Last Update: Feb. 15, 2018
My other areas of interest include security, networking, and evolutionary algorithms (especially their use in studying problems in cryptography).
I am currently looking for motivated students at all levels to join my research group. If you are interested, please feel free to contact me.
C. Vlachou, W.O. Krawec, P. Mateus, N. Paunkovic, and A. Souto. Quantum Key Distribution with Quantum Walks. pre-print available online: arXiv:1710.07979
W.O. Krawec and E. Geiss. Limited Resource Semi-Quantum Key Distribution. pre-print available online: arXiv:1710.05076
Quantum Key Distribution with Mismatched Measurements over Arbitrary Channels. Quantum Information and Computation. Vol. 17, No. 3 and 4, pages 209-241 (2017). pre-print available online: arXiv:1608:07728
An Improved Asymptotic Key Rate Bound for a Mediated Semi-Quantum Key Distribution Protocol. Quantum Information and Computation. Vol 16, No. 9 and 10, pages 813-834. (2016). pre-print available online: arXiv:1509.04797
Asymptotic Analysis of a Three State Quantum Cryptographic Protocol. Proc. IEEE ISIT 2016 (Barcelona). Pages 2489-2493. pre-print available online: arXiv:1601.00185 | (Slides)
A Genetic Algorithm to Analyze the Security of Quantum Cryptographic Protocols. Proc. IEEE CEC 2016 (Vancouver, Canada). Pages 2098-2105. (Slides)
Security of a Semi-Quantum Protocol Where Reflections Contribute to the Secret Key Quantum Information Processing, 15 (5), 2067-2090 (2016). pre-print available online: arXiv:1510.07181
Security Proof of a Semi-Quantum Key Distribution Protocol. Proc. IEEE ISIT 2015 (Hong Kong). Pages 686-690. pre-print available online: arXiv:1412.0282
Mediated Semi-Quantum Key Distribution. Physical Review A 91 032323. (2015) pre-print available online: arXiv:1411.6024
History Dependent Quantum Walk on the Cycle with an Unbalanced Coin. Physica A: Statistical Mechanics and its Applications 428, pages 319-331. (2015). pre-print available online: arXiv:1411.6298
n-Player Impartial Combinatorial Games with Random Players. Theoretical Computer Science 569, pages 1-12 (2015)
Restricted Attacks on Semi-Quantum Key Distribution Protocols. Quantum Information Processing: 13(11), pages 2417-2436 (2014). (PDF)
On the Application of Quantum Decision Theory to Artificial Life. Proc. IEEE CEC 2013, pages 3323-3330.
Regarding Modular Multiplicative Graphs. Graph Theory Notes of NY LXIV, pages 45-48, May 2013.
On the Emergent Behaviors of a Robot Controlled by a Real-Time Evolving Neural Network. Proc. of Artificial Life 13, pages 364-371, July 2012.
Modular Multiplicative Graphs. Ars Combinatoria
Analyzing n-Player Impartial Games. International Journal of Game Theory: Volume 41, Issue 2, pages 345-367. (2012)
Using Evolutionary Techniques to Analyze the Security of Quantum Key Distribution Protocols. Proc. GECCO Comp. 2014, pages 171-172.
Minimal Variable Quantum Decision Makers for Robotic Control. Proc. GECCO Comp. 2014, pages 33-34.
An Algorithm for Evolving Multiple Quantum Operators for Arbitrary Quantum Computational Problems. Proc. GECCO Comp. 2014, pages 59-60.
Analyzing n-Player Impartial Games. MA Thesis, University at Albany (SUNY), Albany NY, May 2010.
Experiments in Developmental Robotics (Parts I and II). Circuit Cellar Ink. September-October, 2013
Creating an HC11 OS. Dr. Dobbs Journal. December 2008
Programming the Pocket PC. Nuts and Volts Magazine. June 2006
Palm Programming: An Introduction. Nuts and Volts Magazine. October 2004
An HC11 File Manager. Circuit Cellar Online. April-May 2001
(with M. Daven) Three-legged Spiders with Even Edge Count are Harmonious