measure of nonlocality. CoRR abs/1312.6290 (2013) - 2011
- [j11]Severin Winkler, Jürg Wullschleger, Stefan Wolf:
Bit Commitment From Nonsignaling Correlations. IEEE Trans. Inf. Theory 57(3): 1770-1779 (2011) - [e1]Ivana Cerná, Tibor Gyimóthy, Juraj Hromkovic, Keith G. Jeffery, Rastislav Královic, Marko Vukolic, Stefan Wolf:
SOFSEM 2011: Theory and Practice of Computer Science - 37th Conference on Current Trends in Theory and Practice of Computer Science, Nový Smokovec, Slovakia, January 22-28, 2011. Proceedings. Lecture Notes in Computer Science 6543, Springer 2011, ISBN 978-3-642-18380-5 [contents] - 2010
- [c29]Esther Hänggi, Renato Renner, Stefan Wolf:
Efficient Device-Independent Quantum Key Distribution. EUROCRYPT 2010: 216-234
2000 – 2009
- 2008
- [j10]Stefan Wolf, Jürg Wullschleger:
New Monotones and Lower Bounds in Unconditional Two-Party Computation. IEEE Trans. Inf. Theory 54(6): 2792-2797 (2008) - [j9]Hugues Mercier, Pierre McKenzie, Stefan Wolf:
Worst Case Nonzero-Error Interactive Communication. IEEE Trans. Inf. Theory 54(7): 2857-2867 (2008) - [c28]Gilles Brassard, Anne Broadbent, Esther Hänggi, André Allan Méthot, Stefan Wolf:
Classical, Quantum and Non-signalling Resources in Bipartite Games. ICQNM 2008: 80-89 - 2007
- [c27]Renato Renner, Stefan Wolf, Jürg Wullschleger:
Trade-Offs in Information-Theoretic Multi-party One-Way Key Agreement. ICITS 2007: 65-75 - 2006
- [c26]Stefan Wolf, Jürg Wullschleger:
Oblivious Transfer Is Symmetric. EUROCRYPT 2006: 222-232 - [c25]Matthias Fitzi, Stefan Wolf, Jürg Wullschleger:
On the Power of Imperfect Broadcast. ISIT 2006: 504-505 - [c24]Renato Renner, Stefan Wolf, Jürg Wullschleger:
The Single-Serving Channel Capacity. ISIT 2006: 1424-1427 - [c23]Nicolas Gisin, Sandu Popescu, Valerio Scarani, Stefan Wolf, Jürg Wullschleger:
Oblivious Transfer and Quantum Channels. ITW 2006: 24-26 - [i2]Renato Renner, Stefan Wolf, Jürg Wullschleger:
The single-serving channel capacity. CoRR abs/cs/0608018 (2006) - 2005
- [c22]Renato Renner, Stefan Wolf:
Simple and Tight Bounds for Information Reconciliation and Privacy Amplification. ASIACRYPT 2005: 199-216 - [c21]Stefan Wolf, Jürg Wullschleger:
New Monotones and Lower Bounds in Unconditional Two-Party Computation. CRYPTO 2005: 467-477 - [c20]Stefan Wolf, Jürg Wullschleger:
Bit commitment from weak non-locality. ICITS 2005: 28-30 - [c19]Hugues Mercier, Pierre McKenzie, Stefan Wolf:
Worst-case randomized interactive communication. ISIT 2005: 430-434 - [c18]Stefan Wolf, Jürg Wullschleger:
Oblivious transfer and quantum non-locality. ISIT 2005: 1745-1748 - 2004
- [c17]Matthias Fitzi, Stefan Wolf, Jürg Wullschleger:
Pseudo-signatures, Broadcast, and Multi-party Computation from Correlated Randomness. CRYPTO 2004: 562-578 - [c16]Renato Renner, Stefan Wolf:
The Exact Price for Unconditionally Secure Asymmetric Cryptography. EUROCRYPT 2004: 109-125 - [c15]Renato Renner, Stefan Wolf:
Smooth Renyi entropy and applications. ISIT 2004: 233 - [c14]Renato Renner, Stefan Wolf:
Quantum pseudo-telepathy and the kochen-specker theorem. ISIT 2004: 322 - [c13]Stefan Wolf, Jürg Wullschleger:
