-
1
-
-
0036013605
-
Quantum cryptography
-
Nicolas Gisin, Grégorie Ribordy, Wolfgang Tittel, and Hugo Zbinden (2002), Quantum cryptography, Rev. Mod. Phys. 74:145-195.
-
(2002)
Rev. Mod. Phys
, vol.74
, pp. 145-195
-
-
Gisin, N.1
Ribordy, G.2
Tittel, W.3
Zbinden, H.4
-
2
-
-
85167031701
-
-
Grégoire Ribordy, Jürgen Brendel, Jean-Daniel Gautier, Nicolas Gisin, and Hugo Zbinden (2001), Long-distance entanglement-based quantum key distribution, Phys. Rev. A 63:012309-1-12.
-
Grégoire Ribordy, Jürgen Brendel, Jean-Daniel Gautier, Nicolas Gisin, and Hugo Zbinden (2001), Long-distance entanglement-based quantum key distribution, Phys. Rev. A 63:012309-1-12.
-
-
-
-
3
-
-
0033723833
-
Daylight quantum key distribution over 1.6 km
-
W. T. Buttler, R. J. Hughes, S. K. Lamoreaux, G. L. Morgan, J. E. Nordholt, and C. G. Peterson (2000), Daylight quantum key distribution over 1.6 km, Phys. Rev. Lett. 84:5652-5655.
-
(2000)
Phys. Rev. Lett
, vol.84
, pp. 5652-5655
-
-
Buttler, W.T.1
Hughes, R.J.2
Lamoreaux, S.K.3
Morgan, G.L.4
Nordholt, J.E.5
Peterson, C.G.6
-
4
-
-
84955621476
-
Quantum key distribution and string oblivious transfer in noisy channels
-
Springer, pp
-
D. Mayers (1996), Quantum key distribution and string oblivious transfer in noisy channels, in Advances in cryptology - Proceedings of Crypto '96, Springer, pp. 343-357.
-
(1996)
Advances in cryptology - Proceedings of Crypto '96
, pp. 343-357
-
-
Mayers, D.1
-
5
-
-
0347090658
-
Simple proof of security of the BB84 quantum key distribution protocol
-
Peter W. Shor and John Preskill (2000), Simple proof of security of the BB84 quantum key distribution protocol, Phys. Rev. Lett. 85:441-444.
-
(2000)
Phys. Rev. Lett
, vol.85
, pp. 441-444
-
-
Shor, P.W.1
Preskill, J.2
-
6
-
-
0000043416
-
Entangled state quantum cryptography: Eavesdropping on the Ekert protocol
-
D. S. Naik, C. G. Peterson, A. G. White, A. J. Berglund, and P. G. Kwiat (2000), Entangled state quantum cryptography: Eavesdropping on the Ekert protocol, Phys. Rev. Lett. 84:4733-4736.
-
(2000)
Phys. Rev. Lett
, vol.84
, pp. 4733-4736
-
-
Naik, D.S.1
Peterson, C.G.2
White, A.G.3
Berglund, A.J.4
Kwiat, P.G.5
-
7
-
-
0003259517
-
Quantum cryptography: Public key distribution and coin tossing
-
Bangalore, India, IEEE New York, pp
-
C. H. Bennett and G. Brassard (1984), Quantum cryptography: Public key distribution and coin tossing, in Proc. of the IEEE Int. Conf. on Computers, Systems, and Signal Processing, Bangalore, India, IEEE (New York), pp. 175-179.
-
(1984)
Proc. of the IEEE Int. Conf. on Computers, Systems, and Signal Processing
, pp. 175-179
-
-
Bennett, C.H.1
Brassard, G.2
-
8
-
-
0001507676
-
Experimental distinction between the quantum and classical fieldtheoretic predictions for the photoelectric effect
-
John F. Clauser (1974), Experimental distinction between the quantum and classical fieldtheoretic predictions for the photoelectric effect, Phys. Rev. D 9:853-860.
