메뉴 건너뛰기




Volumn 33, Issue 4, 2003, Pages 227-238

Quantum Cryptography in Practice

Author keywords

Cryptographic protocols; Error correction; IPsec; Key agreement protocols; Privacy amplification; Quantum cryptography; Quantum key distribution; Secure networks

Indexed keywords

ALGORITHMS; DATA PRIVACY; NETWORK PROTOCOLS; PUBLIC KEY CRYPTOGRAPHY; SECURITY OF DATA;

EID: 1242332560     PISSN: 01464833     EISSN: None     Source Type: Journal    
DOI: 10.1145/863981.863982     Document Type: Conference Paper
Times cited : (87)

References (21)
  • 3
    • 84955610252 scopus 로고    scopus 로고
    • Quantum cryptography over Underground optical fibers
    • N Koblitz, editor, volume 1109 of Lecture Notes in Computer Science, 18-22 August. Springer-Verlag
    • R. Hughes et al, "Quantum cryptography over Underground optical fibers," in N Koblitz, editor, Advances in Cryptology - CRYPTO '96, volume 1109 of Lecture Notes in Computer Science, pages 329-342, 18-22 August 1996. Springer-Verlag.
    • (1996) Advances in Cryptology - CRYPTO '96 , pp. 329-342
    • Hughes, R.1
  • 4
  • 5
    • 1242308082 scopus 로고    scopus 로고
    • Autocompensating quantum cryptography
    • July
    • D. Bethune and W. Risk, "Autocompensating quantum cryptography," New J. Phys. 4 (July 2002) 42.
    • (2002) New J. Phys. , vol.4 , pp. 42
    • Bethune, D.1    Risk, W.2
  • 6
    • 0010758769 scopus 로고    scopus 로고
    • Practical free-space quantum key distribution over 10 km in daylight and at night
    • July
    • R. Hughes, J. Nordholt, D. Derkacs and C. Peterson, "Practical free-space quantum key distribution over 10 km in daylight and at night," New J. Phys. 4 (July 2002) 43.
    • (2002) New J. Phys. , vol.4 , pp. 43
    • Hughes, R.1    Nordholt, J.2    Derkacs, D.3    Peterson, C.4
  • 7
    • 3042606747 scopus 로고    scopus 로고
    • Ground to satellite secure key exchange using quantum cryptography
    • October
    • J. Rarity, P. Tapster, P. Gorman and P. Knight, "Ground to satellite secure key exchange using quantum cryptography," New J. Phys. 4 (October 2002) 82.
    • (2002) New J. Phys. , vol.4 , pp. 82
    • Rarity, J.1    Tapster, P.2    Gorman, P.3    Knight, P.4
  • 8
    • 4243836477 scopus 로고    scopus 로고
    • Long-distance entanglement-based quantum key distribution
    • 13 December
    • G. Ribordy, J. Brendel, J-D. Gautier, N. Gisin, and H. Zbinden, "Long-distance entanglement-based quantum key distribution," Phys. Rev. A, v. 63, 012309 (13 December 2000).
    • (2000) Phys. Rev. A , vol.63 , pp. 012309
    • Ribordy, G.1    Brendel, J.2    Gautier, J.-D.3    Gisin, N.4    Zbinden, H.5
  • 10
    • 0343152990 scopus 로고
    • Quantum Cryptography Based on Bell's Theorem
    • 5 August
    • A. Ekert, "Quantum Cryptography Based on Bell's Theorem," Phys. Rev. Lett. 67, 661 (5 August 1991).
    • (1991) Phys. Rev. Lett. , vol.67 , pp. 661
    • Ekert, A.1
  • 11
    • 11944254075 scopus 로고
    • Quantum cryptography using any two nonorthogonal states
    • C. Bennett, 1992, "Quantum cryptography using any two nonorthogonal states," Phys. Rev. Lett. 68, 3121-3124.
    • (1992) Phys. Rev. Lett. , vol.68 , pp. 3121-3124
    • Bennett, C.1
  • 12
    • 3442883654 scopus 로고
    • Bell Inequality for Position and Time
    • 8 May
    • J. Franson, "Bell Inequality for Position and Time," Phys. Rev. Lett. 62, 2205 (8 May 1989).
    • (1989) Phys. Rev. Lett. , vol.62 , pp. 2205
    • Franson, J.1
  • 17
    • 0036013605 scopus 로고    scopus 로고
    • Quantum cryptography
    • January
    • N. Gisin et al, "Quantum cryptography," Rev. Mod. Phys., Vol. 74, No. 1, January 2002.
    • (2002) Rev. Mod. Phys. , vol.74 , Issue.1
    • Gisin, N.1
  • 18
    • 1242285756 scopus 로고    scopus 로고
    • Building the quantum network
    • July
    • C. Elliott, "Building the quantum network," New J. Phys. 4 (July 2002) 46.
    • (2002) New J. Phys. , vol.4 , pp. 46
    • Elliott, C.1
  • 20
    • 0019572642 scopus 로고
    • New Hash Functions and their Use in Authentication and Set Equality
    • M. Wegman and L. Carter, "New Hash Functions and their Use in Authentication and Set Equality," J. Comp. Sys. Sci., 22, 265-279 (1981).
    • (1981) J. Comp. Sys. Sci. , vol.22 , pp. 265-279
    • Wegman, M.1    Carter, L.2
  • 21
    • 0032073168 scopus 로고    scopus 로고
    • Defense frontier analysis of quantum cryptographic systems
    • B. Slutsky, R. Rao, P. Sun, L. Tancevski, and S. Fainman, "Defense frontier analysis of quantum cryptographic systems," Applied Optics, vol. 37, no. 14, 1998, pp. 2869-2878.
    • (1998) Applied Optics , vol.37 , Issue.14 , pp. 2869-2878
    • Slutsky, B.1    Rao, R.2    Sun, P.3    Tancevski, L.4    Fainman, S.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.