Gilles Brassard
#3,205
Most Influential Person Now
Canadian computer scientist
Gilles Brassard's AcademicInfluence.com Rankings
Gilles Brassardcomputer-science Degrees
Computer Science
#233
World Rank
#243
Historical Rank
Database
#179
World Rank
#185
Historical Rank
Download Badge
Computer Science
Gilles Brassard's Degrees
- PhD Computer Science Cornell University
- Masters Computer Science Cornell University
Similar Degrees You Can Earn
Why Is Gilles Brassard Influential?
(Suggest an Edit or Addition)According to Wikipedia, Gilles Brassard, is a faculty member of the Université de Montréal, where he has been a Full Professor since 1988 and Canada Research Chair since 2001. Education and early life Brassard received a Ph.D. in Computer Science from Cornell University in 1979, working in the field of cryptography with John Hopcroft as his advisor.
Gilles Brassard's Published Works
Published Works
- Quantum cryptography: Public key distribution and coin tossing (2011) (6396)
- Generalized privacy amplification (1994) (1400)
- Quantum Amplitude Amplification and Estimation (2000) (1345)
- Experimental quantum cryptography (1991) (1314)
- Strengths and Weaknesses of Quantum Computing (1997) (1298)
- Tight bounds on quantum searching (1996) (1167)
- Minimum Disclosure Proofs of Knowledge (1988) (1000)
- Privacy Amplification by Public Discussion (1988) (879)
- Secret-Key Reconciliation by Public Discussion (1994) (819)
- Security aspects of practical quantum cryptography (1999) (554)
- Quantum Counting (1998) (413)
- Teleporting an unknown quantum state via dual classical and EPR channels (1993) (365)
- All-or-Nothing Disclosure of Secrets (1986) (338)
- Fundamentals of Algorithmics (1995) (315)
- Limit on nonlocality in any world in which communication complexity is not trivial. (2005) (307)
- Quantum cryptanalysis of hash and claw-free functions (1997) (274)
- An exact quantum polynomial-time algorithm for Simon's problem (1997) (274)
- Practical Quantum Oblivious Transfer (1991) (251)
- Algorithmics - theory and practice (1988) (232)
- Quantum Cryptography, or Unforgeable Subway Tokens (1982) (229)
- Cost of Exactly Simulating Quantum Entanglement with Classical Communication (1999) (225)
- A quantum bit commitment scheme provably unbreakable by both parties (1993) (197)
- Information theoretic reductions among disclosure problems (1986) (186)
- Quantum speed-up for unsupervised learning (2013) (178)
- Quantum Pseudo-Telepathy (2004) (175)
- Teleportation as a quantum computation (1996) (161)
- Experimental quantum cryptography: the dawn of a new era for quantum cryptography: the experimental prototype is working] (1989) (151)
- Machine Learning in a Quantum World (2006) (151)
- Quantum Communication Complexity (2003) (131)
- Alambic: a privacy-preserving recommender system for electronic commerce (2008) (126)
- An Update on Quantum Cryptography (1985) (125)
- Non-transitive transfer of confidence: A perfect zero-knowledge interactive protocol for SAT and beyond (1986) (125)
- Oracle Quantum Computing (1992) (122)
- Quantum Bit Commitment and Coin Tossing Protocols (1990) (120)
- Oblivious transfers and intersecting codes (1996) (106)
- On Computationally Secure Authentication Tags Requiring Short Secret Shared Keys (1982) (105)
- Zero-Knowledge Simulation of Boolean Circuits (1986) (104)
- The quantum challenge to structural complexity theory (1992) (98)
- Quantum computing without entanglement (2003) (94)
- Quantum Algorithm for the Collision Problem (1997) (93)
- Modern Cryptology (1988) (91)
- A note on the complexity of cryptography (Corresp.) (1979) (89)
