{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T14:23:52Z","timestamp":1775053432170,"version":"3.50.1"},"reference-count":43,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,7]]},"DOI":"10.1109\/isit.2012.6284692","type":"proceedings-article","created":{"date-parts":[[2012,8,30]],"date-time":"2012-08-30T16:57:57Z","timestamp":1346345877000},"page":"900-904","source":"Crossref","is-referenced-by-count":6,"title":["Entanglement cost of quantum channels"],"prefix":"10.1109","author":[{"given":"Mario","family":"Berta","sequence":"first","affiliation":[]},{"given":"Matthias","family":"Christandl","sequence":"additional","affiliation":[]},{"given":"Fernando G. S. L.","family":"Brandao","sequence":"additional","affiliation":[]},{"given":"Stephanie","family":"Wehner","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2009.2025545"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.103.070504"},{"key":"17","first-page":"233","article-title":"Smooth Re?nyi entropy and applications","author":"renner","year":"2004","journal-title":"Proceedings of IEEE International Symposium Information Theory"},{"key":"36","author":"datta","year":"2011","journal-title":"Strong Converse Rates and An Example of Violation of the Strong Converse Property"},{"key":"18","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1007\/978-3-540-30576-7_22","article-title":"Universally composable privacy amplification against quantum adversaries","volume":"3378","author":"renner","year":"2005","journal-title":"Springer Lecture Notes in Computer Science"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1109\/18.796385"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1016\/S0375-9601(96)00706-2"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1109\/18.796386"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1142\/S0219749908003256"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1063\/1.1498001"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.80.5239"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.77.1413"},{"key":"37","author":"dorlas","year":"2011","journal-title":"The Invalidity of A Strong Capacity for A Quantum Channel with Memory"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.54.3824"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.67.060302"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1098\/rspa.2004.1372"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2054130"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2009.2032797"},{"key":"43","author":"berta","year":"2011","journal-title":"Quantum to Classical Randomness Extractors"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2003.822597"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.67.012326"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1142\/9789814304634_0046"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2009.2018325"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1070\/RM1997v052n06ABEH002155"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.102.020504"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.106.130503"},{"key":"26","author":"hayashi","year":"2006","journal-title":"Quantum Information An Introduction"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.2140\/pjm.1958.8.171"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.100.220502"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2177772"},{"key":"3","article-title":"The quantum channel capacity and coherent information","author":"shor","year":"2002","journal-title":"Lecture Notes MSRI Workshop on Quantum Computation"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2004.839515"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1088\/0305-4470\/34\/35\/314"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2002.802612"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2005.30"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.70.1895"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/s00220-011-1309-7"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1038\/nphys885"},{"key":"5","author":"bennett","year":"2009","journal-title":"The quantum reverse Shannon theorem"},{"key":"31","doi-asserted-by":"crossref","first-page":"10101","DOI":"10.1103\/PhysRevA.64.010101","article-title":"Local filtering operations on two qubits","volume":"64","author":"verstraete","year":"2000","journal-title":"Phys Rev A"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.55.1613"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/s00220-003-0981-7"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1038\/nphys1224"}],"event":{"name":"2012 IEEE International Symposium on Information Theory - ISIT","location":"Cambridge, MA, USA","start":{"date-parts":[[2012,7,1]]},"end":{"date-parts":[[2012,7,6]]}},"container-title":["2012 IEEE International Symposium on Information Theory Proceedings"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6268627\/6281806\/06284692.pdf?arnumber=6284692","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T19:28:37Z","timestamp":1497986917000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6284692\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,7]]},"references-count":43,"URL":"https:\/\/doi.org\/10.1109\/isit.2012.6284692","relation":{},"subject":[],"published":{"date-parts":[[2012,7]]}}}