


default search action
Jamie Sikora
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j16]Akshay Bansal, Jamie Sikora:
Breaking barriers in two-party quantum cryptography via stochastic semidefinite programming. Quantum 9: 1602 (2025) - [j15]Nathaniel Johnston, Vincent Russo, Jamie Sikora:
Tight bounds for antidistinguishability and circulant sets of pure quantum states. Quantum 9: 1622 (2025) - [i16]Jason T. LeGrow, Travis Morrison, Jamie Sikora, Nicolas Swanson:
Masking Countermeasures Against Side-Channel Attacks on Quantum Computers. CoRR abs/2501.07695 (2025) - 2024
- [c10]Chuanqi Xu, Jamie Sikora, Jakub Szefer:
A Thorough Study of State Leakage Mitigation in Quantum Computing with One-Time Pad. HOST 2024: 55-65 - [c9]Jason T. LeGrow
, Travis Morrison, Jamie Sikora, Nicolas Swanson:
Masking Countermeasures Against Side-Channel Attacks on Quantum Computers. QCE 2024: 1809-1816 - [i15]Chuanqi Xu, Jamie Sikora, Jakub Szefer:
A Thorough Study of State Leakage Mitigation in Quantum Computing with One-Time Pad. CoRR abs/2401.15529 (2024) - [i14]Atul Singh Arora, Jamie Sikora, Thomas Van Himbeeck:
Improving device-independent weak coin flipping protocols. CoRR abs/2404.17079 (2024) - [i13]Akshay Bansal, Ian George, Soumik Ghosh, Jamie Sikora, Alice Zheng:
Online learning of a panoply of quantum objects. CoRR abs/2406.04245 (2024) - [i12]Anne Broadbent, Alex B. Grilo, Supartha Podder, Jamie Sikora:
The Role of piracy in quantum proofs. CoRR abs/2410.02228 (2024) - 2022
- [j14]Sevag Gharibian, Miklos Santha, Jamie Sikora, Aarthi Sundaram, Justin Yirka
:
Quantum generalizations of the polynomial hierarchy with applications to QMA(2). Comput. Complex. 31(2): 13 (2022) - [j13]Srijita Kundu
, Jamie Sikora, Ernest Y.-Z. Tan
:
A device-independent protocol for XOR oblivious transfer. Quantum 6: 725 (2022) - [c8]Sarah A. Osborn, Jamie Sikora:
A Constant Lower Bound for Any Quantum Protocol for Secure Function Evaluation. TQC 2022: 8:1-8:14
2010 – 2019
- 2018
- [j12]Anupam Prakash, Jamie Sikora, Antonios Varvitsiotis
, Zhaohui Wei:
Completely positive semidefinite rank. Math. Program. 171(1-2): 397-431 (2018) - [j11]Gus Gutoski, Ansis Rosmanis, Jamie Sikora:
Fidelity of quantum strategies with applications to cryptography. Quantum 2: 89 (2018) - [j10]John H. Selby
, Jamie Sikora:
How to make unforgeable money in generalised probabilistic theories. Quantum 2: 103 (2018) - [j9]Sevag Gharibian, Jamie Sikora:
Ground State Connectivity of Local Hamiltonians. ACM Trans. Comput. Theory 10(2): 8:1-8:28 (2018) - [c7]Sevag Gharibian, Miklos Santha, Jamie Sikora, Aarthi Sundaram, Justin Yirka
:
Quantum Generalizations of the Polynomial Hierarchy with Applications to QMA(2). MFCS 2018: 58:1-58:16 - [i11]Sevag Gharibian, Miklos Santha, Jamie Sikora, Aarthi Sundaram, Justin Yirka:
Quantum generalizations of the polynomial hierarchy with applications to QMA(2). CoRR abs/1805.11139 (2018) - 2017
- [j8]Jamie Sikora:
Simple, Near-Optimal Quantum Protocols for Die-Rolling. Cryptogr. 1(2): 11 (2017) - [j7]Jamie Sikora, Antonios Varvitsiotis
:
Linear conic formulations for two-party correlations and values of nonlocal games. Math. Program. 162(1-2): 431-463 (2017) - [c6]Gus Gutoski, Ansis Rosmanis, Jamie Sikora:
