The computational complexity of linear optics, Proceedings of the 43rd annual ACM symposium on Theory of computing, STOC '11, pp.143-252, 2013. ,
DOI : 10.1145/1993636.1993682
Quantum locally testable codes. arXiv preprint, 2013. ,
DOI : 10.1137/140975498
URL : http://arxiv.org/pdf/1310.5664
A Combinatorial Approach to Nonlocality and Contextuality, Communications in Mathematical Physics, vol.110, issue.2, pp.533-628, 2015. ,
DOI : 10.1007/978-1-4613-8431-1
Quantum cryptography: Public key distribution and coin tossing, Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, 1984. ,
DOI : 10.1016/j.tcs.2014.05.025
URL : https://doi.org/10.1016/j.tcs.2014.05.025
Rafail Ostrovsky, and Christian Schaffner. Position-based quantum cryptography: Impossibility and constructions, Advances in Cryptology? CRYPTO 2011, pp.429-446, 2011. ,
Grover vs. McEliece, Post- Quantum Cryptography Proceedings, pp.73-80, 2010. ,
Photonic boson sampling in a tunable circuit, Science, issue.6121, pp.339794-798, 2013. ,
The smooth entropy formalism on von neumann algebras. arXiv preprint, 2011. ,
DOI : 10.1063/1.4936405
URL : http://arxiv.org/pdf/1107.5460.pdf
Simplified instantaneous non-local quantum computation with applications to position-based cryptography, New Journal of Physics, vol.13, issue.9, p.93036, 2011. ,
DOI : 10.1088/1367-2630/13/9/093036
URL : http://iopscience.iop.org/article/10.1088/1367-2630/13/9/093036/pdf
How to prove a theorem so no one else can claim it, Proceedings of the International Congress of Mathematicians, p.2, 1986. ,
Causality and Tsirelson's bounds, Physical Review A, vol.1509, issue.5, p.52103, 2005. ,
DOI : 10.1007/3-540-49208-9_4
Multiprover interactive proofs: How to remove intractability assumptions, Proceedings of the twentieth annual ACM symposium on Theory of computing, pp.113-131, 1988. ,
DOI : 10.1145/62212.62223
Differential Cryptanalysis of DES-like Cryptosystems, 10th Annual International Cryptology Conference Proceedings, pp.2-21, 1990. ,
DOI : 10.1007/3-540-38424-3_1
URL : http://www.crypto.nkfu.edu.tw/CRYPTO/biham.pdf
Information causality, szemeréditrotter and algebraic variants of chsh, Proceedings of the 2015 Conference on Innovations in Theoretical Computer Science, ITCS '15, pp.123-132, 2015. ,
DOI : 10.1145/2688073.2688112
URL : http://arxiv.org/pdf/1311.5186.pdf
Some 3CNF Properties Are Hard to Test, SIAM Journal on Computing, vol.35, issue.1, pp.1-21, 2005. ,
DOI : 10.1137/S0097539704445445
URL : http://ttic.uchicago.edu/~prahladh/papers/BHR/BHR2005.pdf
Quantum-Secure Message Authentication Codes, Advances in Cryptology -EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques Proceedings, pp.592-608, 2013. ,
DOI : 10.1007/978-3-642-38348-9_35
URL : http://eprint.iacr.org/2012/606.pdf
Secure Signatures and Chosen Ciphertext Security in a Quantum Computing World, Advances in Cryptology - CRYPTO 2013 -33rd Annual Cryptology Conference Proceedings, Part II, pp.361-379, 2013. ,
DOI : 10.1007/978-3-642-40084-1_21
Entropic uncertainty relations and their applications, 2015. ,
Arbitrarily Long Relativistic Bit Commitment, Physical Review Letters, vol.115, issue.25, p.250501, 2015. ,
DOI : 10.1103/RevModPhys.86.419
URL : https://hal.archives-ouvertes.fr/hal-01237241
Robust relativistic bit commitment, Physical Review A, vol.94, issue.6, p.62314, 2016. ,
DOI : 10.1103/PhysRevLett.117.140506
URL : https://hal.archives-ouvertes.fr/hal-01407421
Position based cryptography, Advances in Cryptology-CRYPTO 2009, pp.391-407, 2009. ,
DOI : 10.1007/978-3-642-03356-8_23
One-and-a-Half Quantum de Finetti Theorems, Communications in Mathematical Physics, vol.90, issue.2, pp.473-498, 2007. ,
