-
1
-
-
0029389612
-
Quantum information and computation
-
Oct. , for a review of this topic
-
See C. H. Bennett, "Quantum information and computation," Phys. Today (Oct. 1995), for a review of this topic.
-
(1995)
Phys. Today
-
-
Bennett, C.H.1
-
2
-
-
33746708860
-
A single quantum cannot be cloned
-
W. K. Wootters and W. H. Zurek, "A single quantum cannot be cloned," Nature, vol. 299, 802 (1982).
-
(1982)
Nature
, vol.299
, pp. 802
-
-
Wootters, W.K.1
Zurek, W.H.2
-
3
-
-
0003259517
-
Quantum cryptography: Public-key distribution and coin tossing
-
Bangalore, India
-
C. H. Bennett and G. Brassard, "Quantum cryptography: Public-key distribution and coin tossing," in Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, pp. 175-179, 1984.
-
(1984)
Proceedings of IEEE International Conference on Computers, Systems and Signal Processing
, pp. 175-179
-
-
Bennett, C.H.1
Brassard, G.2
-
4
-
-
0026626314
-
Experimental quantum cryptography
-
C. H. Bennett, F. Bessette, G. Brassard, L. Salvail, and J. Smolin, "Experimental quantum cryptography," J. Cryptology, vol. 5, 3 (1992).
-
(1992)
J. Cryptology
, vol.5
, pp. 3
-
-
Bennett, C.H.1
Bessette, F.2
Brassard, G.3
Salvail, L.4
Smolin, J.5
-
5
-
-
0343152990
-
Quantum cryptography based on Bell's theorem
-
A. K. Ekert, "Quantum cryptography based on Bell's Theorem," Phys. Rev. Lett., vol. 67, 661 (1991).
-
(1991)
Phys. Rev. Lett.
, vol.67
, pp. 661
-
-
Ekert, A.K.1
-
6
-
-
0031030138
-
Quantum cryptography on multi-user optical fiber networks
-
P. D. Townsend, "Quantum cryptography on multi-user optical fiber networks," Nature, vol. 385, 47 (1997).
-
(1997)
Nature
, vol.385
, pp. 47
-
-
Townsend, P.D.1
-
7
-
-
0029357908
-
Quantum key distribution over distances as long as 30km
-
C. Marand and P. D. Townsend, "Quantum key distribution over distances as long as 30km," Opt. Lett., vol. 20, 1695 (1995).
-
(1995)
Opt. Lett.
, vol.20
, pp. 1695
-
-
Marand, C.1
Townsend, P.D.2
-
8
-
-
0029632446
-
Operational system for quantum cryptography
-
J. D. Franson and B. C. Jacobs, "Operational system for quantum cryptography," Electron. Lett., vol. 31, 232 (1995).
-
(1995)
Electron. Lett.
, vol.31
, pp. 232
-
-
Franson, J.D.1
Jacobs, B.C.2
-
9
-
-
0010147768
-
Quantum cryptography over 14km of installed optical fiber
-
(J. H. Eberly, L. Mandel, and E. Wolf, Eds.) Plenum, New York
-
R. J. Hughes, G. G. Luther, G. L. Morgan, and C. Simmons, "Quantum cryptography over 14km of installed optical fiber," in Proc. 7th Rochester Conf. on Coherence and Quantum Optics (J. H. Eberly, L. Mandel, and E. Wolf, Eds.), pp. 103-112, Plenum, New York, 1996.
-
(1996)
Proc. 7th Rochester Conf. on Coherence and Quantum Optics
, pp. 103-112
-
-
Hughes, R.J.1
Luther, G.G.2
Morgan, G.L.3
Simmons, C.4
-
10
-
-
0031098826
-
Interferometry with Faraday mirrors for quantum cryptography
-
H. Zbinden, J. D. Gautier, N. Gisin, B. Huttner, A. Muller, and W. Tittel, "Interferometry with Faraday mirrors for quantum cryptography," Electron. Lett., vol. 33, 586 (1997).
