Entropic uncertainty relations and their applications
Heisenberg's uncertainty principle forms a fundamental element of quantum mechanics.
Uncertainty relations in terms of entropies were initially proposed to deal with conceptual …
Uncertainty relations in terms of entropies were initially proposed to deal with conceptual …
[BOOK][B] Quantum information theory
MM Wilde - 2013 - books.google.com
Finally, here is a modern, self-contained text on quantum information theory suitable for
graduate-level courses. Develo** the subject'from the ground up'it covers classical results …
graduate-level courses. Develo** the subject'from the ground up'it covers classical results …
Quantum‐Memory‐Assisted Entropic Uncertainty Relations
Uncertainty relations take a crucial and fundamental part in the frame of quantum theory,
and are bringing on many marvelous applications in the emerging field of quantum …
and are bringing on many marvelous applications in the emerging field of quantum …
From classical to quantum Shannon theory
MM Wilde - arxiv preprint arxiv:1106.1445, 2011 - arxiv.org
The aim of this book is to develop" from the ground up" many of the major, exciting, pre-and
post-millenium developments in the general area of study known as quantum Shannon …
post-millenium developments in the general area of study known as quantum Shannon …
[BOOK][B] Quantum metrology
Quantum Metrology | SpringerLink Skip to main content Advertisement SpringerLink Account
Menu Find a journal Publish with us Track your research Search Cart Book cover Quantum …
Menu Find a journal Publish with us Track your research Search Cart Book cover Quantum …
Security of quantum key distribution
HP Yuen - IEEE Access, 2016 - ieeexplore.ieee.org
The security issues facing quantum key distribution (QKD) are explained, herein focusing on
those issues that are cryptographic and information theoretic in nature and not those based …
those issues that are cryptographic and information theoretic in nature and not those based …
Secure identification for wiretap channels; robustness, super-additivity and continuity
We determine the identification capacity of compound channels in the presence of a
wiretapper. It turns out that the secure identification capacity formula fulfills a dichotomy …
wiretapper. It turns out that the secure identification capacity formula fulfills a dichotomy …
Quantum enigma machine: Experimentally demonstrating quantum data locking
Shannon proved in 1949 that information-theoretic-secure encryption is possible if the
encryption key is used only once, is random, and is at least as long as the message itself …
encryption key is used only once, is random, and is at least as long as the message itself …
Secure identification under passive eavesdroppers and active jamming attacks
In next-generation connectivity systems, which rely on robust and low-latency information
exchange, there exists communication tasks in which the Ahlswede/Dueck identification …
exchange, there exists communication tasks in which the Ahlswede/Dueck identification …
Programmable dispersion on a photonic integrated circuit for classical and quantum applications
We demonstrate a large-scale tunable-coupling ring resonator array, suitable for high-
dimensional classical and quantum transforms, in a CMOS-compatible silicon photonics …
dimensional classical and quantum transforms, in a CMOS-compatible silicon photonics …