Funder
Natural Sciences and Engineering Research Council of Canada
J.A. DeSève Foundation
Google
Publisher
Springer Science and Business Media LLC
Reference41 articles.
1. Marwah, A., Dupuis, F.: Proving Security of bb84 Under Source Correlations (2024). arXiv:2402.12346 [quant-ph]
2. Tomamichel, M., Lim, C.C.W., Gisin, N., Renner, R.: Tight finite-key analysis for quantum cryptography. Nat. Commun. 3(1), 634 (2012). https://doi.org/10.1038/ncomms1631
3. Konig, R., Wehner, S., Wullschleger, J.: Unconditional security from noisy quantum storage. IEEE Trans. Inf. Theory 58(3), 1962–1984 (2012). https://doi.org/10.1109/TIT.2011.2177772
4. Renner, R.: Security of Quantum Key Distribution. Ph.D. Thesis (2006)
5. Renner, R., König, R.: Universally composable privacy amplification against quantum adversaries. In: Kilian, J. (ed.) Theory of Cryptography, pp. 407–425. Springer, Berlin (2005)