-
(1974)
Phys. Rev. D
, vol.9
, pp. 853-860
-
-
Clauser, J.F.1
-
9
-
-
33746708860
-
A single quantum cannot be cloned
-
W. K. Wooters and W. H. Zurek (1984), A single quantum cannot be cloned, Nature 299:802-803.
-
(1984)
Nature
, vol.299
, pp. 802-803
-
-
Wooters, W.K.1
Zurek, W.H.2
-
10
-
-
84950117252
-
How to reduce your enemy's information
-
Advances in Cryptology, Proceedings of Crypto '85 (, Springer Berlin, pp
-
C. H. Bennett, G. Brassard, and J.-M. Robert (1986), How to reduce your enemy's information, in Advances in Cryptology - Proceedings of Crypto '85 (Lecture Notes in Computer Science, vol. 218), Springer (Berlin), pp. 468-476.
-
(1986)
Lecture Notes in Computer Science
, vol.218
, pp. 468-476
-
-
Bennett, C.H.1
Brassard, G.2
Robert, J.-M.3
-
11
-
-
0029405656
-
Generalized privacy amplification
-
C. H. Bennett, G. Brassard, C. Crepeau, and U. M. Maurer (1995), Generalized privacy amplification, IEEE Transactions on Information Theory, 41:1915-1923
-
(1995)
IEEE Transactions on Information Theory
, vol.41
, pp. 1915-1923
-
-
Bennett, C.H.1
Brassard, G.2
Crepeau, C.3
Maurer, U.M.4
-
12
-
-
0026626314
-
Experimental quantum cryptography
-
C. H. Bennett, F. Bessette, G. Brassard, L. Salvail, and J. Smolin (1992), Experimental quantum cryptography, J. Crypto. 5:3-28.
-
(1992)
J. Crypto
, vol.5
, pp. 3-28
-
-
Bennett, C.H.1
Bessette, F.2
Brassard, G.3
Salvail, L.4
Smolin, J.5
-
13
-
-
0343536431
-
Limitations on practical quantum cryptography
-
Gilles Brassard, Norbert Lütkenhaus, Tal Mor, and Barry C. Sanders (2000), Limitations on practical quantum cryptography, Phys. Rev. Lett. 85:1330-1333.
-
(2000)
Phys. Rev. Lett
, vol.85
, pp. 1330-1333
-
-
Brassard, G.1
Lütkenhaus, N.2
Mor, T.3
Sanders, B.C.4
-
14
-
-
0343152990
-
Quantum cryptography based on Bell's theorem
-
Artur K. Ekert (1991), Quantum cryptography based on Bell's theorem, Phys. Rev. Lett. 67:661-663.
-
(1991)
Phys. Rev. Lett
, vol.67
, pp. 661-663
-
-
Ekert, A.K.1
-
15
-
-
85167046715
-
-
J. S. Bell (1964), On the Einstein-Podolsky-Rosen paradox, Physics 1:195-200.
-
J. S. Bell (1964), On the Einstein-Podolsky-Rosen paradox, Physics 1:195-200.
-
-
-
-
16
-
-
33947385649
-
Can quantum-mechanical description of physical reality be considered complete?
-
A. Einstein, B. Podolsky, and N. Rosen (1935), Can quantum-mechanical description of physical reality be considered complete?, Phys. Rev. 47:777-780.
-
(1935)
Phys. Rev
, vol.47
, pp. 777-780
-
-
Einstein, A.1
Podolsky, B.2
Rosen, N.3
-
17
-
-
0003864761
-
-
Prentice-Hall New York
-
David Bohm (1951) Quantum Theory, Prentice-Hall (New York).
-
(1951)
Quantum Theory
-
-
Bohm, D.1
-
18
-
-
36049056258
-
Proposed experiment to test local hidden-variable theories
-
John F. Clauser, Michael A. Home, Abner Shimony, and Richard A. Holt (1969), Proposed experiment to test local hidden-variable theories, Phys. Rev. Lett. 23:880-884.
-
(1969)
Phys. Rev. Lett
, vol.23
, pp. 880-884
-
-
Clauser, J.F.1
Home, M.A.2
Shimony, A.3
Holt, R.A.4
-
19
-
-
0035865069
-
Experimental violation of a Bell's inequality with efficient detection
-
M. A. Rowe, D. Kielpinski, V. Meyer, C. A. Scakett, W. M. Itano, C. Monroe, and D. J. Wineland (2001), Experimental violation of a Bell's inequality with efficient detection, Nature 409:791-794.
