Private randomness expansion with untrusted devices
Top Cited Papers
- 10 February 2011
- journal article
- Published by IOP Publishing in Journal of Physics A: Mathematical and Theoretical
Abstract
No abstract availableOther Versions
This publication has 24 references indexed in Scilit:
- Device independent quantum key distribution secure against coherent attacks with memoryless measurement devicesNew Journal of Physics, 2009
- Universally Composable Privacy Amplification from Causality ConstraintsPhysical Review Letters, 2009
- Device-independent quantum key distribution secure against collective attacksNew Journal of Physics, 2009
- Device-Independent Security of Quantum Cryptography against Collective AttacksPhysical Review Letters, 2007
- Maximally Nonlocal and Monogamous Quantum CorrelationsPhysical Review Letters, 2006
- From Bell’s Theorem to Secure Quantum Key DistributionPhysical Review Letters, 2006
- Efficient quantum key distribution secure against no-signalling eavesdroppersNew Journal of Physics, 2006
- No Signaling and Quantum Key DistributionPhysical Review Letters, 2005
- Quantum cryptography with imperfect apparatusPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Quantum cryptography based on Bell’s theoremPhysical Review Letters, 1991