-
1
-
-
0003259517
-
Quantum Cryptography: Public Key Distribution and Coin Tossing
-
Bangalore, India
-
C. Bennett and G. Brassard, "Quantum Cryptography: Public Key Distribution and Coin Tossing," International Conference on Computers, Systems, and Signal Processing, Bangalore, India, 1984.
-
(1984)
International Conference on Computers, Systems, and Signal Processing
-
-
Bennett, C.1
Brassard, G.2
-
2
-
-
0026626314
-
Experimental quantum cryptography
-
C. Bennett, F. Bessette, G. Brassard, L. Salvail, and J. Smolin, "Experimental quantum cryptography," J. Cryptology, vol. 5, no. 1, 1992, pp. 3-28.
-
(1992)
J. Cryptology
, vol.5
, Issue.1
, pp. 3-28
-
-
Bennett, C.1
Bessette, F.2
Brassard, G.3
Salvail, L.4
Smolin, J.5
-
3
-
-
84955610252
-
Quantum cryptography over Underground optical fibers
-
N Koblitz, editor, volume 1109 of Lecture Notes in Computer Science, 18-22 August. Springer-Verlag
-
R. Hughes et al, "Quantum cryptography over Underground optical fibers," in N Koblitz, editor, Advances in Cryptology - CRYPTO '96, volume 1109 of Lecture Notes in Computer Science, pages 329-342, 18-22 August 1996. Springer-Verlag.
-
(1996)
Advances in Cryptology - CRYPTO '96
, pp. 329-342
-
-
Hughes, R.1
-
4
-
-
0011769922
-
Quantum key distribution over 67 km with a plug&play system
-
July
-
D. Stucki, N. Gisin, O. Guinnard, G. Ribordy and H. Zbinden, "Quantum key distribution over 67 km with a plug&play system," New J. Phys. 4 (July 2002) 41.
-
(2002)
New J. Phys.
, vol.4
, pp. 41
-
-
Stucki, D.1
Gisin, N.2
Guinnard, O.3
Ribordy, G.4
Zbinden, H.5
-
5
-
-
1242308082
-
Autocompensating quantum cryptography
-
July
-
D. Bethune and W. Risk, "Autocompensating quantum cryptography," New J. Phys. 4 (July 2002) 42.
-
(2002)
New J. Phys.
, vol.4
, pp. 42
-
-
Bethune, D.1
Risk, W.2
-
6
-
-
0010758769
-
Practical free-space quantum key distribution over 10 km in daylight and at night
-
July
-
R. Hughes, J. Nordholt, D. Derkacs and C. Peterson, "Practical free-space quantum key distribution over 10 km in daylight and at night," New J. Phys. 4 (July 2002) 43.
-
(2002)
New J. Phys.
, vol.4
, pp. 43
-
-
Hughes, R.1
Nordholt, J.2
Derkacs, D.3
Peterson, C.4
-
7
-
-
3042606747
-
Ground to satellite secure key exchange using quantum cryptography
-
October
-
J. Rarity, P. Tapster, P. Gorman and P. Knight, "Ground to satellite secure key exchange using quantum cryptography," New J. Phys. 4 (October 2002) 82.
-
(2002)
New J. Phys.
, vol.4
, pp. 82
-
-
Rarity, J.1
Tapster, P.2
Gorman, P.3
Knight, P.4
-
8
-
-
4243836477
-
Long-distance entanglement-based quantum key distribution
-
13 December
-
G. Ribordy, J. Brendel, J-D. Gautier, N. Gisin, and H. Zbinden, "Long-distance entanglement-based quantum key distribution," Phys. Rev. A, v. 63, 012309 (13 December 2000).
-
(2000)
Phys. Rev. A
, vol.63
, pp. 012309
-
-
Ribordy, G.1
Brendel, J.2
Gautier, J.-D.3
Gisin, N.4
Zbinden, H.5
-
9
-
-
0000057408
-
-
W. Tittel, J. Brendel, H. Zbinden, and N. Gisin, Phys. Rev. Lett. 84, 4737 (2000).
-
(2000)
Phys. Rev. Lett.