-
(1997)
Electron. Lett.
, vol.33
, pp. 586
-
-
Zbinden, H.1
Gautier, J.D.2
Gisin, N.3
Huttner, B.4
Muller, A.5
Tittel, W.6
-
12
-
-
84890522850
-
Communication theory of secrecy systems
-
C. E. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol. 28, 656 (1949).
-
(1949)
Bell Syst. Tech. J.
, vol.28
, pp. 656
-
-
Shannon, C.E.1
-
13
-
-
0003968445
-
-
Northwood Publications, London
-
H. Beker and F. Piper, Cipher Systems: The Protection of Communications, Northwood Publications, London, 1982; see also G. Brassard, in Modern Cryptology, Lecture Notes in Computer Science (G. Goos and J. Hartmanis, Eds.), Springer-Verlag, Berlin, 1988.
-
(1982)
Cipher Systems: The Protection of Communications
-
-
Beker, H.1
Piper, F.2
-
14
-
-
0039560206
-
-
(G. Goos and J. Hartmanis, Eds.), Springer-Verlag, Berlin
-
H. Beker and F. Piper, Cipher Systems: The Protection of Communications, Northwood Publications, London, 1982; see also G. Brassard, in Modern Cryptology, Lecture Notes in Computer Science (G. Goos and J. Hartmanis, Eds.), Springer-Verlag, Berlin, 1988.
-
(1988)
Modern Cryptology, Lecture Notes in Computer Science
-
-
Brassard, G.1
-
15
-
-
85115374351
-
Algorithms for quantum computation: Discrete logarithm and factoring
-
IEEE Computer Society Press, Los Alamitos, CA
-
P. Shor, "Algorithms for quantum computation: Discrete logarithm and factoring," in Proc 35th Annual IEEE Symposium on Foundations of Computer Science, pp. 124-134, IEEE Computer Society Press, Los Alamitos, CA, 1994.
-
(1994)
Proc 35th Annual IEEE Symposium on Foundations of Computer Science
, pp. 124-134
-
-
Shor, P.1
-
16
-
-
0000515658
-
Eavesdropping on quantum cryptosystems
-
A. K. Ekert, B. Huttner, G. M. Palma, and A. Peres, "Eavesdropping on quantum cryptosystems," Phys. Rev. A, vol. 50, 1047 (1994).
-
(1994)
Phys. Rev. A
, vol.50
, pp. 1047
-
-
Ekert, A.K.1
Huttner, B.2
Palma, G.M.3
Peres, A.4
-
17
-
-
84907612820
-
Information gain in quantum eavesdropping
-
B. Huttner and A. K. Ekert, "Information gain in quantum eavesdropping," J. Mod. Opt., vol. 41, 2455 (1994).
-
(1994)
J. Mod. Opt.
, vol.41
, pp. 2455
-
-
Huttner, B.1
Ekert, A.K.2
-
18
-
-
0023985539
-
Privacy amplification by public discussion
-
C. H. Bennett, G. Brassard, and J.-M. Robert, "Privacy amplification by public discussion," SIAM J. Comput., vol. 17, 210 (1988).
-
(1988)
SIAM J. Comput.
, vol.17
, pp. 210
-
-
Bennett, C.H.1
Brassard, G.2
Robert, J.-M.3
-
19
-
-
0023985539
-
Generalized privacy amplification
-
C. H. Bennett, G. Brassard, C. Crepeau, and U. Maurer, "Generalized privacy amplification," SIAM J. Comput., vol. 17, 210 (1988).
-
(1988)
SIAM J. Comput.
, vol.17
, pp. 210
-
-
Bennett, C.H.1
Brassard, G.2
Crepeau, C.3
Maurer, U.4
-
20
-
-
0019572642
-
New hash functions and their use in authentication and set equality
-
M. N. Wegman and J. L. Carter, "New hash functions and their use in authentication and set equality," J. Comput. Syst. Sci., vol. 22, 265 (1981).
