-
1
-
-
0032306873
-
Quantum cryptography with imperfect apparatus
-
Los Alamitos, CA: IEEE Computer Society
-
Mayers D and Yao A 1998 Quantum cryptography with imperfect apparatus FOCS 98: Proc. 39th Annu. Symp. on Foundations of Computer Science (Los Alamitos, CA: IEEE Computer Society) pp 503-9 (http://doi.ieeecomputersociety. org/10.1109/SFCS.1998.743501)
-
(1998)
FOCS 98: Proc. 39th Annu. Symp. on Foundations of Computer Science
, pp. 503-509
-
-
Mayers, D.1
Yao, A.2
-
2
-
-
0343152990
-
Quantum cryptography based on Bell's theorem
-
Ekert A K 1991 Quantum cryptography based on Bell's theorem Phys. Rev. Lett. 67 661-3
-
(1991)
Phys. Rev. Lett.
, vol.67
, pp. 661-663
-
-
Ekert, A.K.1
-
3
-
-
27144477301
-
No signalling and quantum key distribution
-
Barrett J, Hardy L and Kent A 2005 No signalling and quantum key distribution Phys. Rev. Lett. 95 010503
-
(2005)
Phys. Rev. Lett.
, vol.95
, pp. 010503
-
-
Barrett, J.1
Hardy, L.2
Kent, A.3
-
4
-
-
33750486525
-
Maximally non-local and monogamous quantum correlations
-
Barrett J, Kent A and Pironio S 2006 Maximally non-local and monogamous quantum correlations Phys. Rev. Lett. 97 170409
-
(2006)
Phys. Rev. Lett.
, vol.97
, pp. 170409
-
-
Barrett, J.1
Kent, A.2
Pironio, S.3
-
5
-
-
33748942504
-
From Bells theorem to secure quantum key distribution
-
Acín A, Gisin N and Masanes L 2006 From Bells theorem to secure quantum key distribution Phys. Rev. Lett. 97 120405
-
(2006)
Phys. Rev. Lett.
, vol.97
, pp. 120405
-
-
Acín, A.1
Gisin, N.2
Masanes, L.3
-
6
-
-
33746830453
-
Efficient quantum key distribution secure against no-signalling eavesdroppers
-
Acín A, Massar S and Pironio S 2006 Efficient quantum key distribution secure against no-signalling eavesdroppers New J. Phys. 8 126
-
(2006)
New J. Phys.
, vol.8
, pp. 126
-
-
Acín, A.1
Massar, S.2
Pironio, S.3
-
7
-
-
34547380185
-
Device-independent security of quantum cryptography against collective attacks
-
Acin A et al 2007 Device-independent security of quantum cryptography against collective attacks Phys. Rev. Lett. 98 230501
-
(2007)
Phys. Rev. Lett.
, vol.98
, pp. 230501
-
-
Acin, A.1
-
8
-
-
66549107253
-
Device-independent quantum key distribution secure against collective attacks
-
Pironio S et al 2009 Device-independent quantum key distribution secure against collective attacks New J. Phys. 11 045021
-
(2009)
New J. Phys.
, vol.11
, pp. 045021
-
-
Pironio, S.1
-
9
-
-
72149091696
-
Device independent quantum key distribution secure against coherent attacks with memoryless measurement devices
-
McKague M 2009 Device independent quantum key distribution secure against coherent attacks with memoryless measurement devices New J. Phys. 11 103037
-
(2009)
New J. Phys.
, vol.11
, pp. 103037
-
-
McKague, M.1
-
11
-
-
65549151429
-
Universally composable privacy amplification from causality constraints
-
Masanes L 2009 Universally composable privacy amplification from causality constraints Phys. Rev. Lett. 102 140501
-
(2009)
Phys. Rev. Lett.