- CAN QUANTUM-MECHANICAL DESCRIPTION OF PHYSICAL REALITY BE CONSIDERED INCOMPLETE? (2006) (88)
- Searching a Quantum Phone Book (1997) (88)
- Security of Quantum Key Distribution against All Collective Attacks (1998) (84)
- Quantum clustering algorithms (2007) (83)
- Modern Cryptology: A Tutorial (1989) (81)
- Advances in Cryptology — CRYPTO’ 89 Proceedings (2001) (79)
- Brief history of quantum cryptography: a personal perspective (2005) (79)
- Secure implementation of identification systems (2004) (78)
- Oblivious Transfers and Privacy Amplification (1997) (78)
- Relativized cryptography (1979) (70)
- Constant-Round Perfect Zero-Knowledge Computationally Convincing Protocols (1991) (70)
- Everything in NP can be Argued in Perfect Zero-Knowledge in a Bounded Number of Rounds (1989) (52)
- How to reduce your enemy's information (1986) (51)
- Anonymous Quantum Communication (2007) (49)
- A brief review on the impossibility of quantum bit commitment (1997) (49)
- Multiuser quantum key distribution using wavelength division multiplexing (2003) (48)
- Defeating classical bit commitments with a quantum computer (1998) (47)
- An optimal quantum algorithm to approximate the mean and its application for approximating the median of a set of points over an arbitrary distance (2011) (47)
- 25 years of quantum cryptography (1996) (46)
- Quantum Cryptography II: How to re-use a one-time pad safely even if P=NP (2014) (41)
- Quantum public key distribution reinvented (1987) (40)
- Experimental Demonstration of a Hybrid Privacy-Preserving Recommender System (2008) (40)
- Is information the key? (2005) (40)
- Fundamentals of algorithms (1996) (39)
- Privacy-preserving demographic filtering (2006) (39)
- Recasting mermin's multi-player game into the framework of pseudo-telepathy (2004) (38)
- Multi-party Pseudo-Telepathy (2003) (37)
- CLARISSE: A Machine Learning Tool to Initialize Student Models (2002) (36)
- Can Free Will Emerge from Determinism in Quantum Theory (2012) (36)
- Merkle Puzzles in a Quantum World (2011) (36)
- Algorithmics: theory & practice (1988) (35)
- Quantum communication complexity: a survey (2001) (34)
- Entanglement cost of nonlocal measurements (2008) (33)
- A Quantum Jump in Computer Science (1995) (33)
- Experimental loss-tolerant quantum coin flipping (2011) (32)
- Fair Loss-Tolerant Quantum Coin Flipping (2009) (32)
- Minimum entangled state dimension required for pseudo-telepathy (2004) (32)
- Sorting out Zero-Knowledge (1990) (30)
- Reduction of Quantum Entropy by Reversible Extraction of Classical Information (1994) (30)
- Quantum Merkle Puzzles (2008) (29)
- Everything in NP can be Argued in Perfect Zero-Knowledge in a Bounded Number of Rounds (Extended Abstract) (1989) (27)
- How to Reduce Your Enemy's Information (Extended Abstract) (1985) (26)
- Quantum computing: the end of classical cryptography? (1994) (25)
- Can Quantum-Mechanical Description of Physical Reality Be Considered Correct? (2006) (25)
- Subquadratic zero-knowledge (1991) (25)
- Quantum computing. (1998) (24)
- A Quantum Information Science and Technology Roadmap Part 2 : Quantum Cryptography (2004) (24)
- Experimental heat-bath cooling of spins (2005) (23)
- Parallel Lives: A Local-Realistic Interpretation of “Nonlocal” Boxes (2017) (21)
- Quantum Arithmetic on Galois Fields (2003) (20)
- Noisy Interactive Quantum Communication (2013) (20)
- The Generation of Random Permutations on the Fly (1988) (18)
- Computationally Convincing Proofs of Knowledge (1991) (17)
- Personal knowledge publishing: fostering interdisciplinary communication (2005) (16)
