Lectures
-
3.3.3 Example – The (min)-entropy including the smooth min-entropy
Subject(s) 03. Quantifying information
-
3.4.1 Uncertainty principles: simple version BB84
Subject(s) 03. Quantifying information
-
3.4.2 Example – Uncertainty principles: simple version BB84
Subject(s) 03. Quantifying information
-
3.5.1 Extended UR principles: tripartite version
Subject(s) 03. Quantifying information
-
3.5.2 Example – Extended UR principles: tripartite version
Subject(s) 03. Quantifying information
-
4.1.1 Privacy amplification
Subject(s) 04. From imperfect information to (near) perfect security
-
4.1.2 Amplifying a weak secret by taking parities
Subject(s) 04. From imperfect information to (near) perfect security
-
4.2.1 Randomness extractors
Subject(s) 04. From imperfect information to (near) perfect security
-
4.2.2 Example: A strong extractor against bit-fixing sources
Subject(s) 04. From imperfect information to (near) perfect security
-
4.3.1 An extractor construction based on two-universal hash functions
Subject(s) 04. From imperfect information to (near) perfect security
Quantum Cryptography by TU Delft OpenCourseWare is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Based on a work at https://ocw.tudelft.nl/courses/quantum-cryptography/.