Fidelity of Quantum Strategies with Applications to Cryptography. TQC 2017: 8:1-8:13 - [i10]Zhaohui Wei, Jamie Sikora:
Device-independent dimension test in a multiparty Bell experiment. CoRR abs/1707.03125 (2017) - 2016
- [j6]André Chailloux, Gus Gutoski, Jamie Sikora:
Optimal bounds for semi-honest quantum oblivious transfer. Chic. J. Theor. Comput. Sci. 2016 (2016) - [j5]Alex B. Grilo, Iordanis Kerenidis, Jamie Sikora:
QMA with Subset State Witnesses. Chic. J. Theor. Comput. Sci. 2016 (2016) - [j4]Ashwin Nayak, Jamie Sikora
, Levent Tunçel
:
A search for quantum coin-flipping protocols using optimization techniques. Math. Program. 156(1-2): 581-613 (2016) - [c5]Jamie Sikora:
Simple, Near-Optimal Quantum Protocols for Die-Rolling. TQC 2016: 4:1-4:14 - [i9]Jamie Sikora, Antonios Varvitsiotis, Zhaohui Wei:
Device-independent dimension tests in the prepare-and-measure scenario. CoRR abs/1606.03878 (2016) - [i8]Zhaohui Wei, Jamie Sikora:
Device-independent characterizations of the quantum state in a Bell experiment. CoRR abs/1609.01030 (2016) - 2015
- [c4]Sevag Gharibian, Jamie Sikora:
Ground State Connectivity of Local Hamiltonians. ICALP (1) 2015: 617-628 - [c3]Alex Bredariol Grilo, Iordanis Kerenidis, Jamie Sikora:
QMA with Subset State Witnesses. MFCS (2) 2015: 163-174 - [i7]Ashwin Nayak, Jamie Sikora, Levent Tunçel:
Quantum and classical coin-flipping protocols based on bit-commitment and their point games. CoRR abs/1504.04217 (2015) - [i6]Jamie Sikora, Antonios Varvitsiotis, Zhaohui Wei:
On the minimum dimension of a Hilbert space needed to generate a quantum correlation. CoRR abs/1507.00213 (2015) - 2014
- [c2]André Chailloux, Iordanis Kerenidis, Srijita Kundu, Jamie Sikora:
Optimal Bounds for Parity-Oblivious Random Access Codes with Applications. TQC 2014: 76-87 - [i5]Ashwin Nayak, Jamie Sikora, Levent Tunçel:
A search for quantum coin-flipping protocols using optimization techniques. CoRR abs/1403.0505 (2014) - [i4]Sevag Gharibian, Jamie Sikora:
Ground state connectivity of local Hamiltonians. CoRR abs/1409.3182 (2014) - [i3]Alex Bredariol Grilo, Iordanis Kerenidis, Jamie Sikora:
QMA with subset state witnesses. CoRR abs/1410.2882 (2014) - 2013
- [j3]Sevag Gharibian, Jamie Sikora, Sarvagya Upadhyay:
QMA variants with polynomially many provers. Quantum Inf. Comput. 13(1-2): 135-157 (2013) - [j2]André Chailloux, Iordanis Kerenidis, Jamie Sikora:
Lower bounds for quantum oblivious transfer. Quantum Inf. Comput. 13(1-2): 158-177 (2013) - [i2]André Chailloux, Gus Gutoski, Jamie Sikora:
Optimal bounds for quantum weak oblivious transfer. CoRR abs/1310.3262 (2013) - 2012
- [j1]Jamie Sikora:
On the existence of loss-tolerant quantum oblivious transfer protocols. Quantum Inf. Comput. 12(7-8): 609-619 (2012) - 2011
- [i1]Sevag Gharibian, Jamie Sikora, Sarvagya Upadhyay:
QMA variants with polynomially many provers. CoRR abs/1108.0617 (2011) - 2010
- [c1]André Chailloux, Iordanis Kerenidis, Jamie Sikora:
Lower bounds for Quantum Oblivious Transfer. FSTTCS 2010: 157-168
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-04-03 00:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint