Security in quantum cryptography

C Portmann, R Renner - Reviews of Modern Physics, 2022 - APS
Quantum cryptography exploits principles of quantum physics for the secure processing of
information. A prominent example is secure communication, ie, the task of transmitting …

Simple and tight device-independent security proofs

R Arnon-Friedman, R Renner, T Vidick - SIAM Journal on Computing, 2019 - SIAM
Device-independent security is the gold standard for quantum cryptography: not only is
security based entirely on the laws of quantum mechanics, but it holds irrespective of any a …

Cryptomite: A versatile and user-friendly library of randomness extractors

C Foreman, R Yeung, A Edgington, FJ Curchod - Quantum, 2025 - quantum-journal.org
Abstract We present $\texttt {Cryptomite} $, a Python library of randomness extractor
implementations. The library offers a range of two-source, seeded and deterministic …

[HTML][HTML] Statistical testing of random number generators and their improvement using randomness extraction

C Foreman, R Yeung, FJ Curchod - Entropy, 2024 - mdpi.com
Random number generators (RNGs) are notoriously challenging to build and test, especially
for cryptographic applications. While statistical tests cannot definitively guarantee an RNG's …

Device-independent randomness amplification and privatization

M Kessler, R Arnon-Friedman - IEEE Journal on Selected Areas …, 2020 - ieeexplore.ieee.org
Secret and perfect randomness is an essential resource in cryptography. Yet, it is not even
clear that such exists. It is well known that the tools of classical computer science do not …

Physical security in the post-quantum era: A survey on side-channel analysis, random number generators, and physically unclonable functions

S Chowdhury, A Covic, RY Acharya, S Dupee… - arxiv preprint arxiv …, 2020 - arxiv.org
Over the past decades, quantum technology has seen consistent progress, with notable
recent developments in the field of quantum computers. Traditionally, this trend has been …

Reductions to IID in device-independent quantum information processing

R Arnon-Friedman - arxiv preprint arxiv:1812.10922, 2018 - arxiv.org
The field of device-independent (DI) quantum information processing concerns itself with
devising and analysing protocols, such as quantum key distribution, without referring to the …

Quantum measurement adversary

D Aggarwal, NG Boddu, R Jain… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Multi-source extractors are functions that extract uniform randomness from multiple (weak)
sources of randomness. Quantum multi-source extractors were considered by Kasher and …

[HTML][HTML] Practical randomness amplification and privatisation with implementations on quantum computers

C Foreman, S Wright, A Edgington, M Berta… - Quantum, 2023 - quantum-journal.org
We present an end-to-end and practical randomness amplification and privatisation protocol
based on Bell tests. This allows the building of device-independent random number …

Seedless Extractors for Device-Independent Quantum Cryptography

C Foreman, L Masanes - arxiv preprint arxiv:2403.04713, 2024 - arxiv.org
Device-independent (DI) quantum cryptography aims at providing secure cryptography with
minimal trust in, or characterisation of, the underlying quantum devices. An essential step in …