메뉴 건너뛰기




Volumn 53, Issue 11, 2000, Pages 22-27

From quantum cheating to quantum security

Author keywords

[No Author keywords available]

Indexed keywords


EID: 0001872185     PISSN: 00319228     EISSN: None     Source Type: Trade Journal    
DOI: 10.1063/1.1333282     Document Type: Article
Times cited : (30)

References (24)
  • 2
    • 85037501013 scopus 로고    scopus 로고
    • the section
    • http://www.odci.gov/csi/books/venona/preface.htm, the section "What made Venona possible?"
    • What Made Venona Possible?
  • 7
    • 0001998264 scopus 로고
    • C. H. Bennett, G. Brassard, in Proc. IEEE International Conference on Computers, Systems, and Signal Processing, IEEE Press, Los Alamitos, Calif. (1984), p. 175. The first paper on quantum cryptography was written by Stephen Wiesner around 1970, but it remained unpublished until 1983: S. Wiesner, Sigact News 15 (1), 78 (1983).
    • (1983) Sigact News , vol.15 , Issue.1 , pp. 78
    • Wiesner, S.1
  • 10
    • 0039498880 scopus 로고    scopus 로고
    • and references therein
    • R. J. Hughes, G. L. Morgan, C. G. Peterson, J. Mod. Opt. 47, 533 (2000). P. D. Townsend, Opt. Fiber Technol. 4, 345 (1998) and references therein.
    • (1998) Opt. Fiber Technol. , vol.4 , pp. 345
    • Townsend, P.D.1
  • 13
    • 0013056114 scopus 로고    scopus 로고
    • B. C. Jacobs, J. D. Franson, Opt. Lett. 21, 1854 (1996). W. T. Buttler et al., Phys. Rev. Lett. 84, 5652 (2000).
    • (1996) Opt. Lett. , vol.21 , pp. 1854
    • Jacobs, B.C.1    Franson, J.D.2
  • 14
    • 0033723833 scopus 로고    scopus 로고
    • B. C. Jacobs, J. D. Franson, Opt. Lett. 21, 1854 (1996). W. T. Buttler et al., Phys. Rev. Lett. 84, 5652 (2000).
    • (2000) Phys. Rev. Lett. , vol.84 , pp. 5652
    • Buttler, W.T.1
  • 15
    • 0033617575 scopus 로고    scopus 로고
    • and references therein
    • For a review, see C. H. Bennett, P. W. Shor, Science 284, 747 (1999) and references therein.
    • (1999) Science , vol.284 , pp. 747
    • Bennett, C.H.1    Shor, P.W.2
  • 16
    • 85037501281 scopus 로고    scopus 로고
    • in press
    • D. Mayers, http://xxx.lanl.gov/abs/quant-ph/9802025, J. Assoc. Comput. Mach, (in press). A preliminary version appeared in D. Mayers, Advances in Cryptology-Proc. Crypto '96, N. Koblitz, ed., Springer-Verlag, New York (1996), p. 343.
    • J. Assoc. Comput. Mach
    • Mayers, D.1
  • 17
    • 0000412043 scopus 로고    scopus 로고
    • N. Koblitz, ed., Springer-Verlag, New York
    • D. Mayers, http://xxx.lanl.gov/abs/quant-ph/9802025, J. Assoc. Comput. Mach, (in press). A preliminary version appeared in D. Mayers, Advances in Cryptology-Proc. Crypto '96, N. Koblitz, ed., Springer-Verlag, New York (1996), p. 343.
    • (1996) Advances in Cryptology - Proc. Crypto '96 , pp. 343
    • Mayers, D.1
  • 19
    • 0033605546 scopus 로고    scopus 로고
    • H.-K. Lo, H. F. Chau, Science 283, 2050 (1999). This paper built on earlier work on quantum privacy amplification: D. Deutsch et al., Phys. Rev. Lett. 77, 2818 (1996); 80, 2022 (1998) (erratum).
    • (1999) Science , vol.283 , pp. 2050
    • Lo, H.-K.1    Chau, H.F.2
  • 20
    • 6144265213 scopus 로고    scopus 로고
    • 80, 2022 (1998) (erratum)
    • H.-K. Lo, H. F. Chau, Science 283, 2050 (1999). This paper built on earlier work on quantum privacy amplification: D. Deutsch et al., Phys. Rev. Lett. 77, 2818 (1996); 80, 2022 (1998) (erratum).
    • (1996) Phys. Rev. Lett. , vol.77 , pp. 2818
    • Deutsch, D.1
  • 23
    • 0001336918 scopus 로고    scopus 로고
    • D. Mayers, Phys. Rev. Lett. 78, 3414 (1997). H.-K. Lo, H. F. Chau, Phys. Rev. Lett. 78, 3410 (1997).
    • (1997) Phys. Rev. Lett. , vol.78 , pp. 3414
    • Mayers, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.