Adjunct Associate Professor

3100K Atlantic Building

(301) 405-7367

Carl Miller is an Adjunct Associate Professor in the Institute for Advanced Computer Studies, and a Mathematician in the Computer Security Division at NIST. His research is on developing new cryptography for the quantum era. Topics of interest include verifiable random number generation, quantum protocols between mutually mistrustful parties, and classical "postquantum" cryptographic protocols. Miller also studies applications to quantum information of concepts that originated in pure mathematics.

Miller received a Ph. D. in mathematics from Berkeley in 2007, and was a research fellow in the Electrical Engineering and Computer Science Department at the University of Michigan before joining QuICS.

“The impossibility of efficient quantum weak coin flipping”, STOC 2020: Proceedings of the 52nd Annual ACM SIGACT Symposium on Theory of Computing , pp. 916-929, 2020. ,

“Experimental Low-Latency Device-Independent Quantum Randomness”, Phys. Rev. Lett. , vol. 124, no. 010505, 2020. ,

“Parallel Device-Independent Quantum Key Distribution”, IEEE Transactions on Information Theory, vol. 66, no. 9, pp. 5567-5584, 2020. ,

“Graphical Methods in Device-Independent Quantum Cryptography”, Quantum, vol. 3, no. 146, 2019. ,

“Parallel Self-Testing of the GHZ State with a Proof by Diagrams”, EPTCS , vol. 287, pp. 43-66, 2019. ,

“Status Report on the First Round of the NIST Post-Quantum Cryptography Standardization Process”, School: National Institute for Standards and Technology , 2019. ,

“Keyring models: an approach to steerability”, Journal of Mathematical Physics, vol. 59, p. 022103, 2018. ,

“Local randomness: Examples and application”, Phys. Rev. A, no. 97, p. 032324, 2018. ,

“Rigidity of the magic pentagram game”, Quantum Science and Technology, vol. 3, no. 1, p. 015002, 2017. ,

“Universal Security for Randomness Expansion from the Spot-Checking Protocol”, SIAM Journal on Computing, vol. 46, no. 4, 2017. ,

“Randomness in nonlocal games between mistrustful players”, Quantum Information and Computation, vol. 17, no. 7&8, pp. 0595-0610, 2017. ,

“Robust Protocols for Securely Expanding Randomness and Distributing Keys Using Untrusted Quantum Devices”, Journal of the ACM, vol. 63, no. 4, pp. 33:1–33:63, 2016. ,

“Optimal entanglement-assisted one-shot classical communication”, Physical Review A, vol. 87, p. 062301, 2013. ,

“Evasiveness of Graph Properties and Topological Fixed-Point Theorems”, Foundations and Trends in Theoretical Computer Science, vol. 7, pp. 337-415, 2013. ,

“Optimal robust self-testing by binary nonlocal XOR games”, in 8th Conference on the Theory of Quantum Computation, Communication and Cryptography, TQC 2013, vol. 22, Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, 2013, pp. 254–262. ,

“Deciding Unitary Equivalence Between Matrix Polynomials and Sets of Bipartite Quantum States”, Quantum Information and Computation, vol. 11, no. 9-10, pp. 813–819, 2011. ,