{\rtf1\ansi\deff0\deftab360 {\fonttbl {\f0\fswiss\fcharset0 Arial} {\f1\froman\fcharset0 Times New Roman} {\f2\fswiss\fcharset0 Verdana} {\f3\froman\fcharset2 Symbol} } {\colortbl; \red0\green0\blue0; } {\info {\author Biblio 7.x}{\operator }{\title Biblio RTF Export}} \f1\fs24 \paperw11907\paperh16839 \pgncont\pgndec\pgnstarts1\pgnrestart K. A. Jackson, Miller, C., and Wang, D., ?Evaluating the security of CRYSTALS-Dilithium in the quantum random oracle model?, 2023.\par \par Y. Alnawakhtha, Mantri, A., Miller, C., and Wang, D., ?Lattice-Based Quantum Advantage from Rotated Measurements?, 2022.\par \par C. Miller, ?The Mathematics of Quantum Coin-Flipping?, Notices of the American Mathematical Society, vol. 69, no. 11, pp. 1908-1917, 2022.\par \par G. Alagic, Apon, D., Cooper, D., Dang, Q., Dang, T., Kelsey, J., Lichtinger, J., Miller, C., Moody, D., Peralta, R., Perlner, R., and Robinson, A., ?Status Report on the Third Round of the NIST Post-Quantum Cryptography Standardization Process?, NIST, 2022.\par \par Y. Alnawakhtha and Miller, C., ?Where we are with quantum?, Nature Physics, 2022.\par \par H. Fu, Miller, C., and Slofstra, W., ?The membership problem for constant-sized quantum correlations is undecidable?, 2021.\par \par Y. Zhang, Shalm, L. K., Bienfang, J. C., Stevens, M. J., Mazurek, M. D., Nam, S. Woo, Abell\'e1n, C., Amaya, W., Mitchell, M. W., Fu, H., Miller, C., Mink, A., and Knill, E., ?Experimental Low-Latency Device-Independent Quantum Randomness?, Phys. Rev. Lett. , vol. 124, no. 010505, 2020.\par \par C. Miller, ?The impossibility of efficient quantum weak coin flipping?, STOC 2020: Proceedings of the 52nd Annual ACM SIGACT Symposium on Theory of Computing , pp. 916-929, 2020.\par \par R. Jain, Miller, C., and Shi, Y., ?Parallel Device-Independent Quantum Key Distribution?, IEEE Transactions on Information Theory, vol. 66, no. 9, pp. 5567-5584, 2020.\par \par G. Alagic, Alperin-Sheriff, J., Apon, D., Cooper, D., Dang, Q., Kelsey, J., Liu, Y. - K., Miller, C., Moody, D., Peralta, R., Perlner, R., Robinson, A., and Smith-Tone, D., ?Status Report on the Second Round of the NIST Post-Quantum Cryptography Standardization Process?, NISTIR 8309, 2020.\par \par S. Breiner, Miller, C., and Ross, N. J., ?Graphical Methods in Device-Independent Quantum Cryptography?, Quantum, vol. 3, no. 146, 2019.\par \par S. Breiner, Kalev, A., and Miller, C., ?Parallel Self-Testing of the GHZ State with a Proof by Diagrams?, EPTCS , vol. 287, pp. 43-66, 2019.\par \par G. Alagic, Alperin-Sheriff, J., Apon, D., Cooper, D., Dang, Q., Miller, C., Moody, D., Peralta, R., Perlner, R., Robinson, A., Smith-Tone, D., and Liu, Y. - K., ?Status Report on the First Round of the NIST Post-Quantum Cryptography Standardization Process?, School: National Institute for Standards and Technology , 2019.\par \par C. Miller, Colbeck, R., and Shi, Y., ?Keyring models: an approach to steerability?, Journal of Mathematical Physics, vol. 59, p. 022103, 2018.\par \par H. Fu and Miller, C., ?Local randomness: Examples and application?, Phys. Rev. A, no. 97, p. 032324, 2018.\par \par C. Miller, ?An Elementary Proof of Private Random Number Generation from Bell Inequalities?, 2017.\par \par C. Miller and Shi, Y., ?Randomness in nonlocal games between mistrustful players?, Quantum Information and Computation, vol. 17, no. 7&8, pp. 0595-0610, 2017.\par \par A. Kalev and Miller, C., ?Rigidity of the magic pentagram game?, Quantum Science and Technology, vol. 3, no. 1, p. 015002, 2017.\par \par C. Miller and Shi, Y., ?Universal Security for Randomness Expansion from the Spot-Checking Protocol?, SIAM Journal on Computing, vol. 46, no. 4, 2017.\par \par C. Miller and Shi, Y., ?Robust Protocols for Securely Expanding Randomness and Distributing Keys Using Untrusted Quantum Devices?, Journal of the ACM, vol. 63, no. 4, pp. 33:1?33:63, 2016.\par \par C. Miller, ?Evasiveness of Graph Properties and Topological Fixed-Point Theorems?, Foundations and Trends in Theoretical Computer Science, vol. 7, pp. 337-415, 2013.\par \par B. Hemenway, Miller, C., Shi, Y., and Wootters, M., ?Optimal entanglement-assisted one-shot classical communication?, Physical Review A, vol. 87, p. 062301, 2013.\par \par C. Miller and Shi, Y., ?Optimal robust self-testing by binary nonlocal XOR games?, in 8th Conference on the Theory of Quantum Computation, Communication and Cryptography, TQC 2013, vol. 22, Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, 2013, pp. 254?262.\par \par E. Chitambar, Miller, C., and Shi, Y., ?Deciding Unitary Equivalence Between Matrix Polynomials and Sets of Bipartite Quantum States?, Quantum Information and Computation, vol. 11, no. 9-10, pp. 813?819, 2011.\par \par C. Miller, ?An Euler?Poincar\'e9 bound for equicharacteristic \'e9tale sheaves?, Algebra & Number Theory, vol. 4, no. 1, pp. 21 - 45, 2010.\par \par E. Chitambar, Miller, C., and Shi, Y., ?Matrix pencils and entanglement classification?, Journal of Mathematical Physics, vol. 51, no. 7, p. 072205, 2010.\par \par C. Miller, ?Exponential iterated integrals and the relative solvable completion of the fundamental group of a manifold?, Topology, vol. 44, no. 2, pp. 351 - 373, 2005.\par \par }