Precise Evaluation of Leaked Information with Secure Randomness Extraction in the Presence of Quantum Attacker
Crossref DOI link: https://doi.org/10.1007/s00220-014-2174-y
Published Online: 2014-11-11
Published Print: 2015-01
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Hayashi, Masahito
Text and Data Mining valid from 2014-11-11