참고문헌
- A. De, C. Portmann, T. Vidick, and R. Renner, Trevisan's extractor in the presence of quantum side information [Online]. Available: arXiv:0912.5514 https://doi.org/10.1137/100813683
- C. H. Bennett and G. Brassard, "Quantum cryptography: Public key distribution and coin tossing," in Proc. IEEE Int. Conf. Comput. Syst. Signal Process., Bangalore, India, Dec. 1984, pp. 175-179.
- C. H. Bennett, G. Brassard, C. Crepeau, and U. M. Maurer, "Generalized privacy amplification," IEEE Trans. Inf. Theory, vol. 41, no. 6, pp. 1915-1923, Nov. 1995. https://doi.org/10.1109/18.476316
- G. Brassard and L. Salvail, T. Helleseth, Ed., "Secret-key reconciliation by public discussion," in Proc. Adv. Cryptol.-Eurocrypt, 1994, vol. 765, LNCS, pp. 410-423.
- J. L. Carter and M. N.Wegman, "Universal classes of hash functions," J. Comput. Syst. Sci., vol. 18, pp. 143-154, 1979. https://doi.org/10.1016/0022-0000(79)90044-8
- I. Csiszar, "Almost independence and secrecy capacity," Probl. Inf. Transmiss., vol. 32, no. 1, pp. 40-47, 1996.
- I. Csiszar and J. Karner, Information Theory: Coding Theorem for Discrete Memoryless Systems. New York, NY, USA: Academic, 1981.
- Y. Dodis and A. Smith, "Correcting errors without leaking partial information,"in Proc. 37th Annu. ACM Symp. Theory Comput., 2005, pp. 654-663.
- S. Fehr and C. Schaffner, "Randomness extraction via delta-biased masking in the presence of a quantum attacker," in Proc. Theory Cryptogr. Conf., 2008, pp. 465-481.
- D. Gottesman, H.-K. Lo, N. Lutkenhaus, and J. Preskill, "Security of quantum key distribution with imperfect devices," J. Quant. Inf. Comput., vol. 5, pp. 325-360, 2004.
- M. Hamada, "Reliability of Calderbank-Shor-Steane codes and security of quantum key distribution," J. Phys. A: Math. Gen., vol. 37, no. 34, pp. 8303-8328, 2004. https://doi.org/10.1088/0305-4470/37/34/009
- P. W. Shor and J. Preskill, "Simple proof of security of the BB84 quantum key distribution protocol," Phys. Rev. Lett., vol. 85, pp. 441-444, 2000. https://doi.org/10.1103/PhysRevLett.85.441
- D. R. Stinson, J. Feigenbaum, Ed., "Universal hashing and authentication codes," in Proc. Adv. Cryptol.-CRYPTO, 1992, vol. 576, LNCS, pp. 62-73.
- D. R. Stinson, "Universal hash families and the leftover hash lemma, and applications to cryptography and computing," J. Combin. Math. Combin. Comput., vol. 42, pp. 3-31, 2002.
- M. Tomamichel, C. Schaffner, A. Smith, and R. Renner, "Leftover hashing against quantum side information," IEEE Trans. Inf. Theory, vol. 57, no. 8, pp. 5524-5535, Aug. 2011. https://doi.org/10.1109/TIT.2011.2158473