{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T01:45:24Z","timestamp":1774316724386,"version":"3.50.1"},"reference-count":37,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"11","license":[{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001665","name":"Agence Nationale de la Recherche","doi-asserted-by":"publisher","award":["ANR-18-CE47-0011 (ACOM)"],"award-info":[{"award-number":["ANR-18-CE47-0011 (ACOM)"]}],"id":[{"id":"10.13039\/501100001665","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Inform. Theory"],"published-print":{"date-parts":[[2019,11]]},"DOI":"10.1109\/tit.2019.2929564","type":"journal-article","created":{"date-parts":[[2019,7,18]],"date-time":"2019-07-18T20:06:37Z","timestamp":1563480397000},"page":"7596-7612","source":"Crossref","is-referenced-by-count":66,"title":["Entropy Accumulation With Improved Second-Order Term"],"prefix":"10.1109","volume":"65","author":[{"given":"Frederic","family":"Dupuis","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8491-0359","authenticated-orcid":false,"given":"Omar","family":"Fawzi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2213977.2213984"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1038\/nature09008"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1088\/1751-8113\/44\/9\/095305"},{"key":"ref30","article-title":"Quantum and relativistic protocols for secure multi-party computation","author":"colbeck","year":"2006"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40328-6_33"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1137\/100813683"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/11\/4\/045021"},{"key":"ref34","article-title":"Universal security for randomness expansion from the spot-checking Protocol","author":"miller","year":"2014","journal-title":"arXiv 1411 6608"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2014.2324555"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s00220-015-2382-0"},{"key":"ref12","article-title":"Relative entropies and their use in quantum information theory","author":"leditzky","year":"2016"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2014.2361632"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1063\/1.4961515"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2014.2366994"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1063\/1.4953582"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/0034-4877(86)90067-4"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s00220-014-2122-x"},{"key":"ref19","doi-asserted-by":"crossref","DOI":"10.1063\/1.4838856","article-title":"On quantum R&#x00E9;nyi entropies: A new generalization and some properties","volume":"54","author":"m\u00fcller-lennert","year":"2013","journal-title":"J Math Phys"},{"key":"ref28","volume":"5","author":"tomamichel","year":"2015","journal-title":"Quantum Information Processing with Finite Resources Mathematical Foundations"},{"key":"ref4","first-page":"689","article-title":"Asymptotische abschatzugen in Shannon&#x2019;s informationstheorie","author":"strassen","year":"1962","journal-title":"Trans 3rd Prague Conf Inf Theory"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2009.2032797"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-017-02307-4"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2043769"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1214\/08-AOS593"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2009.2030478"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1214\/13-AOS1185"},{"key":"ref7","article-title":"Channel coding: Non-asymptotic fundamental limits","author":"polyanskiy","year":"2010"},{"key":"ref2","article-title":"Simple and tight device-independent security proofs","author":"arnon-friedman","year":"2016","journal-title":"arXiv 1607 01797"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2013.2276628"},{"key":"ref1","article-title":"Entropy accumulation","author":"dupuis","year":"2016","journal-title":"arXiv 1607 01796"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.66.042304"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.71.062310"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1088\/1464-4266\/5\/6\/017"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2054130"},{"key":"ref23","article-title":"Sine distance for quantum states","author":"rastegin","year":"2006","journal-title":"arXiv quant-ph\/0211139"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-016-1272-5"},{"key":"ref25","article-title":"A framework for non-asymptotic quantum information theory","author":"tomamichel","year":"2012"}],"container-title":["IEEE Transactions on Information Theory"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/18\/8876732\/08765829.pdf?arnumber=8765829","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T20:44:40Z","timestamp":1657745080000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8765829\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11]]},"references-count":37,"journal-issue":{"issue":"11"},"URL":"https:\/\/doi.org\/10.1109\/tit.2019.2929564","relation":{},"ISSN":["0018-9448","1557-9654"],"issn-type":[{"value":"0018-9448","type":"print"},{"value":"1557-9654","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,11]]}}}