Lectures
-
2.5.1 Looking ahead to quantum key distribution: verifying entanglement using a Bell experiment
Subject(s) 02. The power of entanglement
-
2.5.2 Example – Looking ahead to quantum key distribution: verifying entanglement using a Bell experiment
Subject(s) 02. The power of entanglement
-
2.6.1 Monogamy of Entanglement
Subject(s) 02. The power of entanglement
-
2.6.2 Playing CHSH with three players
Subject(s) 02. The power of entanglement
-
3.1.1 What it means to be ignorant: ideal case
Subject(s) 03. Quantifying information
-
3.1.2 Example – What it means to be ignorant: ideal case
Subject(s) 03. Quantifying information
-
3.2.1 Trace distance and its use in security definitions (operational interpretation)
Subject(s) 03. Quantifying information
-
3.2.2 Example – Trace distance and its use in security definitions (operational interpretation)
Subject(s) 03. Quantifying information
-
3.3.1 The (min)-entropy including the smooth min-entropy
Subject(s) 03. Quantifying information
-
3.3.2 The (min)-entropy including the smooth min-entropy
Subject(s) 03. Quantifying information
Quantum Cryptography by TU Delft OpenCourseWare is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Based on a work at https://ocw.tudelft.nl/courses/quantum-cryptography/.