, vol.102
, pp. 140501
-
-
Masanes, L.1
-
16
-
-
77951110792
-
Random numbers certified by Bell's theorem
-
Pironio S et al 2010 Random numbers certified by Bell's theorem Nature 464 1021-4
-
(2010)
Nature
, vol.464
, pp. 1021-1024
-
-
Pironio, S.1
-
17
-
-
0001998264
-
Conjugate coding
-
Wiesner S 1983 Conjugate coding SIGACT News 15 78-88
-
(1983)
SIGACT News
, vol.15
, pp. 78-88
-
-
Wiesner, S.1
-
20
-
-
0000990533
-
Beyond strong subadditivity? Improved bounds on the contraction of generalized relative entropy
-
Ruskai M B 1994 Beyond strong subadditivity? Improved bounds on the contraction of generalized relative entropy Rev. Math. Phys. 6 1147-61
-
(1994)
Rev. Math. Phys.
, vol.6
, pp. 1147-1161
-
-
Ruskai, M.B.1
-
25
-
-
24144485355
-
Universally composable privacy amplification against quantum adversaries
-
Lecture Notes in Computer Science, ed J Kilian Berlin: Springer
-
Renner R and König R Universally composable privacy amplification against quantum adversaries Theory of Cryptography (Lecture Notes in Computer Science vol 3378) ed J Kilian (Berlin: Springer) pp 407-25 (http://dx.doi.org/ 10.1007/978-3-540-30576-7-22)
-
Theory of Cryptography
, vol.3378
, pp. 407-425
-
-
Renner, R.1
König, R.2
-
26
-
-
33846181385
-
-
PhD Thesis Swiss Federal Institute of Technology, Zurich arXiv:quant-ph/0512258
-
Renner R 2005 Security of quantum key distribution PhD Thesis Swiss Federal Institute of Technology, Zurich arXiv:quant-ph/0512258
-
(2005)
Security of Quantum. Key Distribution
-
-
Renner, R.1
-
29
-
-
0019572642
-
NEW HASH FUNCTIONS AND THEIR USE IN AUTHENTICATION AND SET EQUALITY.
-
DOI 10.1016/0022-0000(81)90033-7
-
Wegman M N and Carter J L 1981 New hash functions and their use in authentication and set equality J. Comput. Syst. Sci. 22 265-79 (Pubitemid 12444638)
-
(1981)
Journal of Computer and System Sciences
, vol.22
, Issue.3
, pp. 265-279
-
-
Wegman Mark, N.1
Carter J.Lawrence2
-
30
-
-
0005314594
-
Extractors and pseudorandom generators
-
Trevisan L 2001 Extractors and pseudorandom generators J. ACM 48 860-79
-
(2001)
J. ACM
, vol.48
, pp. 860-879
-
-
Trevisan, L.1
-
32
-
-
77955669047
-
Leftover hashing against quantum side information
-
Austin, TX, USA
-
Tomamichel M, Renner R, Schaffner C and Smith A 2010 Leftover hashing against quantum side information in Proc. IEEE Int. Symp. on Information Theory (Austin, TX, USA) pp 2703-7 (http://ieeexplore.ieee.org/xpls/abs-all.jsp? arnumber=5513652)
-
(2010)
Proc. IEEE Int. Symp. on Information Theory
, pp. 2703-2707
-
-
Tomamichel, M.1
Renner, R.2
Schaffner, C.3
Smith, A.4
-
33
-
-
0000141236
-
The breakdown of quantum non-locality in the classical limit
-
Pagonis C, Redhead M L and Clifton R K 1991 The breakdown of quantum non-locality in the classical limit Phys. Lett. A 155 441-4
-
(1991)
Phys. Lett. A
, vol.155
, pp. 441-444
-
-
Pagonis, C.1
Redhead, M.L.2
Clifton, R.K.3
-
35
-
-
0242384600
-
Some results and problems on quantum Bell-type inequalities
-
Cirel'son B 1993 Some results and problems on quantum Bell-type inequalities Hadronic J. Suppl. 8 329-45
-
(1993)
Hadronic J. Suppl.
, vol.8
, pp. 329-345
-
-
Cirel'son, B.1
-
36
-
-
0038939715
-
Which states violate Bell's inequality maximally?
-
Popescu S and Rohrlich D 1992 Which states violate Bell's inequality maximally? Phys. Lett. A 169 411-4
-
(1992)
Phys. Lett. A
, vol.169
, pp. 411-414
-
-
Popescu, S.1
Rohrlich, D.2
|