DOI : 10.1007/s00220-007-0189-3
Postselection Technique for Quantum Channels with Applications to Quantum Cryptography, Physical Review Letters, vol.102, issue.2, p.20504, 2009. ,
DOI : 10.1103/PhysRevLett.68.557
URL : http://arxiv.org/pdf/0809.3019
Practical position-based quantum cryptography, Physical Review A, vol.8, issue.5, p.52304, 2015. ,
DOI : 10.1103/PhysRevA.79.042306
URL : https://hal.archives-ouvertes.fr/hal-01237233
Relativistic (or 2-Prover 1-Round) Zero-Knowledge Protocol for $$\mathsf {NP}$$ Secure Against Quantum Adversaries, 2016. ,
DOI : 10.1109/18.796385
Integrated multimode interferometers with arbitrary designs for photonic boson sampling, Nature Photonics, vol.75, issue.7, p.545, 2013. ,
DOI : 10.1103/PhysRevLett.75.4337
Two Provers in Isolation, Advances in Cryptology?ASIACRYPT 2011, pp.407-430, 2011. ,
DOI : 10.1007/978-3-642-25385-0_22
(non-) contextuality of physical theories as an axiom. arXiv preprint, 2010. ,
Graph-Theoretic Approach to Quantum Correlations, Physical Review Letters, vol.10, issue.4, p.40401, 2014. ,
DOI : 10.1007/BF01261326
Tradeoffs for reliable quantum information storage in surface codes and color codes, 2013 IEEE International Symposium on Information Theory, pp.917-921, 2013. ,
DOI : 10.1109/ISIT.2013.6620360
URL : https://hal.archives-ouvertes.fr/hal-00798030
Superposition Attacks on Cryptographic Protocols, Information Theoretic Security -7th International Conference, ICITS 2013 Proceedings, pp.142-161, 2013. ,
DOI : 10.1007/978-3-319-04268-8_9
Distributing Secret Keys with Quantum Continuous Variables: Principle, Security and Implementations, Entropy, vol.91, issue.9, p.6072, 2015. ,
DOI : 10.1103/PhysRevA.91.042337
URL : https://hal.archives-ouvertes.fr/hal-01237232
The quantum moment problem and bounds on entangled multiprover games, Computational Complexity CCC'08. 23rd Annual IEEE Conference on, pp.199-210, 2008. ,
Paths, trees, and flowers, Journal canadien de math??matiques, vol.17, issue.0, pp.449-467, 1965. ,
DOI : 10.4153/CJM-1965-045-4
Local hamiltonians whose ground states are hard to approximate. arXiv preprint, 2015. ,
DOI : 10.1109/focs.2017.46
Quantum cryptography based on bell's theorem, Phys. Rev. Lett, vol.67, issue.6, pp.661-663, 1991. ,
Position-momentum uncertainty relations in the presence of quantum memory, Journal of Mathematical Physics, issue.12, p.55122205, 2014. ,
On the Composition of Two-Prover Commitments, and Applications to Multi-round Relativistic Commitments ,
DOI : 10.1007/978-3-662-49896-5_17
Continuous Variable Quantum Key Distribution: Finite-Key Analysis of Composable Security against Coherent Attacks, Physical Review Letters, vol.109, issue.10, p.100502, 2012. ,
DOI : 10.1103/PhysRevLett.93.170504
Hidden Variables, Joint Probability, and the Bell Inequalities, Physical Review Letters, vol.18, issue.5, pp.291-295, 1982. ,
DOI : 10.1103/PhysRevD.18.349
Probabilistic models on contextuality scenarios, Proceedings of the 10th International Workshop on Quantum Physics and Logic, 2013. ,
DOI : 10.1103/PhysRevLett.110.260406
URL : https://hal.archives-ouvertes.fr/hal-00931584
Z2-systolic freedom and quantum codes Mathematics of quantum computation, pp.287-320, 2002. ,
Local orthogonality as a multipartite principle for quantum correlations, Nature Communications, vol.3, pp.4-2263 ,
DOI : 10.1103/PhysRevA.87.012128
URL : https://hal.archives-ouvertes.fr/hal-00917114
Demonstrating the viability of universal quantum computation using teleportation and single-qubit operations, Nature, vol.52, issue.6760, pp.390-393, 1999. ,