-
(1981)
J. Comput. Syst. Sci.
, vol.22
, pp. 265
-
-
Wegman, M.N.1
Carter, J.L.2
-
21
-
-
11944254075
-
Quantum cryptography using any two non-orthogonal states
-
C. H. Bennett, "Quantum cryptography using any two non-orthogonal states," Phys. Rev. Lett., vol. 68, 3121 (1992).
-
(1992)
Phys. Rev. Lett.
, vol.68
, pp. 3121
-
-
Bennett, C.H.1
-
22
-
-
0027580767
-
Single-photon interference in a 10km long optical fiber interferometer
-
P. D. Townsend, J. G. Rarity, and P. R. Tapster, "Single-photon interference in a 10km long optical fiber interferometer," Electron. Lett., vol. 29, 634 (1993).
-
(1993)
Electron. Lett.
, vol.29
, pp. 634
-
-
Townsend, P.D.1
Rarity, J.G.2
Tapster, P.R.3
-
23
-
-
0001635114
-
Practical quantum cryptography based on two-photon interferometry
-
A. K. Ekert, J. G. Rarity, P. R. Tapster, and G. M. Palma, "Practical quantum cryptography based on two-photon interferometry," Phys. Rev. Lett., vol. 69, 1293 (1992).
-
(1992)
Phys. Rev. Lett.
, vol.69
, pp. 1293
-
-
Ekert, A.K.1
Rarity, J.G.2
Tapster, P.R.3
Palma, G.M.4
-
24
-
-
0010204410
-
Quantum cryptography: How to beat the code breakers using quantum mechanics
-
S. J. D. Phoenix and P. D. Townsend, "Quantum cryptography: How to beat the code breakers using quantum mechanics," Contemp. Phys., vol. 36, 165 (1995).
-
(1995)
Contemp. Phys.
, vol.36
, pp. 165
-
-
Phoenix, S.J.D.1
Townsend, P.D.2
-
25
-
-
0022663077
-
Experimental evidence for a photon anticorrelation effect on a beamsplitter: A new light on single-photon interferences
-
P. Grangier, G. Roger, and A. Aspect, "Experimental evidence for a photon anticorrelation effect on a beamsplitter: A new light on single-photon interferences," Europhys. Lett., vol. 1, 173 (1986).
-
(1986)
Europhys. Lett.
, vol.1
, pp. 173
-
-
Grangier, P.1
Roger, G.2
Aspect, A.3
-
26
-
-
0027912088
-
Enhanced single-photon fringe visibility in a 10km long prototype quantum cryptography channel
-
P. D. Townsend, J. G. Rarity, and P. R. Tapster, "Enhanced single-photon fringe visibility in a 10km long prototype quantum cryptography channel," Electron. Lett., vol. 29, 1292 (1993).
-
(1993)
Electron. Lett.
, vol.29
, pp. 1292
-
-
Townsend, P.D.1
Rarity, J.G.2
Tapster, P.R.3
-
27
-
-
0030822386
-
Simultaneous quantum cryptographic key distribution and conventional data transmission over installed fiber using wavelength division multiplexing
-
P. D. Townsend, "Simultaneous quantum cryptographic key distribution and conventional data transmission over installed fiber using wavelength division multiplexing," Electron. Lett., vol. 33, 188 (1997).
-
(1997)
Electron. Lett.
, vol.33
, pp. 188
-
-
Townsend, P.D.1
-
28
-
-
0028531266
-
Photon counting using passively quenched Germanium avalanche photodiodes
-
P. C. M. Owens, J. G. Rarity, P. R. Tapster, D. Knight, and P. D. Townsend, "Photon counting using passively quenched Germanium avalanche photodiodes," Appl. Opt., vol. 33, 6895 (1994).
-
(1994)
Appl. Opt.
