Orthogonal unitary bases and a subfactor conjecture

Jason Crann, David W. Kribs and Rajesh Pereira

Proc. Amer. Math. Soc. 151, no. 9, 3793–3799.

DOI: 10.1090/proc/16346

Quantum teleportation in the commuting operator framework

Alexandre Conlon, Jason Crann, David W. Kribs, and Rupert H. Levene

Ann. Henri Poincaré 24, no. 5, 1779-1821.

DOI: 10.1007/s00023-022-01255-0

Gaussian quantum information over general quantum kinematical systems I: Gaussian states

Cédric Bény, Jason Crann, Hun Hee Lee, Sang-Jun Park, and Sang-Gyun Youn

Preprint (2022).

arXiv: 2204.08162

Quantum private broadcasting

Anne Broadbent, Carlos E. Gonzalez-Guillen, and Christine Schuknecht

Physical Review A, 105(2).

DOI: 10.1103/PhysRevA.105.022606

Categorical composable cryptography

Anne Broadbent and Martti Karvonen

Preprint (2021).

arXiv: 2105.05949

Communication Memento: Memoryless Communication Complexity

Srinivasan Arunachalam and Supartha Podder

In 12th Innovations in Theoretical Computer Science Conference (ITCS 2021).

DOI: LIPIcs.ITCS.2021.61

Constructions for Quantum Indistinguishability Obfuscation

Anne Broadbent and Raza Ali Kazmi

In the Proceedings of the 7th International Concference on Cryptology and Information Security in Latin America (LATINCRYPT 2021).

DOI: 10.1007/978-3-030-88238-9_2

A monogamy-of-entanglement game for subspace coset states

Eric Culf and Thomas Vidick

Preprint (2021).

arXiv: 2017.13324

Rigidity for Monogamy-of-Entanglement Games

Anne Broadbent and Eric Culf

Preprint (2021).

arXiv: 2111.08081

Secure Software Leasing Without Assumptions

Anne Broadbent, Stacey Jeffrey, Sébastien Lord, Supartha Podder and Aarthi Sundaram

In the Proceedings of the 19th Theory of Cryptography Conference (TCC 2021).

DOI: 10.1007/978-3-030-90459-3_4

New Zémor-Tillich Type Hash Functions Over GL2 (𝔽pn)

Hayley Tomkins, Monica Nevins and Hadi Salmasian

Journal of Mathematical Cryptology 14 (2020).

DOI: 10.1515/jmc-2019-0033

QMA-hardness of Consistency of Local Density Matrices with Applications to Quantum Zero-Knowledge

Anne Broadbent and Alex B. Grilo

In Proceedings of the 61st IEEE Symposium on Foundations of Computer Science (FOCS 2020).

DOI: 10.1109/FOCS46700.2020.00027

Quantum encryption with certified deletion

Anne Broadbent and Rabib Islam

In Proceedings of the 18th Theory of Cryptography Conference (TCC 2020).

DOI: 10.1007/978-3-030-64381-2_4

State Convertibility in the von Neumann Algebra Framework

Jason Crann, David W. Kribs, Rupert H. Levene and Ivan G. Todorov

Commun. Math. Phys. 378, 1123–1156.

DOI: 10.1007/s00220-020-03803-3

Uncloneable Quantum Encryption via Oracles

Anne Broadbent and Sébastien Lord

In 15th Conference on the Theory of Quantum Computation, Communication and Cryptography (TQC 2020).

DOI: 10.4230/LIPIcs.TQC.2020.4

Symmetries, Graph Properties, and Quantum Speedups

Shalev Ben-David, Andrew M. Childs, András Gilyén, William Kretschmer, Supartha Podder, Daochen Wang

In Proceedings of the 61st IEEE Symposium on Foundations of Computer Science (FOCS 2020).

DOI: 10.1109/FOCS46700.2020.00066

Masters' Theses

Haag Duality in the Thermodynamic Limit of the Toric Code


Quintin Trayling

(not yet uploaded)

Quantum Teleporation: An Operator Algebraic Perspective


Alexandre Conlon

Carleton University Institutional Repository

Tensor Networks for Operator-Algebraic Constructions of Gauge Theories


Anna Gow

Carleton University Institutional Repository

Hidden Subgroup Problem: About Some Classical and Quantum Algorithms


Maria Perepechaenko

uO Research

Quantum Private Broadcasting


Christine Schuknecht

uO Research

Gaussian Quantum States in Discrete Phase Space


Zachary Zanussi

Caleton University Institutional Repository

Quantum Encryption with Certified Deletion


Rabib Islam

uO Research

Uncloneable Quantum Encryption via Random Oracles


Sébastien Lord

uO Research

Undergraduate Projects

The Hidden Subgroup Problem in Certain Nilpotent p-Groups


Anna B. Kis


Overview of the McEliece Cryptosystem and its Security


Nolive Gnan


Non-local games and Self-testing


Faouzi Al Haj Saeed


The Weyl Representation and Clifford Hierarchy with Applications to Gate Teleportation


Michael Sloan


A consideration of attacks and theory in code-based cryptography


Filip Stojanovic


An overview of symmetric alternant codes and the structural cryptanalysis of their corresponding McEliece schemes


Filip Stojanovic


Mutually Unbiased Bases


Abrar Kazi


A Partial Cryptanalysis of BIKE's Key Encapsulation Mechanism


Katarina Spasojevic


Security of the BB84 Quantum Key Distribution Protocol


Anna Gow

not uploaded

© QUASAR 2024