Sign in
Luka Music
Publication Activity (10 Years)
Years Active: 2017-2023
Publications (10 Years): 11
Top Topics
Malicious Nodes
Quantum Computing
Dos Attacks
Designated Verifier
Top Venues
CoRR
IACR Cryptol. ePrint Arch.
Des. Codes Cryptogr.
ProvSec
</>
Publications
</>
Theodoros Kapourniotis
,
Elham Kashefi
,
Dominik Leichtle
,
Luka Music
,
Harold Ollivier
Asymmetric Quantum Secure Multi-Party Computation With Weak Clients Against Dishonest Majority.
CoRR
(2023)
Nicolas Heurtel
,
Andreas Fyrillas
,
Grégoire de Gliniasty
,
Raphaël Le Bihan
,
Sébastien Malherbe
,
Marceau Pailhas
,
Eric Bertasi
,
Boris Bourdoncle
,
Pierre-Emmanuel Emeriau
,
Rawad Mezher
,
Luka Music
,
Nadia Belabas
,
Benoît Valiron
,
Pascale Senellart
,
Shane Mansfield
,
Jean Senellart
Perceval: A Software Platform for Discrete Variable Photonic Quantum Computing.
Quantum
7 (2023)
Theodoros Kapourniotis
,
Elham Kashefi
,
Dominik Leichtle
,
Luka Music
,
Harold Ollivier
Asymmetric Quantum Secure Multi-Party Computation With Weak Clients Against Dishonest Majority.
IACR Cryptol. ePrint Arch.
2023 (2023)
Theodoros Kapourniotis
,
Elham Kashefi
,
Dominik Leichtle
,
Luka Music
,
Harold Ollivier
Unifying Quantum Verification and Error-Detection: Theory and Tools for Optimisations.
IACR Cryptol. ePrint Arch.
2022 (2022)
Luka Music
,
Céline Chevalier
,
Elham Kashefi
Correction to: Dispelling myths on superposition attacks: formal security model and attack analyses.
Des. Codes Cryptogr.
90 (6) (2022)
Luka Music
,
Céline Chevalier
,
Elham Kashefi
Dispelling myths on superposition attacks: formal security model and attack analyses.
Des. Codes Cryptogr.
90 (4) (2022)
Luka Music
,
Céline Chevalier
,
Elham Kashefi
Dispelling Myths on Superposition Attacks: Formal Security Model and Attack Analyses.
ProvSec
(2020)
Luka Music
,
Céline Chevalier
,
Elham Kashefi
Dispelling Myths on Superposition Attacks: Formal Security Model and Attack Analyses.
CoRR
(2020)
Elham Kashefi
,
Dominik Leichtle
,
Luka Music
,
Harold Ollivier
Securing Quantum Computations in the NISQ Era.
CoRR
(2020)
Luka Music
,
Céline Chevalier
,
Elham Kashefi
Dispelling Myths on Superposition Attacks: Formal Security Model and Attack Analyses.
IACR Cryptol. ePrint Arch.
2020 (2020)
Elham Kashefi
,
Luka Music
,
Petros Wallden
The Quantum Cut-and-Choose Technique and Quantum Two-Party Computation.
CoRR
(2017)