-
(2001)
Nature
, vol.409
, pp. 791-794
-
-
Rowe, M.A.1
Kielpinski, D.2
Meyer, V.3
Scakett, C.A.4
Itano, W.M.5
Monroe, C.6
Wineland, D.J.7
-
20
-
-
17344364043
-
The Bell inequality and detector inefficiency
-
Jan-Åke Larsson (1998), The Bell inequality and detector inefficiency, Phys. Rev. A 57:3304-3308.
-
(1998)
Phys. Rev. A
, vol.57
, pp. 3304-3308
-
-
Larsson, J.-A.1
-
21
-
-
0001296074
-
Modeling the singlet state with local variables
-
Jan-Åke Larsson (1999), Modeling the singlet state with local variables, Phys. Lett. A 256:245-252.
-
(1999)
Phys. Lett. A
, vol.256
, pp. 245-252
-
-
Larsson, J.-A.1
-
22
-
-
27044434968
-
New high-intensity source of polarization-entangled photon pairs
-
P. G. Kwiat, K. Mattle, H. Weinfurter, A. Zeilinger, A. V. Sergienko, and Y. Shih (1995), New high-intensity source of polarization-entangled photon pairs, Phys. Rev. Lett. 75:4337-4341.
-
(1995)
Phys. Rev. Lett
, vol.75
, pp. 4337-4341
-
-
Kwiat, P.G.1
Mattle, K.2
Weinfurter, H.3
Zeilinger, A.4
Sergienko, A.V.5
Shih, Y.6
-
23
-
-
0035807908
-
A possible loophole in the theorem of Bell
-
K. Hess and W. Phillip (2001), A possible loophole in the theorem of Bell, Proc. Nat. Acad. Sci. USA 98:14224-14227.
-
(2001)
Proc. Nat. Acad. Sci. USA
, vol.98
, pp. 14224-14227
-
-
Hess, K.1
Phillip, W.2
-
24
-
-
0035807961
-
Bell's theorem and the problem of decidability between the views of Einstein and Bohr
-
K. Hess and W. Phillip (2001), Bell's theorem and the problem of decidability between the views of Einstein and Bohr, Proc. Nat. Acad. Sci. USA 98:14228-14233.
-
(2001)
Proc. Nat. Acad. Sci. USA
, vol.98
, pp. 14228-14233
-
-
Hess, K.1
Phillip, W.2
-
25
-
-
0036337844
-
Exclusion of time in the theorem of Bell
-
K. Hess and W. Phillip (2002), Exclusion of time in the theorem of Bell, Europhys. Lett. 57:775-781.
-
(2002)
Europhys. Lett
, vol.57
, pp. 775-781
-
-
Hess, K.1
Phillip, W.2
-
26
-
-
11544318439
-
Violation of Bell's inequality under strict Einstein locality conditions
-
Gregor Weihs, Thomas Jennewein, Christoph Simon, Harald Weinfurter, and Anton Zeilinger (1998), Violation of Bell's inequality under strict Einstein locality conditions, Phys. Rev. Lett. 81:5039-5043.
-
(1998)
Phys. Rev. Lett
, vol.81
, pp. 5039-5043
-
-
Weihs, G.1
Jennewein, T.2
Simon, C.3
Weinfurter, H.4
Zeilinger, A.5
-
27
-
-
0001941555
-
Violations of a simple inequality for classical fields
-
J. D. Franson (1991), Violations of a simple inequality for classical fields, Phys. Rev. Lett. 67:290-293.
-
(1991)
Phys. Rev. Lett
, vol.67
, pp. 290-293
-
-
Franson, J.D.1
-
28
-
-
4243230250
-
Two-photon Fransontype experiments and local realism
-
Sven Aerts, Paul Kwiat, Jan-Åke Larsson, and Marek Żukowski (1999), Two-photon Fransontype experiments and local realism, Phys. Rev. Lett. 83:2872-2875.
-
(1999)
Phys. Rev. Lett
, vol.83
, pp. 2872-2875
-
-
Aerts, S.1
Kwiat, P.2
Larsson, J.-A.3
Żukowski, M.4
|