Publisher
Springer International Publishing
Reference56 articles.
1. Yao, A., Mayers, D., & (1998). Quantum cryptography with imperfect apparatus. In 2013 IEEE 54th Annual Symposium on Foundations of Computer Science, , Los Alamitos, CA (p. 503). USA: IEEE Computer Society.
2. Acín, A., Gisin, N., & Masanes, L. (2006). From Bell’s theorem to secure quantum key distribution. Physical Review Letters, 97, 120405.
3. Pironio, S., Acín, A., Brunner, N., Gisin, N., Massar, S., & Scarani, V. (2009). Device-independent quantum key distribution secure against collective attacks. New Journal of Physics, 11(4), 045021.
4. Masanes, L., Pironio, S., & Acín, A. (2011). Secure device-independent quantum key distribution with causally independent measurement devices. Nature Communications, 2(1), 238.
5. Vazirani, U., & Vidick, T. (2014). Fully device-independent quantum key distribution. Physical Review Letters, 113, 140501.