-
1
-
-
0002880473
-
Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer
-
P.W. Shor, "Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer," Proc. 35th Annual IEEE Symposium on Foundations of Computer Science, p.116, 1994.
-
(1994)
Proc. 35th Annual IEEE Symposium on Foundations of Computer Science
, pp. 116
-
-
Shor, P.W.1
-
2
-
-
0026626314
-
Experimental quantum cryptography
-
C.H. Bennett, F. Bessette, G. Brassard, L. Salvail, and J. Smolin, "Experimental quantum cryptography," J. Cryptology, vol.5, p.3, 1992.
-
(1992)
J. Cryptology
, vol.5
, pp. 3
-
-
Bennett, C.H.1
Bessette, F.2
Brassard, G.3
Salvail, L.4
Smolin, J.5
-
3
-
-
0038975723
-
Quantum cryptography over 23 km of installed under-lake telecom fibre
-
A. Muller, H. Zbinden, and N. Gisin, "Quantum cryptography over 23 km of installed under-lake telecom fibre," Europhys. Lett., vol.33, p.335, 1996.
-
(1996)
Europhys. Lett.
, vol.33
, pp. 335
-
-
Muller, A.1
Zbinden, H.2
Gisin, N.3
-
4
-
-
0031098826
-
Interferometry with Faraday mirrors for quantum cryptography
-
H. Zbinden, J.D. Gautier, N. Gisin, B. Hutter, A. Muller, and W. Tittel, "Interferometry with Faraday mirrors for quantum cryptography," Electron. Lett., vol.33, p.586, 1997.
-
(1997)
Electron. Lett.
, vol.33
, pp. 586
-
-
Zbinden, H.1
Gautier, J.D.2
Gisin, N.3
Hutter, B.4
Muller, A.5
Tittel, W.6
-
5
-
-
84948615972
-
Quantum cryptography
-
R.J. Hughes, E.M. Alde, P. Dyer, G.G. Luther, G.L. Morgan, and M. Schauer, "Quantum cryptography," Comtemp. Phys., vol.36, p.149, 1995.
-
(1995)
Comtemp. Phys.
, vol.36
, pp. 149
-
-
Hughes, R.J.1
Alde, E.M.2
Dyer, P.3
Luther, G.G.4
Morgan, G.L.5
Schauer, M.6
-
6
-
-
0029357908
-
Quantum key distribution over distances as long as 30 km
-
C. Marand and P. Townsend, "Quantum key distribution over distances as long as 30km," Opt. Lett., vol.20, p.1695, 1995.
-
(1995)
Opt. Lett.
, vol.20
, pp. 1695
-
-
Marand, C.1
Townsend, P.2
-
7
-
-
0032178451
-
Automated 'plug & play' quantum key distribution
-
G. Ribordy, J. Gauiter, N. Gisin, O. Guinnard, and H. Zbinden, "Automated 'plug & play' quantum key distribution," Electron. Lett., vol.34, p.2116, 1998.
-
(1998)
Electron. Lett.
, vol.34
, pp. 2116
-
-
Ribordy, G.1
Gauiter, J.2
Gisin, N.3
Guinnard, O.4
Zbinden, H.5
-
8
-
-
0032121772
-
Experimental investigation of the performance limits of first telecommunications-window quantum cryptography systems
-
P.D. Townsend, "Experimental investigation of the performance limits of first telecommunications-window quantum cryptography systems," IEEE Photon. Technol. Lett., vol.10, no.7, p.1048, 1998.
-
(1998)
IEEE Photon. Technol. Lett.
, vol.10
, Issue.7
, pp. 1048
-
-
Townsend, P.D.1
-
9
-
-
0000418120
-
Experiments on long wavelength (1550 nm) 'plug and play' quantum cryptography systems
-
M. Bourennane, F. Gibson, A. Karlssom A. Hening, P. Jonsson, T. Tsegaye, D. Ljunggre, and E. Sundberg, "Experiments on long wavelength (1550 nm) 'plug and play' quantum cryptography systems," Optics Express, vol.4, no.10, p.383, 1999.
-
(1999)
Optics Express
, vol.4
, Issue.10
, pp. 383
-
-
Bourennane, M.1
Gibson, F.2
Karlssom, A.3
Hening, A.4
Jonsson, P.5
Tsegaye, T.6
Ljunggre, D.7
Sundberg, E.8
-
12
-
-
11944254075
-
Quantum cryptography using any two nonorthogonal states
-
C.H. Bennett, "Quantum cryptography using any two nonorthogonal states," Phys. Rev. Lett., vol.68, p.3121, 1992.
-
(1992)
Phys. Rev. Lett.
, vol.68
, pp. 3121
-
-
Bennett, C.H.1
-
13
-
-
0343152990
-
Qunatum cryptography based on Bell's The-orem
-
A.K. Ekert, "Qunatum cryptography based on Bell's The-orem," Phys. Rev. Lett., vol.67, p.661, 1991.
-
(1991)
Phys. Rev. Lett.
, vol.67
, pp. 661
-
-
Ekert, A.K.1
|