Carl
Miller
Alagic, G. ., Alperin-Sheriff, J. ., Apon, D. ., Cooper, D. ., Dang, Q. ., Liu, Y.-K. ., … Smith-Tone, D. . (2019). Status report on the first round of the NIST post-quantum cryptography standardization process. NIST. http://doi.org/10.6028/nist.ir.8240 (Original work published January 2019)
Fu, H. ., & Miller, C. . (2018). Local randomness: Examples and application. Phys. Rev. A, 032324. http://doi.org/10.1103/PhysRevA.97.032324 (Original work published March 2018)
Miller, C. ., Colbeck, R. ., & Shi, Y. . (2018). Keyring models: an approach to steerability. Journal of Mathematical Physics, 59, 022103. http://doi.org/10.1063/1.5006199 (Original work published January 2018)
Miller, C. ., & Shi, Y. . (2017). Universal Security for Randomness Expansion from the Spot-Checking Protocol. SIAM Journal on Computing, 46. http://doi.org/10.1137/15M1044333 (Original work published August 2017)
Miller, C. . (2017). An Elementary Proof of Private Random Number Generation from Bell Inequalities. ArXiv. Retrieved from https://arxiv.org/abs/1707.06597 (Original work published July 2017)
Miller, C. ., & Shi, Y. . (2017). Randomness in nonlocal games between mistrustful players. Quantum Information and Computation, 17, 0595–0610. Retrieved from https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5890341/ (Original work published September 2017)
Miller, C. ., & Shi, Y. . (2016). Robust Protocols for Securely Expanding Randomness and Distributing Keys Using Untrusted Quantum Devices. Journal of the ACM, 63, 33:1–33:63. http://doi.org/10.1145/2885493 (Original work published October 2016)