DOI : 10.1103/PhysRevA.52.3489
Virtual entanglement and reconciliation protocols for quantum cryptography with continuous variables, QIC, issue.3, pp.535-552, 2003. ,
Reverse reconciliation protocols for quantum cryptography with continuous variables. Arxiv preprint quant- ph, 2002. ,
Continuous Variable Quantum Cryptography Using Coherent States, GHLS14] Sevag Gharibian, Yichen Huang, Zeph Landau, and Seung Woo Shin. Quantum Hamiltonian complexity. arXiv preprint, p.57902, 2002. ,
DOI : 10.1103/PhysRevLett.84.4002
URL : https://hal.archives-ouvertes.fr/hal-00509124
Quantum error correcting codes and 4-dimensional arithmetic hyperbolic manifolds, Journal of Mathematical Physics, vol.5557, issue.3, p.82202, 2014. ,
DOI : 10.1007/978-3-642-01877-0_21
URL : http://arxiv.org/pdf/1310.5555
Short Locally Testable Codes and Proofs: A Survey in Two Parts, Property testing, pp.65-104, 2010. ,
DOI : 10.1145/1250790.1250830
Stabilizer codes and quantum error correction, 1997. ,
Stabilizer codes and quantum error correction, 1997. ,
Fault-tolerant quantum computation with constant overhead, Quantum Information & Computation, vol.14, pp.15-161338, 2014. ,
Unconditional Optimality of Gaussian Attacks against Continuous-Variable Quantum Key Distribution, Physical Review Letters, vol.97, issue.19, 2006. ,
DOI : 10.1103/PhysRevLett.96.080502
A fast quantum mechanical algorithm for database search, Proceedings of the twenty-eighth annual ACM symposium on Theory of computing, pp.212-219, 1996. ,
Quantum Correlations Require Multipartite Information Principles, Physical Review Letters, vol.1, issue.21, p.210403, 2011. ,
DOI : 10.1103/PhysRevLett.104.230404
The church of the symmetric subspace. arXiv preprint, 2013. ,
Decoding in hyperbolic spaces: quantum LDPC codes with linear rate and efficient error correction, Quantum Information & Computation, vol.14, pp.13-141187, 2014. ,
Quantum codes from high-dimensional manifolds. arXiv preprint, 2016. ,
Differential geometry, Lie groups, and symmetric spaces Academic press, 1979. ,
DOI : 10.1090/gsm/034
Measurement of subpicosecond time intervals between two photons by interference, Physical Review Letters, vol.130, issue.18, pp.2044-2046, 1987. ,
DOI : 10.1103/PhysRev.130.2529
Maximum nonlocality and minimum uncertainty using magic states, Physical Review A, vol.375, issue.376, p.42103, 2015. ,
DOI : 10.1103/PhysRevA.83.032310
Asymptotic teleportation scheme as a universal programmable quantum processor. Physical review letters, p.240501, 2008. ,
DOI : 10.1103/physrevlett.101.240501
URL : http://arxiv.org/pdf/0807.4568
Analysis of imperfections in practical continuous-variable quantum key distribution, Physical Review A, vol.86, issue.3, p.32309, 2012. ,
DOI : 10.1103/PhysRevA.72.050303
URL : https://hal.archives-ouvertes.fr/hal-00727095
Unconditionally Secure Bit Commitment, Physical Review Letters, vol.56, issue.7, pp.1447-1450, 1999. ,
DOI : 10.1103/PhysRevA.56.1154
Secure Classical Bit Commitment Using Fixed Capacity Communication Channels, Journal of Cryptology, vol.18, issue.4, pp.313-335, 2005. ,
DOI : 10.1007/s00145-005-0905-8
URL : http://arxiv.org/pdf/quant-ph/9906103
Unconditionally secure bit commitment with flying qudits, New Journal of Physics, vol.13, issue.11, p.113015, 2011. ,
DOI : 10.1088/1367-2630/13/11/113015
URL : http://iopscience.iop.org/article/10.1088/1367-2630/13/11/113015/pdf
Quantum tasks in Minkowski space, Classical and Quantum Gravity, vol.29, issue.22, p.224013, 2012. ,
DOI : 10.1088/0264-9381/29/22/224013
Unconditionally Secure Bit Commitment by Transmitting Measurement Outcomes, Physical Review Letters, vol.109, issue.13, p.130501, 2012. ,
