@article{MVK_2016_7_1_a1,
author = {I. M. Arbekov},
title = {Criteria of key security},
journal = {Matemati\v{c}eskie voprosy kriptografii},
pages = {39--56},
year = {2016},
volume = {7},
number = {1},
language = {ru},
url = {http://geodesic.mathdoc.fr/item/MVK_2016_7_1_a1/}
}
I. M. Arbekov. Criteria of key security. Matematičeskie voprosy kriptografii, Tome 7 (2016) no. 1, pp. 39-56. http://geodesic.mathdoc.fr/item/MVK_2016_7_1_a1/
[1] Bennett C. H., Brassard G., “Quantum cryptography: public key distribution and coin tossing”, Proceedings of IEEE International Conference on Computers, Systems and Signal Processing (Bangalore, India, December 9–12, 1984), Indian Inst. Sci., Bangalore, 1984, 175–179
[2] Inarmori H., Lütkenhaus N., Mayers D., “Unconditional security of practical quantum key distribution”, Eur. Phys. J., Ser. D, 41:33 (2007), 599–627 | DOI
[3] Timofeev A. V., Pomozov D. I., Makkaveev A. P., Molotkov S. N., “O strukture otkrytogo klassicheskogo kanala svyazi v kvantovoi kriptografii: korrektsiya oshibok, tselostnost i autentichnost”, ZhETF, 131:5 (2007), 771–789
[4] Bennett C. H., Brassard G., Crepeau C., Maurer U. M., “Generalized privacy amplification”, IEEE Trans. Inform. Theory, IT-41:6/2 (1995), 1915–1923 | DOI | MR | Zbl
[5] Tomamichel M., Lim C. C. W., Gizin N., Renner R., “Tight finite-key analysis for quantum cryptography”, Nature Comm., 3:634, December (2012), 6 | DOI
[6] Dodis Y., Ostrovsky R., Reyzin L., Smith A., “Fuzzy extractors: how to generate strong keys from biometrics and other noisy data”, SIAM J. Comput., 38:1 (2008), 97–139 | DOI | MR | Zbl
[7] Scarani V., Renner R., Security bounds for quantum cryptography with finite resourses, 2008, arXiv: 0806.0120 | MR
[8] Chistandl M., Renner R., Ekert A., A generic security proof for quantum key distribution, 2004, arXiv: quant-ph/0402131
[9] Renes J. M., Renner R., Noisy channel coding via privacy amplification and information reconciliation, 2012, arXiv: 1012.4814 | MR
[10] Yuen H. P., Fundamental quantitative security in quantum key generation, 2010, arXiv: 1008.0623v2
[11] Yuen H. P., Problems of exiting unconditional security proofs in quantum key distribution, 2011, arXiv: 1109.1051
[12] Yuen H. P., Fundamental and practical problems of QKD security — the actual and the perceived situation, 2012, arXiv: 1109.1066
[13] Yuen H. P., Unconditional security in quantum key distribution, 2012, arXiv: 1205.5065
[14] Yuen H. P., Incompleteness and limit of quantum key distribution theory, 2012, arXiv: 1208.2106
[15] Renner R., Reply to recent scepticism about the foundations of quantum cryptography, 2012, arXiv: 1209.2423
[16] Yuen H. P., On the foundations of quantum key distribution — reply to Renner and beyond, 2012, arXiv: 1210.2804
[17] Hirota O., Misconception in theory of quantum key distribution — reply to Renner, 2013, arXiv: 1306.1277
[18] Yuen H. P., Essential lack of security in quantum key distribution, 2013, arXiv: 1310.0842
[19] Yuen H. P., Can quantum key distribution be secure, 2014, arXiv: 1405.0457 | MR
[20] Hirota O., A correct security evaluation of quantum key distribution, 2014, arXiv: 1409.5991
[21] Shennon K., Raboty po teorii informatsii i kibernetike, IL, M., 1963, 832 pp.
[22] Khardi G. G., Littlvud Dzh. E., Polia G., Neravenstva, Per. s angl. V. I. Levina, IL, M., 1948, 456 pp. | MR
[23] Feller V., Vvedenie v teoriyu veroyatnostei, per. s angl. Yu. V. Prokhorova, Mir, M., 1984, 528 pp.
[24] Fomichev V. M., Diskretnaya matematika i kriptologiya, ed. N. D. Podufalov, Dialog-MIFI, M., 2003, 400 pp.