Lectures
-
4.3.2 A family of two-universal hash functions
Subject(s) 04. From imperfect information to (near) perfect security
-
4.4.1 The pretty good measurement
Subject(s) 04. From imperfect information to (near) perfect security
-
4.4.2 The PGM in action
Subject(s) 04. From imperfect information to (near) perfect security
-
4.5.1 A strong quantum-proof extractor
Subject(s) 04. From imperfect information to (near) perfect security
-
4.5.2 The two-universal extractor in action
Subject(s) 04. From imperfect information to (near) perfect security
-
5.1.1 Introduction to key distribution
Subject(s) 05. Distributing keys
-
5.2.1 Key distribution over a special channel
Subject(s) 05. Distributing keys
-
5.2.2 Key distribution with an storage limited eavesdropper
Subject(s) 05. Distributing keys
-
5.3.1 The need for error correction
Subject(s) 05. Distributing keys
-
5.4.1 Introduction to information reconciliation
Subject(s) 05. Distributing keys
Quantum Cryptography by TU Delft OpenCourseWare is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Based on a work at https://ocw.tudelft.nl/courses/quantum-cryptography/.