4.5.2 The two-universal extractor in action
Course subject(s)
04. From imperfect information to (near) perfect security
We work out the action of the two-universal extractor on a simple example.

Quantum Cryptography by TU Delft OpenCourseWare is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Based on a work at https://ocw.tudelft.nl/courses/quantum-cryptography/.