ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 0807.2158
  4. Cited By
Universally-composable privacy amplification from causality constraints
v1v2v3v4 (latest)

Universally-composable privacy amplification from causality constraints

14 July 2008
L. Masanes
ArXiv (abs)PDFHTML

Papers citing "Universally-composable privacy amplification from causality constraints"

10 / 10 papers shown
Title
Experimental quantum key distribution certified by Bell's theorem
Experimental quantum key distribution certified by Bell's theorem
D. P. Nadlinger
P. Drmota
B. C. Nichol
G. Araneda
D. Main
...
P. Sekatski
R. L. Urbanke
R. Renner
N. Sangouard
J. Bancal
81
179
0
29 Sep 2021
Simple and tight device-independent security proofs
Simple and tight device-independent security proofs
Rotem Arnon Friedman
R. Renner
Thomas Vidick
74
115
0
06 Jul 2016
Device-Independent Relativistic Quantum Bit Commitment
Device-Independent Relativistic Quantum Bit Commitment
Emily Adlam
A. Kent
65
39
0
03 Apr 2015
Limits of privacy amplification against non-signalling memory attacks
Limits of privacy amplification against non-signalling memory attacks
Rotem Arnon Friedman
A. Ta-Shma
85
27
0
06 Nov 2012
Unconditionally secure device-independent quantum key distribution with
  only two devices
Unconditionally secure device-independent quantum key distribution with only two devices
J. Barrett
R. Colbeck
A. Kent
83
74
0
03 Sep 2012
Secure and Robust Transmission and Verification of Unknown Quantum
  States in Minkowski Space
Secure and Robust Transmission and Verification of Unknown Quantum States in Minkowski Space
A. Kent
Serge Massar
J. Silman
51
5
0
03 Aug 2012
Towards the Impossibility of Non-Signalling Privacy Amplification from
  Time-Like Ordering Constraints
Towards the Impossibility of Non-Signalling Privacy Amplification from Time-Like Ordering Constraints
Rotem Arnon Friedman
Esther Hänggi
A. Ta-Shma
82
7
0
16 May 2012
Device-independent quantum key distribution
Device-independent quantum key distribution
Esther Hänggi
84
54
0
17 Dec 2010
Device-Independent Quantum Key Distribution with Commuting Measurements
Device-Independent Quantum Key Distribution with Commuting Measurements
Esther Hänggi
R. Renner
104
70
0
09 Sep 2010
Quantum Tagging: Authenticating Location via Quantum Information and
  Relativistic Signalling Constraints
Quantum Tagging: Authenticating Location via Quantum Information and Relativistic Signalling Constraints
A. Kent
W. Munro
T. Spiller
116
100
0
12 Aug 2010
1