References

References#

[1]

C. E. Shannon. A mathematical theory of communication. Bell System Technical Journal, 27(3):379–423, 1948. doi:10.1002/j.1538-7305.1948.tb01338.x.

[2]

Charles H. Bennett and Gilles Brassard. Quantum cryptography: public key distribution and coin tossing. Theoretical Computer Science, 560:7–11, 2014. Theoretical Aspects of Quantum Cryptography – celebrating 30 years of BB84. doi:10.1016/j.tcs.2014.05.025.

[3]

Michael A. Nielsen and Isaac L. Chuang. Quantum Computation and Quantum Information: 10th Anniversary Edition. Cambridge University Press, USA, 10th edition, 2011. ISBN 1107002176. doi:10.1017/CBO9780511976667.

[4]

Joseph M. Renes. Quantum Information Theory: Concepts and Methods. De Gruyter Oldenbourg, Berlin, Boston, 2022. ISBN 9783110570250. doi:10.1515/9783110570250.

[5]

J. Lawrence Carter and Mark N. Wegman. Universal classes of hash functions. Journal of Computer and System Sciences, 1977. doi:10.1016/0022-0000(79)90044-8.

[6]

Mark N. Wegman and J. Lawrence Carter. New hash functions and their use in authentication and set equality. Journal of Computer and System Sciences, 22(3):265–279, 1981. doi:10.1016/0022-0000(81)90033-7.

[7]

Renato Renner and Robert König. Universally composable privacy amplification against quantum adversaries. In TCC'05: Proceedings of the Theory of Cryptography Conference, 407–425. 2005. doi:10.48550/arXiv.quant-ph/0403133.

[8]

Marco Tomamichel, Christian Schaffner, Adam Smith, and Renato Renner. Leftover hashing against quantum side information. IEEE Transactions on Information Theory, 2011. doi:10.1109/ISIT.2010.5513652.

[9]

Luca Trevisan. Extractors and pseudorandom generators. Journal of the ACM, 48(4):860–879, jul 2001. doi:10.1145/502090.502099.

[10]

Anindya De, Christopher Portmann, Thomas Vidick, and Renato Renner. Trevisan's extractor in the presence of quantum side information. SIAM Journal on Computing, 41(4):915–940, 2012. doi:10.1137/100813683.

[11]

Ran Raz, Omer Reingold, and Salil Vadhan. Extracting all the randomness and reducing the error in trevisan's extractors. Journal of Computer and System Sciences, 65(1):97–128, 2002. doi:10.1006/jcss.2002.1824.

[12]

Nico Bosshard, Roland Christen, Esther Hänggi, and Jörg Hofstetter. Fast Privacy Amplificationon GPUs. In Proc. 24th Annual Conference on Quantum Information Processing. 2021. URL: https://doi.org/10.5281/zenodo.4551775.

[13]

Fadri Grünenfelder, Alberto Boaron, Giovanni V. Resta, Matthieu Perrenoud, Davide Rusca, Claudio Barreiro, Raphaël Houlmann, Rebecka Sax, Lorenzo Stasi, Sylvain El-Khoury, Esther Hänggi, Nico Bosshard, Félix Bussières, and Hugo Zbinden. Fast single-photon detectors and real-time key distillation enable high secret-key-rate quantum key distribution systems. Nature Photonics, 17(5):422–426, March 2023. URL: http://dx.doi.org/10.1038/s41566-023-01168-2, doi:10.1038/s41566-023-01168-2.