References#
C. E. Shannon. A mathematical theory of communication. Bell System Technical Journal, 27(3):379–423, 1948. doi:10.1002/j.1538-7305.1948.tb01338.x.
Charles H. Bennett and Gilles Brassard. Quantum cryptography: public key distribution and coin tossing. Theoretical Computer Science, 560:7–11, 2014. Theoretical Aspects of Quantum Cryptography – celebrating 30 years of BB84. doi:10.1016/j.tcs.2014.05.025.
Michael A. Nielsen and Isaac L. Chuang. Quantum Computation and Quantum Information: 10th Anniversary Edition. Cambridge University Press, USA, 10th edition, 2011. ISBN 1107002176. doi:10.1017/CBO9780511976667.
Joseph M. Renes. Quantum Information Theory: Concepts and Methods. De Gruyter Oldenbourg, Berlin, Boston, 2022. ISBN 9783110570250. doi:10.1515/9783110570250.
J. Lawrence Carter and Mark N. Wegman. Universal classes of hash functions. Journal of Computer and System Sciences, 1977. doi:10.1016/0022-0000(79)90044-8.
Mark N. Wegman and J. Lawrence Carter. New hash functions and their use in authentication and set equality. Journal of Computer and System Sciences, 22(3):265–279, 1981. doi:10.1016/0022-0000(81)90033-7.
Renato Renner and Robert König. Universally composable privacy amplification against quantum adversaries. In TCC'05: Proceedings of the Theory of Cryptography Conference, 407–425. 2005. doi:10.48550/arXiv.quant-ph/0403133.
Marco Tomamichel, Christian Schaffner, Adam Smith, and Renato Renner. Leftover hashing against quantum side information. IEEE Transactions on Information Theory, 2011. doi:10.1109/ISIT.2010.5513652.
Luca Trevisan. Extractors and pseudorandom generators. Journal of the ACM, 48(4):860–879, jul 2001. doi:10.1145/502090.502099.
Anindya De, Christopher Portmann, Thomas Vidick, and Renato Renner. Trevisan's extractor in the presence of quantum side information. SIAM Journal on Computing, 41(4):915–940, 2012. doi:10.1137/100813683.
Ran Raz, Omer Reingold, and Salil Vadhan. Extracting all the randomness and reducing the error in trevisan's extractors. Journal of Computer and System Sciences, 65(1):97–128, 2002. doi:10.1006/jcss.2002.1824.
Nico Bosshard, Roland Christen, Esther Hänggi, and Jörg Hofstetter. Fast Privacy Amplificationon GPUs. In Proc. 24th Annual Conference on Quantum Information Processing. 2021. URL: https://doi.org/10.5281/zenodo.4551775.
Fadri Grünenfelder, Alberto Boaron, Giovanni V. Resta, Matthieu Perrenoud, Davide Rusca, Claudio Barreiro, Raphaël Houlmann, Rebecka Sax, Lorenzo Stasi, Sylvain El-Khoury, Esther Hänggi, Nico Bosshard, Félix Bussières, and Hugo Zbinden. Fast single-photon detectors and real-time key distillation enable high secret-key-rate quantum key distribution systems. Nature Photonics, 17(5):422–426, March 2023. URL: http://dx.doi.org/10.1038/s41566-023-01168-2, doi:10.1038/s41566-023-01168-2.