, vol.33
, pp. 6895
-
-
Owens, P.C.M.1
Rarity, J.G.2
Tapster, P.R.3
Knight, D.4
Townsend, P.D.5
-
29
-
-
0000005686
-
Security of quantum cryptography against individual attacks
-
and references therein
-
See, for example, B. Slutsky, R. Rao, P. C. Sun, and Y. Fainman, "Security of quantum cryptography against individual attacks," Phys. Rev. A, vol. 57, 2383 (1998), and references therein.
-
(1998)
Phys. Rev. A
, vol.57
, pp. 2383
-
-
Slutsky, B.1
Rao, R.2
Sun, P.C.3
Fainman, Y.4
-
30
-
-
85033882438
-
-
See, for example, N. Lütkenhaus, "LANL quant-ph e-print archive, 9806008," and references therein
-
See, for example, N. Lütkenhaus, "LANL quant-ph e-print archive, 9806008," and references therein.
-
-
-
-
31
-
-
0028532177
-
Single-photon detection beyond 1 μm: Performance of commercially available germanium photodiodes
-
A. Lacaita, P. A. Francese, F. Zappa and S. Cova, "Single-photon detection beyond 1 μm: Performance of commercially available germanium photodiodes," Appl. Opt., vol. 33, 6902 (1994).
-
(1994)
Appl. Opt.
, vol.33
, pp. 6902
-
-
Lacaita, A.1
Francese, P.A.2
Zappa, F.3
Cova, S.4
-
32
-
-
0028523458
-
Design of quantum cryptography systems for passive optical networks
-
P. D. Townsend, S. J. D. Phoenix, K. J. Blow, and S. M. Barnett, "Design of quantum cryptography systems for passive optical networks," Electron. Lett., vol. 30, 1875 (1994).
-
(1994)
Electron. Lett.
, vol.30
, pp. 1875
-
-
Townsend, P.D.1
Phoenix, S.J.D.2
Blow, K.J.3
Barnett, S.M.4
-
33
-
-
0029322598
-
Multi-user quantum cryptography on optical networks
-
S. J. D. Phoenix, S. M. Barnett, P. D. Townsend, and K. J. Blow, "Multi-user quantum cryptography on optical networks," J. Mod. Opt., vol. 42, 1155 (1995).
-
(1995)
J. Mod. Opt.
, vol.42
, pp. 1155
-
-
Phoenix, S.J.D.1
Barnett, S.M.2
Townsend, P.D.3
Blow, K.J.4
-
34
-
-
0000924408
-
Single-photon detection beyond 1 μm: Performance of commercially available InGaAs/InP detectors
-
A. Lacaita, P. A. Francese, F. Zappa, and S. Cova, "Single-photon detection beyond 1 μm: Performance of commercially available InGaAs/InP detectors," Appl. Opt., vol. 35, 2986 (1996).
-
(1996)
Appl. Opt.
, vol.35
, pp. 2986
-
-
Lacaita, A.1
Francese, P.A.2
Zappa, F.3
Cova, S.4
-
35
-
-
0032049044
-
Performance of InGaAs/InP avalanche photodiodes as gated-mode photon counters
-
G. Ribordy, J.-D. Gautier, H. Zbinden, and N. Gisin, "Performance of InGaAs/InP avalanche photodiodes as gated-mode photon counters," Appl. Opt., vol. 37, 2273 (1998).
-
(1998)
Appl. Opt.
, vol.37
, pp. 2273
-
-
Ribordy, G.1
Gautier, J.-D.2
Zbinden, H.3
Gisin, N.4
-
36
-
-
0032121772
-
Experimental investigation of the performance limits for first telecommunications-window quantum cryptography systems
-
P. D. Townsend, "Experimental investigation of the performance limits for first telecommunications-window quantum cryptography systems," Photon. Technol. Lett. 10, 1048 (1998).
-
(1998)
Photon. Technol. Lett.
, vol.10
, pp. 1048
-
-
Townsend, P.D.1
|