[13] M. Tomamichel, C.C.W. Lim, N. Gisin, and R. Renner. Tight Finite-Key Analysis for Quantum Cryptog-
raphy. Nature Communications, 3:634, 2012. DOI: 10.1038/ncomms1631.
[14] M. Hayashi and T. Tsurumaru. Concise and Tight Security Analysis of the Bennett-Brassard 1984
Protocol with Finite Key Lengths. New Journal of Physics, 14(9):093014, 2012. DOI: 10.1088/1367-
2630/14/9/093014.
[15] V. Scarani and R. Renner. Quantum Cryptography with Finite Resources: Unconditional Security Bound
for Discrete-Variable Protocols with One-Way Postprocessing. Physical Review Letters, 100(20), 2008. DOI:
10.1103/PhysRevLett.100.200501.
[16] R. Renner. Symmetry of Large Physical Systems Implies Independence of Subsystems. Nature Physics, 3
(9):645–649, 2007. DOI: 10.1038/nphys684.
[17] M. Christandl, R. König, and R. Renner. Postselection Technique for Quantum Channels with Applications
to Quantum Cryptography. Physical Review Letters, 102(2), 2009. DOI: 10.1103/PhysRevLett.102.020504.
[18] L. Sheridan, T.P. Le, and V. Scarani. Finite-Key Security Against Coherent Attacks in Quantum Key
Distribution. New Journal of Physics, 12:123019, 2010.
[19] C. Pfister, N. Lütkenhaus, S. Wehner, and P.J. Coles. Sifting Attacks in Finite-Size Quantum Key Distri-
bution. New Journal of Physics, 18(5):053001, 2016. DOI: 10.1088/1367-2630/18/5/053001.
[20] M. Tomamichel, S. Fehr, J. Kaniewski, and S. Wehner. A Monogamy-of-Entanglement Game with Ap-
plications to Device-Independent Quantum Cryptography. New Journal of Physics, 15(10):103002, 2013.
DOI: 10.1088/1367-2630/15/10/103002.
[21] M. Tomamichel and R. Renner. Uncertainty Relation for Smooth Entropies. Physical Review Letters, 106
(11):110506, 2011. DOI: 10.1103/PhysRevLett.106.110506.
[22] M. Tomamichel. Quantum Information Processing with Finite Resources — Mathematical Foundations,
volume 5 of SpringerBriefs in Mathematical Physics. Springer International Publishing, 2016. ISBN 978-
3-319-21890-8. DOI: 10.1007/978-3-319-21891-5.
[23] C.W. Helstrom. Quantum Detection and Estimation Theory. Academic Press, New York, NY, 1976.
[24] M. Tomamichel, R. Colbeck, and R. Renner. Duality Between Smooth Min- and Max-Entropies. IEEE
Transactions on Information Theory, 56(9):4674–4681, 2010. DOI: 10.1109/TIT.2010.2054130.
[25] J.L. Carter and M.N. Wegman. Universal Classes of Hash Functions. Journal of Computer and System
Sciences, 18(2):143–154, 1979. DOI: 10.1016/0022-0000(79)90044-8.
[26] M.N. Wegman and J.L. Carter. New Hash Functions and their Use in Authentication and Set Equality.
Journal of Computer and System Sciences, 22(3):265–279, 1981. DOI: 10.1016/0022-0000(81)90033-7.
[27] A. Rényi. On Measures of Information and Entropy. In Proc. 4th Berkeley Symposium on Mathematical
Statistics and Probability, volume 1, pages 547–561, Berkeley, California, USA, 1961. University of California
Press.
[28] R. König, R. Renner, and C. Schaffner. The Operational Meaning of Min- and Max-Entropy. IEEE
Transactions on Information Theory, 55(9):4337–4347, 2009. DOI: 10.1109/TIT.2009.2025545.
[29] S. Winkler, M. Tomamichel, S. Hengl, and R. Renner. Impossibility of Growing Quantum Bit Commitments.
Physical Review Letters, 107(9):090502, 2011. ISSN 0031-9007. DOI: 10.1103/PhysRevLett.107.090502.
[30] H.-K. Lo, H.F. Chau, and M. Ardehali. Efficient Quantum Key Distribution Scheme and a Proof of Its
Unconditional Security. Journal of Cryptology, 18(2):133–165, 2004 DOI: 10.1007/s00145-004-0142-y
[31] D. Frauchiger, R. Renner, and M. Troyer. True randomness from realistic quantum devices, 2013. URL
http://arxiv.org/abs/1311.4547.
[32] C. Portmann and R. Renner. Cryptographic Security of Quantum Key Distribution, 2014. URL http:
//arxiv.org/abs/1409.3525.
[33] L. Lydersen, C. Wiechers, C. Wittmann, D. Elser, J. Skaar, and V. Makarov. Hacking Commercial Quantum
Cryptography Systems by Tailored Bright Illumination. Nature Photonics, 4(10):686–689, 2010. DOI:
10.1038/nphoton.2010.214.
[34] M. Tomamichel and Esther Hänggi. The Link Between Entropic Uncertainty and Nonlocality. Journal of
Physics A: Mathematical and Theoretical, 46(5):055301, 2013. DOI: 10.1088/1751-8113/46/5/055301.
[35] C.C.W. Lim, C. Portmann, M. Tomamichel, R. Renner, and Nicolas Gisin. Device-Independent Quan-
tum Key Distribution with Local Bell Test. Physical Review X, 3(3):031006, 2013. DOI: 10.1103/Phys-
RevX.3.031006.
[36] I. Devetak and A. Winter. Distillation of Secret Key and Entanglement from Quantum States. Proceedings
of the Royal Society A, 461(2053):207–235, 2005. DOI: 10.1098/rspa.2004.1372.
[37] D. Elkouss, A. Leverrier, R. Alleaume, and J.J. Boutros. Efficient Reconciliation Protocol for Discrete-
Variable Quantum Key Distribution. In Proc. IEEE ISIT 2009, pages 1879–1883, 2009. DOI:
10.1109/ISIT.2009.5205475.
Accepted in Quantum 2017-06-08, click title to verify 34