DOI : 10.1103/PhysRevA.84.012326
URL : http://arxiv.org/pdf/1108.2879
Anthony Leverrier, and María Naya- Plasencia. Breaking symmetric cryptosystems using quantum period finding, Annual Cryptology Conference, pp.207-237, 2016. ,
Anthony Leverrier, and María Naya- Plasencia. Quantum differential and linear cryptanalysis, IACR Transactions on Symmetric Cryptology, vol.2016, issue.1, pp.71-94, 2016. ,
Quantum tagging: Authenticating location via quantum information and relativistic signaling constraints, Physical Review A, vol.84, issue.1, p.12326, 2011. ,
DOI : 10.1103/PhysRevA.83.012322
URL : http://arxiv.org/pdf/1008.2147
Fault tolerance of quantum lowdensity parity check codes with sublinear distance scaling, Physical Review A, vol.87, issue.2, p.20304, 2013. ,
The operational meaning of min-and max-entropy. Information Theory, IEEE Transactions on, vol.55, issue.9, pp.4337-4347, 2009. ,
Secure bit commitment from relativistic constraints. Information Theory, IEEE Transactions on, vol.59, issue.7, pp.4687-4699, 2013. ,
DOI : 10.1109/tit.2013.2247463
URL : http://arxiv.org/pdf/1206.1740.pdf
Sums of Squares, Moment Matrices and Optimization Over Polynomials, Emerging applications of algebraic geometry, pp.157-270, 2009. ,
DOI : 10.1007/978-0-387-09686-5_7
Quantum key distribution over 25 km with an all-fiber continuous-variable system, Phys. Rev. A, vol.76, issue.4, 2007. ,
DOI : 10.1103/physreva.76.042305
URL : http://arxiv.org/pdf/0706.4255
Is Quantum Bit Commitment Really Possible?, Physical Review Letters, vol.78, issue.17, pp.3410-3413, 1997. ,
DOI : 10.1103/PhysRevLett.78.3414
URL : http://arxiv.org/pdf/quant-ph/9603004v1.pdf
Composable Security Proof for Continuous-Variable Quantum Key Distribution with Coherent States, Physical Review Letters, vol.114, issue.7, p.70501, 2015. ,
DOI : 10.1103/PhysRevLett.84.2722
URL : https://hal.archives-ouvertes.fr/hal-01092234
su(p, q) coherent states and gaussian de finetti theorems . arXiv preprint, 2016. ,
Security of Continuous-Variable Quantum Key Distribution via a Gaussian de Finetti Reduction, Physical Review Letters, vol.118, issue.20, 2017. ,
DOI : 10.1038/ncomms1631
Analysis of circuit imperfections in bosonsampling, Quantum Information & Computation, vol.15, issue.5- 6, pp.489-0512, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-00931587
Security of Continuous-Variable Quantum Key Distribution Against General Attacks, Physical Review Letters, vol.3, issue.3, p.30502, 2013. ,
DOI : 10.1103/PhysRevA.80.010102
URL : https://hal.archives-ouvertes.fr/hal-00917115
Experimental bit commitment based on quantum communication and special relativity, Phys. Rev. Lett, vol.111, p.180504, 2013. ,
Practical relativistic bit commitment, Phys. Rev. Lett, vol.115, p.30502, 2015. ,
Security of continuousvariable quantum key distribution: towards a de Finetti theorem for rotation symmetry in phase space, New J. Phys, issue.11, p.11115009, 2009. ,
URL : https://hal.archives-ouvertes.fr/hal-00554926
Insecurity of position-based quantumcryptography protocols against entanglement attacks, Physical Review A, vol.83, issue.1, p.12322, 2011. ,
Quantum Expander Codes, 2015 IEEE 56th Annual Symposium on Foundations of Computer Science, pp.810-824, 2015. ,
DOI : 10.1109/FOCS.2015.55
URL : https://hal.archives-ouvertes.fr/hal-01244657
Quantum location verification in noisy channels. arXiv preprint, 2010. ,
Unconditionally Secure Quantum Bit Commitment is Impossible, Physical Review Letters, vol.63, issue.17, pp.3414-3417, 1997. ,
DOI : 10.1007/BF01449770
URL : http://arxiv.org/pdf/quant-ph/9605044v1.pdf
