-
1
-
-
0003259517
-
Quantum cryptography: Public key distribution and coin tossing
-
IEEE, New York
-
C. H. Bennett and G. Brassard, “Quantum cryptography: public key distribution and coin tossing, ” in Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing (IEEE, New York, 1984), pp. 175-179.
-
(1984)
In Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing
, pp. 175-179
-
-
Bennett, C.H.1
Brassard, G.2
-
2
-
-
0343152990
-
Quantum cryptography based on Bells theorem
-
A. K. Ekert, “Quantum cryptography based on Bell’s theorem, ” Phys. Rev. Lett. 67, 661-663 (1991).
-
(1991)
Phys. Rev. Lett.
, vol.67
, pp. 661-663
-
-
Ekert, A.K.1
-
3
-
-
11944263767
-
Quantum cryptography without Bells theorem
-
C. H. Bennett, G. Brassard, and N. D. Mermin, “Quantum cryptography without Bell’s theorem, ” Phys. Rev. Lett. 68, 557-559 (1992).
-
(1992)
Phys. Rev. Lett.
, vol.68
, pp. 557-559
-
-
Bennett, C.H.1
Brassard, G.2
Mermin, N.D.3
-
4
-
-
0026626314
-
Experimental quantum cryptography
-
C. H. Bennett, F. Bessette, G. Brassard, L. Salvail, and J. Smolin, “Experimental quantum cryptography, ” J. Cryptol. 5, 3-28 (1992).
-
(1992)
J. Cryptol.
, vol.5
, pp. 3-28
-
-
Bennett, C.H.1
Bessette, F.2
Brassard, G.3
Salvail, L.4
Smolin, J.5
-
5
-
-
11944254075
-
Quantum cryptography using any two non-orthogonal states
-
C. H. Bennett, “Quantum cryptography using any two non-orthogonal states, ” Phys. Rev. Lett. 68, 3121-3124 (1992).
-
(1992)
Phys. Rev. Lett.
, vol.68
, pp. 3121-3124
-
-
Bennett, C.H.1
-
6
-
-
0001082184
-
Effect of channel imperfection on the secrecy capacity of a quantum cryptographic system
-
B. Slutsky, P. C. Sun, Y. Mazurenko, R. Rao, and Y. Fainaman, “Effect of channel imperfection on the secrecy capacity of a quantum cryptographic system, ” J. Mod. Opt. 44, 953-961 (1997).
-
(1997)
J. Mod. Opt.
, vol.44
, pp. 953-961
-
-
Slutsky, B.1
Sun, P.C.2
Mazurenko, Y.3
Rao, R.4
Fainaman, Y.5
-
7
-
-
0001452279
-
Security of quantum cryptography against collective attacks
-
E. Biham and T. Mor, “Security of quantum cryptography against collective attacks, ” Phys. Rev. Lett. 78, 2256-2259 (1997).
-
(1997)
Phys. Rev. Lett.
, vol.78
, pp. 2256-2259
-
-
Biham, E.1
Mor, T.2
-
8
-
-
0031273993
-
Bounds on information and the security of quantum cryptography
-
E. Biham and T. Mor, “Bounds on information and the security of quantum cryptography, ” Phys. Rev. Lett 79, 4034-4037 (1997).
-
(1997)
Phys. Rev. Lett
, vol.79
, pp. 4034-4037
-
-
Biham, E.1
Mor, T.2
-
9
-
-
84955621476
-
Quantum key distribution and string oblivious transfer in noisy channels
-
N. Kobitz, ed., Vol. 1109 of Springer Lecture Notes in Computer Science Series, Springer, New York
-
D. Mayers, “Quantum key distribution and string oblivious transfer in noisy channels, ” in Advances in Cryptology, CRYPTO’96, N. Kobitz, ed., Vol. 1109 of Springer Lecture Notes in Computer Science Series (Springer, New York, 1996), pp. 343-357.
-
(1996)
Advances in Cryptology, CRYPTO’96
, pp. 343-357
-
-
Mayers, D.1
-
10
-
-
0029405656
-
Generalized privacy amplification
-
C. H. Bennett, G. Brassard, C. Crepeau, and U. M. Maurer, “Generalized privacy amplification, ” IEEE Trans. Inf. Theory 41, 1915-1923 (1995).
-
(1995)
IEEE Trans. Inf. Theory
, vol.41
, pp. 1915-1923
-
-
Bennett, C.H.1
Brassard, G.2
Crepeau, C.3
Maurer, U.M.4
-
11
-
-
0000600063
-
Quantum cryptography with coherent states
-
B. Huttner, N. Imoto, N. Gisin, and T. Mor, “Quantum cryptography with coherent states, ” Phys. Rev. A 51, 1863-1869 (1995).
-
(1995)
Phys. Rev. A
, vol.51
, pp. 1863-1869
-
-
Huttner, B.1
Imoto, N.2
Gisin, N.3
Mor, T.4
-
12
-
-
0001020515
-
Quantum amplifiers, quantum duplicators, and quantum cryptography, Quantum Semiclass
-
H. Yuen, “Quantum amplifiers, quantum duplicators, and quantum cryptography, ” Quantum Semiclass. Opt. 8, 939-949 (1996).
-
(1996)
Opt.
, vol.8
, pp. 939-949
-
-
Yuen, H.1
-
13
-
-
0001777508
-
Linking information reconciliation and privacy amplification
-
C. Cachin and U. M. Maurer, “Linking information reconciliation and privacy amplification, ” J. Cryptol. 10, 97-110 (1997).
-
(1997)
J. Cryptol.
, vol.10
, pp. 97-110
-
-
Cachin, C.1
Maurer, U.M.2
-
14
-
-
0001328001
-
Quantum-state disturbance versus information gain: Uncertainty relations for quantum information
-
C. A. Fuchs and A. Peres, “Quantum-state disturbance versus information gain: uncertainty relations for quantum information, ” Phys. Rev. A 53, 2038-2045 (1996).
-
(1996)
Phys. Rev. A
, vol.53
, pp. 2038-2045
-
-
Fuchs, C.A.1
Peres, A.2
-
15
-
-
5344222062
-
Optimal eavesdropping in quantum cryptography. I. Information bound and optimal strategy
-
C. A. Fuchs, N. Gisin, R. B. Griffiths, C.-S. Niu, and A. Peres, “Optimal eavesdropping in quantum cryptography. I. Information bound and optimal strategy, ” Phys. Rev. A 56, 1163-1172 (1997).
-
(1997)
Phys. Rev. A
, vol.56
, pp. 1163-1172
-
-
Fuchs, C.A.1
Gisin, N.2
Griffiths, R.B.3
Niu, C.-S.4
Peres, A.5
-
16
-
-
85010120677
-
Security of quantum cryptography against individual attacks
-
to be published
-
B. Slutsky, R. Rao, P.-C. Sun, and Y. Fainman, “Security of quantum cryptography against individual attacks, ” Phys. Rev. A (to be published).
-
Phys. Rev. A
-
-
Slutsky, B.1
Rao, R.2
Sun, P.-C.3
Fainman, Y.4
-
17
-
-
0000515658
-
Eavesdropping on quantum cryptographical systems
-
A. K. Ekert, B. Huttner, G. M. Palma, and A. Peres, “Eavesdropping on quantum cryptographical systems, ” Phys. Rev. A 50, 1047-1056 (1994).
-
(1994)
Phys. Rev. A
, vol.50
, pp. 1047-1056
-
-
Ekert, A.K.1
Huttner, B.2
Palma, G.M.3
Peres, A.4
|