scientific article; zbMATH DE number 3213251
From MaRDI portal
Publication:5340459
Cited in
(15)- Second-order asymptotics for quantum hypothesis testing in settings beyond i.i.d. -- quantum lattice systems and more
- Second-order coding rates for pure-loss bosonic channels
- Concise and tight security analysis of the Bennett–Brassard 1984 protocol with finite key lengths
- Second-order converses via reverse hypercontractivity
- Security analysis of the decoy method with the Bennett-Brassard 1984 protocol for finite key lengths
- Moderate deviation analysis for classical communication over quantum channels
- Finite blocklength analysis of energy harvesting channels
- On the second-order asymptotics for entanglement-assisted communication
- Second-order asymptotics for the classical capacity of image-additive quantum channels
- Quantum soft-covering lemma with applications to rate-distortion coding, resolvability and identification via quantum channels
- A simple derivation of the refined sphere packing bound under certain symmetry hypotheses
- Decoding quantum information via the Petz recovery map
- Fundamental finite key limits for one-way information reconciliation in quantum key distribution
- Finite Blocklength Lossy Source Coding for Discrete Memoryless Sources
- Reed-Muller Codes
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5340459)