Systole of congruence coverings of arithmetic hyperbolic manifolds. arXiv preprint, 2016. ,
Optimality of Gaussian Attacks in Continuous-Variable Quantum Cryptography, Physical Review Letters, vol.97, issue.19, p.190502, 2006. ,
DOI : 10.1103/PhysRevLett.94.020505
Bounding the Set of Quantum Correlations, Physical Review Letters, vol.98, issue.1, p.10401, 2007. ,
DOI : 10.1103/PhysRevLett.97.170409
A glance beyond the quantum model, Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences, vol.1, issue.7267, pp.881-890, 2010. ,
DOI : 10.1007/978-3-540-45230-0_3
Photonic quantum technologies, Nature Photonics, vol.3, issue.12, pp.687-695, 2009. ,
On the iterative decoding of sparse quantum codes, Quantum Information and Computation, vol.8, p.987, 2008. ,
Coherent states for arbitrary Lie group, Communications in Mathematical Physics, vol.6, issue.3, pp.222-236, 1972. ,
DOI : 10.1007/BF01645091
URL : http://arxiv.org/pdf/math-ph/0203002
Generalized coherent states and their applications, 1986. ,
DOI : 10.1007/978-3-642-61629-7
Convergent Relaxations of Polynomial Optimization Problems with Noncommuting Variables, SIAM Journal on Optimization, vol.20, issue.5, pp.2157-2180, 2010. ,
DOI : 10.1137/090760155
Information causality as a physical principle, Nature, vol.4, issue.7267, pp.1101-1104, 2009. ,
DOI : 10.1038/nature08400
Cryptographic security of quantum key distribution. arXiv preprint, 2014. ,
Generating the Local Oscillator ???Locally??? in Continuous-Variable Quantum Key Distribution Based on Coherent Detection, Physical Review X, vol.5, issue.4, p.41009, 2015. ,
DOI : 10.1088/0953-4075/42/11/114014
Continuous variable quantum cryptography, Phys. Rev. A, vol.61, issue.1, p.10303, 1999. ,
outcomes and the task of nonlocal computation, Physical Review A, vol.13, issue.2, p.22333, 2016. ,
DOI : 10.1103/PhysRevA.93.022305
de Finetti Representation Theorem for Infinite-Dimensional Quantum Systems and Applications to Quantum Cryptography, Physical Review Letters, vol.7, issue.11, p.110504, 2009. ,
DOI : 10.1103/PhysRevLett.101.093601
URL : http://arxiv.org/pdf/0809.2243
Symmetry of large physical systems implies independence of subsystems, Nat. Phys, vol.3, issue.9, pp.645-649, 2007. ,
SECURITY OF QUANTUM KEY DISTRIBUTION, International Journal of Quantum Information, vol.45, issue.01, pp.1-127, 2008. ,
DOI : 10.1145/1008908.1008920
URL : https://hal.archives-ouvertes.fr/hal-00917115
A tight lower bound for the bb84-states quantum-position-verification protocol, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01164727
Optical quantum computing with photons of arbitrarily low fidelity and purity, Physical Review A, vol.86, issue.5, p.52321, 2012. ,
Error tolerance of the bosonsampling model for linear optics quantum computing, Physical Review A, vol.85, issue.2, p.22332, 2012. ,
A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, vol.21, issue.2, pp.120-126, 1978. ,
DOI : 10.1145/359340.359342
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.40.5588
Experimental realization of any discrete unitary operator, Physical Review Letters, vol.262, issue.1, p.58, 1994. ,
DOI : 10.1126/science.262.5135.877
Self-referenced continuous-variable quantum key distribution protocol, Physical Review X, vol.5, issue.4, p.41010, 2015. ,
The security of practical quantum key distribution, Reviews of Modern Physics, vol.54, issue.3, p.1301, 2009. ,
DOI : 10.1063/1.2190466
Permanents in linear optical networks. arXiv preprint quant- ph/0406127, 2004. ,
Exploring the local orthogonality principle. arXiv preprint, 2013. ,
