The following pages link to Generalized privacy amplification (Q4880313):
Displayed 50 items.
- Quantum key distribution based on interferometry and interaction-free measurement (Q267242) (← links)
- Cryptographic encryption scheme based on metastable excited nuclei (Q268464) (← links)
- Efficient quantum secret sharing (Q296134) (← links)
- Self-similar solutions of Rényi's entropy and the concavity of its entropy power (Q296353) (← links)
- Role of information theoretic uncertainty relations in quantum theory (Q307170) (← links)
- Study on the security of the authentication scheme with key recycling in QKD (Q331437) (← links)
- Quantum computation: a tutorial (Q468584) (← links)
- Quantum key distribution using a two-way quantum channel (Q477172) (← links)
- Using quantum key distribution for cryptographic purposes: a survey (Q477173) (← links)
- Quantum key distribution using sequential weak values (Q482058) (← links)
- A practical protocol for three-party authenticated quantum key distribution (Q488178) (← links)
- Semiquantum key distribution without invoking the classical party's measurement capability (Q496891) (← links)
- Notes on recent approaches concerning the Kirchhoff-law-Johnson-noise-based secure key exchange (Q665239) (← links)
- Better short-seed quantum-proof extractors (Q764353) (← links)
- Error correcting codes, block designs, perfect secrecy and finite fields (Q850774) (← links)
- Secure communication in the twin paradox (Q892942) (← links)
- Deterministic six states protocol for quantum communication (Q942453) (← links)
- Response to Scheuer-Yariv: ``A classical key-distribution system based on Johnson (like) noise-how secure?'' (Q942617) (← links)
- Quantum cryptography (Q975385) (← links)
- Statistical inference for the \(\epsilon \)-entropy and the quadratic Rényi entropy (Q990884) (← links)
- Lattice-based treshold-changeability for standard CRT secret-sharing schemes (Q998654) (← links)
- Linking information reconciliation and privacy amplification (Q1363071) (← links)
- On the existence of statistically hiding bit commitment schemes and fail-stop signatures (Q1364901) (← links)
- The effect of side-information on smooth entropy. (Q1421491) (← links)
- Composable security of unidimensional continuous-variable quantum key distribution (Q1654146) (← links)
- Authenticated semi-quantum key distribution protocol using Bell states (Q1677390) (← links)
- A light-weight bit commitment protocol based on unpredictable channel noise (Q1725688) (← links)
- Semi-quantum key distribution robust against combined collective noise (Q1740779) (← links)
- A hierarchical modulation coherent communication scheme for simultaneous four-state continuous-variable quantum key distribution and classical communication (Q1740902) (← links)
- Reusable fuzzy extractor from the decisional Diffie-Hellman assumption (Q1791666) (← links)
- Bell state entanglement swappings over collective noises and their applications on quantum cryptography (Q1952616) (← links)
- Two-party quantum key agreement protocols under collective noise channel (Q1993751) (← links)
- Limited resource semiquantum secret sharing (Q1994733) (← links)
- Composable security against collective attacks of a modified BB84 QKD protocol with information only in one basis (Q2007718) (← links)
- Efficient asynchronous verifiable secret sharing and multiparty computation (Q2018817) (← links)
- Efficient mediated semi-quantum key distribution (Q2078695) (← links)
- Leakage-resilient key exchange and two-seed extractors (Q2096493) (← links)
- Relations between the observational entropy and Rényi information measures (Q2101218) (← links)
- Quantum key distribution using universal hash functions over finite fields (Q2107057) (← links)
- Higher-rate quantum key expansion scheme (Q2107993) (← links)
- High efficiency postprocessing for continuous-variable quantum key distribution: using all raw keys for parameter estimation and key extraction (Q2110936) (← links)
- Multiparty blind quantum computation protocol with deterministic mutual identity authentication (Q2111679) (← links)
- Mosaics of combinatorial designs for information-theoretic security (Q2115738) (← links)
- Secure computation from one-way noisy communication, or: anti-correlation via anti-concentration (Q2128558) (← links)
- Channels of small log-ratio leakage and characterization of two-party differentially private computation (Q2175926) (← links)
- Privacy amplification from non-malleable codes (Q2179398) (← links)
- QKD iterative information reconciliation based on LDPC codes (Q2190557) (← links)
- Key expanding in measurement-device-independent quantum key distribution (Q2239770) (← links)
- Cryptanalysis and improvement in multi-party quantum key distribution protocol with new Bell states encoding mode (Q2239773) (← links)
- Asynchronous Byzantine agreement with optimal resilience (Q2251153) (← links)