Carl
Miller
Alagic, G., Alperin-Sheriff, J., Apon, D., Cooper, D., Dang, Q., Liu, Y.-K., … Smith-Tone, D. (2019). Status report on the first round of the NIST post-quantum cryptography standardization process. NIST. http://doi.org/10.6028/nist.ir.8240 (Original work published January 2019)
Fu, H., & Miller, C. (2018). Local randomness: Examples and application. Phys. Rev. A, 032324. http://doi.org/10.1103/PhysRevA.97.032324 (Original work published March 2018)
Miller, C., Colbeck, R., & Shi, Y. (2018). Keyring models: an approach to steerability. Journal of Mathematical Physics, 59, 022103. http://doi.org/10.1063/1.5006199 (Original work published January 2018)
Miller, C., & Shi, Y. (2017). Universal Security for Randomness Expansion from the Spot-Checking Protocol. SIAM Journal on Computing, 46. http://doi.org/10.1137/15M1044333 (Original work published August 2017)
Miller, C. (2017). An Elementary Proof of Private Random Number Generation from Bell Inequalities. ArXiv. Retrieved from https://arxiv.org/abs/1707.06597 (Original work published July 2017)
Miller, C., & Shi, Y. (2017). Randomness in nonlocal games between mistrustful players. Quantum Information and Computation, 17, 0595–0610. Retrieved from https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5890341/ (Original work published September 2017)
Miller, C., & Shi, Y. (2016). Robust Protocols for Securely Expanding Randomness and Distributing Keys Using Untrusted Quantum Devices. Journal of the ACM, 63, 33:1–33:63. http://doi.org/10.1145/2885493 (Original work published October 2016)