- TelePOVM - A generalized quantum teleportation scheme (2004) (16)
- The equivalence of local-realistic and no-signalling theories (2017) (16)
- The generation of random numbers that are probably prime (1988) (16)
- Cryptology Column --- 25 Years of Quantum Cryptography (1996) (16)
- New Trends in Quantum Computing (1996) (16)
- Quantum cryptography via parametric downconversion (1999) (15)
- Secure Implementations of Identification Systems (1991) (15)
- Loss-Tolerant Quantum Coin Flipping (2008) (15)
- One-Way Group Actions (1990) (15)
- Multi-particle Entanglement via Two-Particle Entanglement (1998) (14)
- Advances in Cryptology - CRYPTO '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings (1990) (14)
- A generalization of Hellman's extension to Shannon's approach to cryptography (1988) (14)
- Quantum information: The conundrum of secure positioning (2011) (14)
- Multi-User Quantum Key Distribution Using Wavelength Division Multiplexing (2003) (14)
- Flipping quantum coins (2009) (13)
- Cryptography in a Quantum World (2015) (13)
- On The Power of Exact Quantum Polynomial Time (1996) (13)
- Quantum Information Processing: The Good, the Bad and the Ugly (1997) (12)
- Prospects and limitations of algorithmic cooling (2014) (12)
- Provably Secure Key Establishment Against Quantum Adversaries (2017) (11)
- Entanglement and Wavelength Division Multiplexing for Quantum Cryptography Networks (2004) (11)
- Generalized Privacy Ampliication (1995) (11)
- Kolmogorov amplification from Bell correlation (2017) (10)
- Reconstructing Profiles from Information Disseminated on the Internet (2012) (9)
- Anonymous Quantum Communication - (Extended Abstract) (2009) (9)
- A Note on Cryptography and NPnCoNP-P, (1978) (8)
- Simulating Equatorial Measurements on GHZ States with Finite Expected Communication Cost (2011) (7)
- New Horizons in Quantum Information Processing (1998) (7)
- Time for another paradigm shift (1995) (6)
- Two Observations on Probabilistic Primality Testing (1986) (6)
- Blind sales in electronic commerce (2004) (6)
- Exact Classical Simulation of the Quantum-Mechanical GHZ Distribution (2016) (6)
- Algorithms for very large integer arithmetic (1986) (5)
- SECURE ANONYMOUS PHYSICAL DELIVERY (2006) (5)
- How convincing is your protocol? (1991) (5)
- A Time-Luck Tradeoff in Relativized Cryptography (1981) (5)
- Key Establishment à la Merkle in a Quantum World (2011) (4)
- Blind Electronic Commerce (2006) (4)
- Tight bounds on quantum searching Michel Boyer (1996) (4)
- Blind Negotiation in Electronic Commerce (2004) (3)
- Multi-particle entanglement via two-party entanglement (2001) (3)
- How to Improve Signature Schemes (1990) (3)
- An optimally secure relativized cryptosystem (1983) (3)
- Technical perspective: Was Edgar Allan Poe wrong after all? (2019) (3)
- Cryptology — column 4: hiding information from oracles (1990) (3)
- What happened ? The Impending Demise of RSA ? (1996) (2)
- Cryptology - column 3 hot news on interactive protocols (1990) (2)
- Classical, Quantum and Non-signalling Resources in Bipartite Games (2008) (2)
- An introduction to minimum disclosure (1988) (2)
- Remote Sampling with Applications to General Entanglement Simulation (2018) (2)
- A time-luck tradeoff in cryptography (1980) (2)
- Advances in Cryptology (1990) (2)
- A Tribute to David Kahn (2009) (1)
- Simple and Rigorous Proof Method for the Security of Practical Quantum Key Distribution in the Single-Qubit Regime Using Mismatched Basis Measurements (2022) (1)
- Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology (1989) (1)
