暂无分享,去创建一个
[1] A. Shimony,et al. Proposed Experiment to Test Local Hidden Variable Theories. , 1969 .
[2] J. Bell. On the Einstein-Podolsky-Rosen paradox , 1964 .
[3] Robert König,et al. The Operational Meaning of Min- and Max-Entropy , 2008, IEEE Transactions on Information Theory.
[4] U. Vazirani,et al. Certifiable quantum dice , 2012, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences.
[5] Adrian Kent,et al. Private randomness expansion with untrusted devices , 2010, 1011.4474.
[6] R. Rosenfeld. Nature , 2009, Otolaryngology--head and neck surgery : official journal of American Academy of Otolaryngology-Head and Neck Surgery.
[7] Stefano Pironio,et al. Random numbers certified by Bell’s theorem , 2009, Nature.
[8] Albert Einstein,et al. Can Quantum-Mechanical Description of Physical Reality Be Considered Complete? , 1935 .
[9] Umesh V. Vazirani,et al. Certifiable Quantum Dice - Or, testable exponential randomness expansion , 2011, 1111.6054.
[10] G. D. Liveing,et al. The University of Cambridge , 1897, British medical journal.
[11] Stefano Pironio,et al. Randomness versus nonlocality and entanglement. , 2011, Physical review letters.
[12] Roger Colbeck,et al. Prisoners of their own device: Trojan attacks on device-independent quantum cryptography , 2012 .
[13] Adrian Kent,et al. Memory attacks on device-independent quantum cryptography. , 2012, Physical review letters.
[14] A. Grün,et al. ETH Zurich, Switzerland , 2005 .
[15] Renato Renner,et al. Security of quantum key distribution , 2005, Ausgezeichnete Informatikdissertationen.
[16] Stefano Pironio,et al. Device-independent randomness expansion secure against quantum adversaries , 2011 .
[17] A. Acín,et al. Bounding the set of quantum correlations. , 2006, Physical review letters.
[18] Axthonv G. Oettinger,et al. IEEE Transactions on Information Theory , 1998 .
[19] A. Acín,et al. A convergent hierarchy of semidefinite programs characterizing the set of quantum correlations , 2008, 0803.4290.
[20] Stefano Pironio,et al. Security of practical private randomness generation , 2011, 1111.6056.
[21] Anindya De,et al. Trevisan's Extractor in the Presence of Quantum Side Information , 2009, SIAM J. Comput..
[22] Roger Colbeck,et al. Quantum And Relativistic Protocols For Secure Multi-Party Computation , 2009, 0911.3814.
[23] Joseph F. Traub,et al. Algorithms and Complexity: New Directions and Recent Results , 1976 .