Lectures
- 
			3.3.3 Example – The (min)-entropy including the smooth min-entropySubject(s) 03. Quantifying information 
 
- 
			3.4.1 Uncertainty principles: simple version BB84Subject(s) 03. Quantifying information 
 
- 
			3.4.2 Example – Uncertainty principles: simple version BB84Subject(s) 03. Quantifying information 
 
- 
			3.5.1 Extended UR principles: tripartite versionSubject(s) 03. Quantifying information 
 
- 
			3.5.2 Example – Extended UR principles: tripartite versionSubject(s) 03. Quantifying information 
 
- 
			4.1.1 Privacy amplificationSubject(s) 04. From imperfect information to (near) perfect security 
 
- 
			4.1.2 Amplifying a weak secret by taking paritiesSubject(s) 04. From imperfect information to (near) perfect security 
 
- 
			4.2.1 Randomness extractorsSubject(s) 04. From imperfect information to (near) perfect security 
 
- 
			4.2.2 Example: A strong extractor against bit-fixing sourcesSubject(s) 04. From imperfect information to (near) perfect security 
 
- 
			4.3.1 An extractor construction based on two-universal hash functionsSubject(s) 04. From imperfect information to (near) perfect security 
 

Quantum Cryptography by TU Delft OpenCourseWare is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Based on a work at https://ocw.tudelft.nl/courses/quantum-cryptography/.