Zero-error information and applications in cryptography. ITW 2004: 1-6 - [c12]Claude Crépeau, Kirill Morozov, Stefan Wolf:
Efficient Unconditional Oblivious Transfer from Almost Any Noisy Channel. SCN 2004: 47-59 - [i1]Stefan Wolf, Jürg Wullschleger:
Oblivious Transfer Is Symmetric. IACR Cryptol. ePrint Arch. 2004: 336 (2004) - 2003
- [j8]Gilles Brassard, Claude Crépeau, Stefan Wolf:
Oblivious Transfers and Privacy Amplification. J. Cryptol. 16(4): 219-237 (2003) - [j7]Ueli M. Maurer, Stefan Wolf:
Secret-key agreement over unauthenticated public channels I: Definitions and a completeness result. IEEE Trans. Inf. Theory 49(4): 822-831 (2003) - [j6]Ueli M. Maurer, Stefan Wolf:
Secret-key agreement over unauthenticated public channels II: the simulatability condition. IEEE Trans. Inf. Theory 49(4): 832-838 (2003) - [j5]Ueli M. Maurer, Stefan Wolf:
Secret-key agreement over unauthenticated public channels III: Privacy amplification. IEEE Trans. Inf. Theory 49(4): 839-851 (2003) - [c11]Renato Renner, Stefan Wolf:
Unconditional Authenticity and Privacy from an Arbitrarily Weak Secret. CRYPTO 2003: 78-95 - [c10]Renato Renner, Stefan Wolf:
New Bounds in Secret-Key Agreement: The Gap between Formation and Secrecy Extraction. EUROCRYPT 2003: 562-577 - 2002
- [j4]Nicolas Gisin, Renato Renner, Stefan Wolf:
Linking Classical and Quantum Key Agreement: Is There a Classical Analog to Bound Entanglement? Algorithmica 34(4): 389-412 (2002) - 2000
- [j3]Ueli M. Maurer, Stefan Wolf:
The Diffie-Hellman Protocol. Des. Codes Cryptogr. 19(2/3): 147-171 (2000) - [c9]Nicolas Gisin, Stefan Wolf:
Linking Classical and Quantum Key Agreement: Is There "Bound Information"? CRYPTO 2000: 482-500 - [c8]Ueli M. Maurer, Stefan Wolf:
Information-Theoretic Key Agreement: From Weak to Strong Secrecy for Free. EUROCRYPT 2000: 351-368
1990 – 1999
- 1999
- [j2]Ueli M. Maurer, Stefan Wolf:
The Relationship Between Breaking the Diffie-Hellman Protocol and Computing Discrete Logarithms. SIAM J. Comput. 28(5): 1689-1721 (1999) - [j1]Ueli M. Maurer, Stefan Wolf:
Unconditionally Secure Key Agreement and the Intrinsic Conditional Information. IEEE Trans. Inf. Theory 45(2): 499-514 (1999) - [c7]Anna Lysyanskaya, Ronald L. Rivest, Amit Sahai, Stefan Wolf:
Pseudonym Systems. Selected Areas in Cryptography 1999: 184-199 - 1998
- [c6]Stefan Wolf:
Unconditional Security in Cryptography. Lectures on Data Security 1998: 217-250 - [c5]Stefan Wolf:
Strong Security Against Active Attacks in Information-Theoretic Secret-Key Agreement. ASIACRYPT 1998: 405-419 - [c4]Ueli M. Maurer, Stefan Wolf:
Lower Bounds on Generic Algorithms in Groups. EUROCRYPT 1998: 72-84 - 1997
- [c3]Ueli M. Maurer, Stefan Wolf:
Privacy Amplification Secure Against Active Adversaries. CRYPTO 1997: 307-321 - 1996
- [c2]Ueli M. Maurer, Stefan Wolf:
Towards Characterizing When Information-Theoretic Secret Key Agreement Is Possible. ASIACRYPT 1996: 196-209 - [c1]Ueli M. Maurer, Stefan Wolf:
Diffie-Hellman Oracles. CRYPTO 1996: 268-282
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-21 20:28 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint