Phase transition in random circuit sampling
Undesired coupling to the surrounding environment destroys long-range correlations on
quantum processors and hinders the coherent evolution in the nominally available …
quantum processors and hinders the coherent evolution in the nominally available …
Fully device independent quantum key distribution
U Vazirani, T Vidick - Communications of the ACM, 2019 - dl.acm.org
Quantum cryptography promises levels of security that are impossible to attain in a classical
world. Can this security be guaranteed to classical users of a quantum protocol, who may …
world. Can this security be guaranteed to classical users of a quantum protocol, who may …
Pseudorandomness
SP Vadhan - … and Trends® in Theoretical Computer Science, 2012 - nowpublishers.com
This is a survey of pseudorandomness, the theory of efficiently generating objects that" look
random" despite being constructed using little or no randomness. This theory has …
random" despite being constructed using little or no randomness. This theory has …
Quantum random number generation
Quantum physics can be exploited to generate true random numbers, which have important
roles in many applications, especially in cryptography. Genuine randomness from the …
roles in many applications, especially in cryptography. Genuine randomness from the …
Derandomizing polynomial identity tests means proving circuit lower bounds
We show that derandomizing Polynomial Identity Testing is, essentially, equivalent to
proving circuit lower bounds for NEXP. More precisely, we prove that if one can test in …
proving circuit lower bounds for NEXP. More precisely, we prove that if one can test in …
Entropy waves, the zig-zag graph product, and new constant-degree expanders and extractors
The main contribution is a new type of graph product, which we call the zig-zag product.
Taking a product of a large graph with a small graph, the resulting graph inherits (roughly) its …
Taking a product of a large graph with a small graph, the resulting graph inherits (roughly) its …
Information-theoretically secret key generation for fading wireless channels
The multipath-rich wireless environment associated with typical wireless usage scenarios is
characterized by a fading channel response that is time-varying, location-sensitive, and …
characterized by a fading channel response that is time-varying, location-sensitive, and …
Unbalanced expanders and randomness extractors from Parvaresh--Vardy codes
We give an improved explicit construction of highly unbalanced bipartite expander graphs
with expansion arbitrarily close to the degree (which is polylogarithmic in the number of …
with expansion arbitrarily close to the degree (which is polylogarithmic in the number of …
[PDF][PDF] Extractors and pseudorandom generators
L Trevisan - Journal of the ACM, 2001 - Citeseer
We introduce a new approach to constructing extractors. Extractors are algorithms that
transform a “weakly random” distribution into an almost uniform distribution. Explicit …
transform a “weakly random” distribution into an almost uniform distribution. Explicit …
A survey on secret key generation mechanisms on the physical layer in wireless networks
YEH Shehadeh, D Hogrefe - Security and Communication …, 2015 - Wiley Online Library
Traditional security mechanisms are mainly based on the distribution of shared secret keys.
Yet, this task is nontrivial in large wireless networks, because of mobility and scalability …
Yet, this task is nontrivial in large wireless networks, because of mobility and scalability …