- Non-locality distillation as cryptographic game (2015) (1)
- Oblivious Transfer à la Merkle (2009) (1)
- "Practical IP" <= MA (1988) (1)
- A ug 2 01 1 Merkle Puzzles in a Quantum World ∗ (2013) (1)
- Strict Hierarchy of Bell Theorems (2008) (1)
- P3ERS: Privacy-Preserving PEer Review System (2012) (1)
- XX : 2 Provably secure key establishment against quantum adversaries (2018) (1)
- Strict hierarchy among Bell Theorems (2013) (1)
- CLiKC: A Privacy-Mindful Approach When Sharing Data (2016) (1)
- Cryptology column (1989) (1)
- Underlying subject of the PROJECT assignment : QUANTUM ENTANGLEMENT Fundamentals : EPR ’ s view on the completeness of the Quantum Theory , Bell inequalities Implementation : Optical experiments using down-conversion nonlinear processes Application : Quantum states teleportation (2015) (0)
- 2 Various degrees of cheat ing for provers (2005) (0)
- 15 6 v 1 1 6 N ov 2 00 5 Experimental Heat-Bath Cooling of Spins (2008) (0)
- Quantum Algorithms (2018) (0)
- A pr 2 01 4 Experimental Heat-Bath Cooling of Spins (2019) (0)
- Simple and Rigorous Proof Method for Practical Security of Quantum Key Distribution in the Single-Qubit Regime Using Mismatched Basis Measurements (2022) (0)
- Cryptology Column: The Book I've Always Wanted To Write (Almost) (1995) (0)
- How data brokers endanger privacy (2022) (0)
- qu an tph / 9 80 30 07 v 3 2 3 M ay 1 99 8 Efficient Quantum Key Distribution (1998) (0)
- Quantum speed-up for unsupervised learning (2012) (0)
- Cryptology in Academia: A Ten Year Retrospective (1987) (0)
- Cryptology - column 2 (1989) (0)
- Towards a New Knowledge Elicitation Algorithm (2003) (0)
- A Fair Loss‐Tolerant Quantum Coin Flipping Protocol (2009) (0)
- 2 Merkle ’ s Original Scheme and How to Break and Partially Repair (2011) (0)
- And God said, let there be confidentiality (2006) (0)
- Relativity could ensure security for cash machines (2021) (0)
- Noisy Interactive Quantum Communication ( Extended Abstract ) (2014) (0)
- in bipartite games (2007) (0)
- Quantum computingwithout entang lement (2004) (0)
- Prospects and limitations of algorithmic cooling (2014) (0)
- J ul 2 01 4 Quantum Cryptography II : How to re-use a one-time pad safely even if (2020) (0)
- Was Edgar Allan Poe wrong after all?: technical perspective (2019) (0)
- The cost of exactly simulating quantum entanglementwith classical communicationGilles Brassard (1999) (0)
- Titre : Title : Experimental loss-tolerant quantum coin flipping Auteurs : (2018) (0)
- Quantum Algorithms (Dagstuhl Seminar 98191) (2021) (0)
- Algorithms: conception and analysis (1987) (0)
- Transitive Transfer of Conndence: a Per- Fect Zero-knowledge Interactive Proto- Col for Sat and Beyond. 5.1 Additional Security for the User (1997) (0)
- Quantum Cryptography II: How to re-use a one-time pad safely even if P=NP (2014) (0)
- Secure Implementation of Identification Systems 1 (1991) (0)
- Oracle Quantum ComputingAndr (1992) (0)
- Exact Classical Simulation of the GHZ Distribution (2014) (0)
- 4.4 Security for the Merchant (2007) (0)
- How to Teach Quantum Information Processing : A Challenge for e-Education (2002) (0)
- About the quantum mechanical speeding up of classical algorithms (2020) (0)
- Key Establishment à la Merkle in a Quantum World (2019) (0)
- A Generalization of Hellman's Extension of Shannon's Approach to Cryptography (Abstract) (1987) (0)
This paper list is powered by the following services:
Other Resources About Gilles Brassard
What Schools Are Affiliated With Gilles Brassard?
Gilles Brassard is affiliated with the following schools: