-
2
-
-
0026626314
-
Experimental quantum cryptography
-
C. H. Bennett, F. Bessette, G. Brassard, L. Salvail, and J. Smolin. Experimental quantum cryptography. Jour. of Cryptology, 5: 3-28, 1992.
-
(1992)
Jour. of Cryptology
, vol.5
, pp. 3-28
-
-
Bennett, C.H.1
Bessette, F.2
Brassard, G.3
Salvail, L.4
Smolin, J.5
-
3
-
-
0003259517
-
Quantum cryptography: Public key distribution and coin tossing
-
Bangalore, India, Dec. IEEE
-
C. H. Bennett and G. Brassard. Quantum cryptography: Public key distribution and coin tossing. In Proc. of IEEE Int. Conf. on Computers, Systems and Signal Processing, pages 175-179, Bangalore, India, Dec. 1984. IEEE.
-
(1984)
Proc. of IEEE Int. Conf. on Computers, Systems and Signal Processing
, pp. 175-179
-
-
Bennett, C.H.1
Brassard, G.2
-
4
-
-
0027803208
-
A quantum bit commitment scheme provably unbreakable by both parties
-
Palo Alto, Ca.
-
C. H. Bennett, G. Brassard, C. Crépeau, and D. Langlois. A quantum bit commitment scheme provably unbreakable by both parties. In Proc. of 34th Ann. Symp. on Found. of Comp. Sc., pages 362-371, Palo Alto, Ca., 1993.
-
(1993)
Proc. of 34th Ann. Symp. on Found. of Comp. Sc.
, pp. 362-371
-
-
Bennett, C.H.1
Brassard, G.2
Crépeau, C.3
Langlois, D.4
-
5
-
-
17544370938
-
Parity bit in quantum cryptography
-
C. H. Bennett, T. Mor, and J. A. Smolin. Parity bit in quantum cryptography. Phys. Rev. A, 54(3):2675-2684, 1996. (Pubitemid 126591946)
-
(1996)
Physical Review A - Atomic, Molecular, and Optical Physics
, vol.54
, Issue.4
, pp. 2675-2684
-
-
Bennett, C.H.1
Mor, T.2
Smolin, J.A.3
-
6
-
-
0003432201
-
-
Quant-ph/9801022
-
E. Biham, M. Boyer, G. Brassard, J. van de Graaf, and T. Mor. Security of quantum key distribution against all collective attacks. Quant-ph/9801022, 1998.
-
(1998)
Security of Quantum Key Distribution Against All Collective Attacks
-
-
Biham, E.1
Boyer, M.2
Brassard, G.3
Van De Graaf, J.4
Mor, T.5
-
7
-
-
0031273993
-
Bounds on information and the security of quantum cryptography
-
E. Biham and T. Mor. Bounds on information and the security of quantum cryptography. Phys. Rev. Lett., 79(20):4034-4037, Nov. 1997. (Pubitemid 127645147)
-
(1997)
Physical Review Letters
, vol.79
, Issue.20
, pp. 4034-4037
-
-
Biham, E.1
Mor, T.2
-
8
-
-
0001452279
-
Security of quantum cryptography against collective attacks
-
E. Biham and T. Mor. Security of quantum cryptography against collective attacks. Phys. Rev. Lett., 78:2256-2259, 1997. (Pubitemid 127651855)
-
(1997)
Physical Review Letters
, vol.78
, Issue.11
, pp. 2256-2259
-
-
Biham, E.1
Mor, T.2
-
10
-
-
1242285753
-
Quantum cryptography via parametric downconversion
-
Quant-ph/9906074, To appear in
-
G. Brassard, T. Mor, and B. C. Sanders. Quantum cryptography via parametric downconversion. Quant-ph/9906074, To appear in Proceedings of the Quantum Communication, Computing, and Measurement 2 (QCM'98) conference, Evanston, Ill., USA, August 1998.
-
Proceedings of the Quantum Communication, Computing, and Measurement 2 (QCM'98) Conference, Evanston, Ill., USA, August 1998
-
-
Brassard, G.1
Mor, T.2
Sanders, B.C.3
-
11
-
-
6144265213
-
Quantum privacy amplification and the security of quantum cryptography over noisy channels
-
D. Deutsch, A. K. Ekert, R. Jozsa, C. Macchiavello, S. Popescu, and A. Sanpera. Quantum privacy amplification and the security of quantum cryptography over noisy channels. Phys. Rev. Lett., 77:2818-2821, 1996. (Pubitemid 126624149)
-
(1996)
Physical Review Letters
, vol.77
, Issue.13
, pp. 2818-2821
-
-
Deutsch, D.1
Ekert, A.2
Jozsa, R.3
Macchiavello, C.4
Popescu, S.5
Sanpera, A.6
-
12
-
-
5344222062
-
Optimal eavesdropping in quantum cryptography. I. Information bound and optimal strategy
-
C. A. Fuchs, N. Gisin, R. B. Griffiths, C.-S. Niu, and A. Peres. Optimal eavesdropping in quantum cryptography. I. Information bound and optimal strategy. Phys. Rev. A, 56:1163-1172, 1997. (Pubitemid 127605160)
-
(1997)
Physical Review A - Atomic, Molecular, and Optical Physics
, vol.56
, Issue.2
, pp. 1163-1172
-
-
Fuchs, C.A.1
Gisin, N.2
Griffiths, R.B.3
Niu, C.-S.4
Peres, A.5
-
14
-
-
84947403595
-
Probability inequalities for sums of bounded random variables
-
W. Hoeffding. Probability inequalities for sums of bounded random variables. J. Amer. Stat. Assoc., 58: 13-20, 1963.
-
(1963)
J. Amer. Stat. Assoc.
, vol.58
, pp. 13-20
-
-
Hoeffding, W.1
-
16
-
-
0033605546
-
Unconditional security of quantum key distribution over arbitrarily long distances
-
H.-K. Lo and H. F. Chau. Unconditional security of quantum key distribution over arbitrarily long distances. Science, 283: 2050-2056, 1999.
-
(1999)
Science
, vol.283
, pp. 2050-2056
-
-
Lo, H.-K.1
Chau, H.F.2
-
18
-
-
84957696255
-
On the security of the quantum oblivious transfer and key distribution protocols
-
Proceedings of Crypto'95
-
D. Mayers. On the security of the quantum oblivious transfer and key distribution protocols. In Proceedings of Crypto'95, number 963 in LNCS, pages 124-135, 1995.
-
(1995)
LNCS
, vol.963
, pp. 124-135
-
-
Mayers, D.1
-
19
-
-
84955621476
-
Quantum key distribution and string oblivious transfer in noisy channel
-
Proceedings of Crypto'96
-
D. Mayers. Quantum key distribution and string oblivious transfer in noisy channel. In Proceedings of Crypto'96, number 1109 in LNCS, pages 343-357, 1996.
-
(1996)
LNCS
, vol.1109
, pp. 343-357
-
-
Mayers, D.1
-
21
-
-
84878954642
-
-
Jan. Private communication
-
P. Shor, Jan. 1999. Private communication.
-
(1999)
-
-
Shor, P.1
-
23
-
-
0142051871
-
Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer
-
P. W. Shor. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput., 26: 1484-1509, 1997.
-
(1997)
SIAM J. Comput.
, vol.26
, pp. 1484-1509
-
-
Shor, P.W.1
-
24
-
-
0001998264
-
Conjugate coding
-
S. Wiesner. Conjugate coding. Sigact News, 15: 77-88, 1983.
-
(1983)
Sigact News
, vol.15
, pp. 77-88
-
-
Wiesner, S.1
-
25
-
-
4243104359
-
Security of quantum protocols against coherent measurements
-
June
-
A. Yao. Security of quantum protocols against coherent measurements. In Proc. of the 26th ACM Symp. on the Theory of Computing, pages 67-75, June 1995.
-
(1995)
Proc. of the 26th ACM Symp. on the Theory of Computing
, pp. 67-75
-
-
Yao, A.1
|