Skip to main content
U.S. flag

An official website of the United States government

Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock ( ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications by Carl A. Miller

Search Title, Abstract, Conference, Citation, Keyword or Author
Displaying 1 - 13 of 13

Recommendation for Stateful Hash-Based Signature Schemes

Author(s)
David A. Cooper, Daniel C. Apon, Quynh H. Dang, Michael S. Davidson, Morris J. Dworkin, Carl A. Miller
This recommendation specifies two algorithms that can be used to generate a digital signature, both of which are stateful hash-based signature schemes: the

Status Report on the Second Round of the NIST Post-Quantum Cryptography Standardization Process

Author(s)
Dustin Moody, Gorjan Alagic, Daniel C. Apon, David A. Cooper, Quynh H. Dang, John M. Kelsey, Yi-Kai Liu, Carl A. Miller, Rene C. Peralta, Ray A. Perlner, Angela Y. Robinson, Daniel C. Smith-Tone, Jacob Alperin-Sheriff
The National Institute of Standards and Technology is in the process of selecting one or more public-key cryptographic algorithms through a public, competition

Parallel Device-Independent Quantum Key Distribution

Author(s)
Rahul Jain, Carl A. Miller, Yaoyun Shi
A prominent application of quantum cryptography is the distribution of cryptographic keys that are provably secure. Such security proofs were extended by

Experimental Low-Latency Device-Independent Quantum Randomness

Author(s)
Yanbao Zhang, Lynden K. Shalm, Joshua C. Bienfang, Martin J. Stevens, Michael D. Mazurek, Sae Woo Nam, Carlos Abellan, Waldimar Amaya, Morgan Mitchell, Honghao Fu, Carl A. Miller, Alan Mink, Emanuel H. Knill
Applications of randomness such as private key generation and public randomness beacons require small blocks of certified random bits on demand. Device

Status Report on the First Round of the NIST Post-Quantum Cryptography Standardization Process

Author(s)

Gorjan Alagic, Jacob M. Alperin-Sheriff, Daniel C. Apon, David A. Cooper, Quynh H. Dang, Carl A. Miller, Dustin Moody, Rene C. Peralta, Ray A. Perlner, Angela Y. Robinson, Daniel C. Smith-Tone, Yi-Kai Liu

The National Institute of Standards and Technology is in the process of selecting one or more public-key cryptographic algorithms through a public competition

Local Randomness: Examples and Application

Author(s)
Honghao Fu, Carl A. Miller
When two players achieve a superclassical score at a nonlocal game, their outputs must contain intrinsic randomness. This fact has many useful implications for

Keyring models: An Approach to Steerability

Author(s)
Carl A. Miller, Roger Colbeck, Yaoyun Shi
If a measurement is made on one half of a bipartite system then, conditioned on the outcome, the other half achieves a new reduced state. If these reduced

Rigidity of the magic pentagram game

Author(s)
Amir Kalev, Carl A. Miller
A game is rigid if a near-optimal score guarantees, under the sole assumption of the validity of quantum mechanics, that the players are using an approximately