Bell nonlocality

N Brunner, D Cavalcanti, S Pironio, V Scarani… - Reviews of modern …, 2014 - APS
Bell's 1964 theorem, which states that the predictions of quantum theory cannot be
accounted for by any local theory, represents one of the most profound developments in the …

Quantum random number generators

M Herrero-Collantes, JC Garcia-Escartin - Reviews of Modern Physics, 2017 - APS
Random numbers are a fundamental resource in science and engineering with important
applications in simulation and cryptography. The inherent randomness at the core of …

Fully device independent quantum key distribution

U Vazirani, T Vidick - Communications of the ACM, 2019 - dl.acm.org
Quantum cryptography promises levels of security that are impossible to attain in a classical
world. Can this security be guaranteed to classical users of a quantum protocol, who may …

[BOOK][B] Bell nonlocality

V Scarani - 2019 - library.oapen.org
Nonlocality was discovered by John Bell in 1964, in the context of the debates about
quantum theory, but is a phenomenon that can be studied in its own right. Its observation …

The ultimate physical limits of privacy

A Ekert, R Renner - Nature, 2014 - nature.com
Among those who make a living from the science of secrecy, worry and paranoia are just
signs of professionalism. Can we protect our secrets against those who wield superior …

Generalised Kochen–Specker theorem for finite non-deterministic outcome assignments

R Ramanathan - npj Quantum Information, 2024 - nature.com
Abstract The Kochen–Specker (KS) theorem is a cornerstone result in quantum foundations,
establishing that quantum correlations in Hilbert spaces of dimension d≥ 3 cannot be …

Device-independent randomness amplification and privatization

M Kessler, R Arnon-Friedman - IEEE Journal on Selected Areas …, 2020 - ieeexplore.ieee.org
Secret and perfect randomness is an essential resource in cryptography. Yet, it is not even
clear that such exists. It is well known that the tools of classical computer science do not …

Physical security in the post-quantum era: A survey on side-channel analysis, random number generators, and physically unclonable functions

S Chowdhury, A Covic, RY Acharya, S Dupee… - Journal of Cryptographic …, 2021 - Springer
Over the past decades, quantum technology has seen consistent progress, with notable
recent developments in the field of quantum computers. Traditionally, this trend has been …

Security of Device-Independent Quantum Key Distribution in the<? format?> Bounded-Quantum-Storage Model

S Pironio, L Masanes, A Leverrier, A Acín - Physical Review X, 2013 - APS
Device-independent quantum key distribution (DIQKD) is a formalism that supersedes
traditional quantum key distribution, as its security does not rely on any detailed modeling of …

Physical security in the post-quantum era: A survey on side-channel analysis, random number generators, and physically unclonable functions

S Chowdhury, A Covic, RY Acharya, S Dupee… - arxiv preprint arxiv …, 2020 - arxiv.org
Over the past decades, quantum technology has seen consistent progress, with notable
recent developments in the field of quantum computers. Traditionally, this trend has been …