Exploring the local orthogonality principle, Physical Review A, vol.8, issue.3, p.32117, 2014. ,
DOI : 10.1088/1751-8113/43/38/385303
Algorithms for quantum computation: Discrete logarithms and factoring, IEEE Symposium on Foundations of Computer Science, pp.124-134, 1994. ,
On the power of quantum computation, SIAM journal on computing, vol.26, issue.5, pp.1474-1483, 1997. ,
Classical and quantum strategies for bit commitment schemes in the two-prover model, 2007. ,
Expander codes, IEEE Transactions on Information Theory, vol.42, issue.6, pp.1710-1722, 1996. ,
DOI : 10.1109/18.556667
A fully quantum asymptotic equipartition property. Information Theory, IEEE Transactions on, vol.55, issue.12, pp.5840-5847, 2009. ,
DOI : 10.1109/tit.2009.2032797
URL : http://arxiv.org/pdf/0811.1221
Experimental boson sampling, Nature Photonics, vol.339, issue.7, p.540, 2013. ,
DOI : 10.1126/science.1231440
One-Sided Device-Independent QKD and Position-Based Cryptography from Monogamy Games, Advances in Cryptology?EUROCRYPT 2013, pp.609-625, 2013. ,
DOI : 10.1007/978-3-642-38348-9_36
A rigorous and complete proof of finite key security of quantum key distribution. arXiv preprint, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01237240
Tight finite-key analysis for quantum cryptography, Nature Communications, vol.41, p.634, 2012. ,
DOI : 10.1109/18.476316
URL : http://www.nature.com/articles/ncomms1631.pdf
Uncertainty relation for smooth entropies. Physical review letters, p.110506, 2011. ,
DOI : 10.1103/physrevlett.106.110506
URL : http://arxiv.org/pdf/1009.2015
User-friendly tail bounds for sums of random matrices, Foundations of Computational Mathematics, vol.12, issue.4, pp.389-434, 2012. ,
Leftover hashing against quantum side information. Information Theory, IEEE Transactions on, vol.57, issue.8, pp.5524-5535, 2011. ,
DOI : 10.1109/tit.2011.2158473
URL : http://arxiv.org/pdf/1002.2436
Quantum LDPC Codes With Positive Rate and Minimum Distance Proportional to the Square Root of the Blocklength, IEEE Transactions on Information Theory, vol.60, issue.2, pp.1193-1202, 2014. ,
DOI : 10.1109/TIT.2013.2292061
URL : https://hal.archives-ouvertes.fr/hal-00931764
Quantum Proofs of Knowledge, Advances in Cryptology -EUROCRYPT 2012 -31st Annual International Conference on the Theory and Applications of Cryptographic Techniques Proceedings, pp.135-152, 2012. ,
DOI : 10.1007/978-3-642-29011-4_10
URL : http://eprint.iacr.org/2010/212.pdf
Quantum Position Verification in the Random Oracle Model, Advances in Cryptology?CRYPTO 2014, pp.1-18, 2014. ,
DOI : 10.1007/978-3-662-44381-1_1
Instantaneous Measurement of Nonlocal Variables, Physical Review Letters, vol.69, issue.1, p.10402, 2003. ,
DOI : 10.1103/PhysRevA.61.052108
URL : http://arxiv.org/pdf/quant-ph/0111124
Raphaël Houlmann, Gianluca Boso, Félix Bussières, and Hugo Zbinden. 24-hour relativistic bit commitment, Physical Review Letters, vol.117, issue.14, p.140506, 2016. ,
Theory of quantum information, 2016. ,
Extremality of Gaussian Quantum States, Physical Review Letters, vol.10, issue.8, p.80502, 2006. ,
DOI : 10.1103/PhysRevLett.94.150503
Test spaces. Handbook of quantum logic and quantum structures: quantum logic, p.443, 2009. ,
Coding theorem and strong converse for quantum channels, IEEE Transactions on Information Theory, vol.45, issue.7, pp.2481-2485, 1999. ,
DOI : 10.1109/18.796385
URL : http://arxiv.org/pdf/1409.2536.pdf
Quantum cryptography without switching, Phys. Rev. Lett, vol.93, issue.17, p.170504, 2004. ,
How to Construct Quantum Random Functions, 2012 IEEE 53rd Annual Symposium on Foundations of Computer Science, pp.679-687, 2012. ,
DOI : 10.1109/FOCS.2012.37