, vol.84
, pp. 4737
-
-
Tittel, W.1
Brendel, J.2
Zbinden, H.3
Gisin, N.4
-
10
-
-
0343152990
-
Quantum Cryptography Based on Bell's Theorem
-
5 August
-
A. Ekert, "Quantum Cryptography Based on Bell's Theorem," Phys. Rev. Lett. 67, 661 (5 August 1991).
-
(1991)
Phys. Rev. Lett.
, vol.67
, pp. 661
-
-
Ekert, A.1
-
11
-
-
11944254075
-
Quantum cryptography using any two nonorthogonal states
-
C. Bennett, 1992, "Quantum cryptography using any two nonorthogonal states," Phys. Rev. Lett. 68, 3121-3124.
-
(1992)
Phys. Rev. Lett.
, vol.68
, pp. 3121-3124
-
-
Bennett, C.1
-
12
-
-
3442883654
-
Bell Inequality for Position and Time
-
8 May
-
J. Franson, "Bell Inequality for Position and Time," Phys. Rev. Lett. 62, 2205 (8 May 1989).
-
(1989)
Phys. Rev. Lett.
, vol.62
, pp. 2205
-
-
Franson, J.1
-
14
-
-
0000043416
-
-
D. Naik, C. Peterson, A. White, A. Berglund, and P. Kwiat, Phys. Rev. Lett. 84, 4733 (2000).
-
(2000)
Phys. Rev. Lett.
, vol.84
, pp. 4733
-
-
Naik, D.1
Peterson, C.2
White, A.3
Berglund, A.4
Kwiat, P.5
-
15
-
-
0009353910
-
-
T. Jennewin, C. Simon, G. Weihs, H. Weinfurter, and A. Zeilinger, Phys. Rev. Lett. 84, 4729 (2000).
-
(2000)
Phys. Rev. Lett.
, vol.84
, pp. 4729
-
-
Jennewin, T.1
Simon, C.2
Weihs, G.3
Weinfurter, H.4
Zeilinger, A.5
-
16
-
-
1242330596
-
Entangled-photon six-state quantum cryptography
-
July
-
D. Enzer, P. Hadley, R. Hughes, C. Peterson and P. Kwiat, "Entangled-photon six-state quantum cryptography," New J. Phys. 4 (July 2002) 45.
-
(2002)
New J. Phys.
, vol.4
, pp. 45
-
-
Enzer, D.1
Hadley, P.2
Hughes, R.3
Peterson, C.4
Kwiat, P.5
-
17
-
-
0036013605
-
Quantum cryptography
-
January
-
N. Gisin et al, "Quantum cryptography," Rev. Mod. Phys., Vol. 74, No. 1, January 2002.
-
(2002)
Rev. Mod. Phys.
, vol.74
, Issue.1
-
-
Gisin, N.1
-
18
-
-
1242285756
-
Building the quantum network
-
July
-
C. Elliott, "Building the quantum network," New J. Phys. 4 (July 2002) 46.
-
(2002)
New J. Phys.
, vol.4
, pp. 46
-
-
Elliott, C.1
-
20
-
-
0019572642
-
New Hash Functions and their Use in Authentication and Set Equality
-
M. Wegman and L. Carter, "New Hash Functions and their Use in Authentication and Set Equality," J. Comp. Sys. Sci., 22, 265-279 (1981).
-
(1981)
J. Comp. Sys. Sci.
, vol.22
, pp. 265-279
-
-
Wegman, M.1
Carter, L.2
-
21
-
-
0032073168
-
Defense frontier analysis of quantum cryptographic systems
-
B. Slutsky, R. Rao, P. Sun, L. Tancevski, and S. Fainman, "Defense frontier analysis of quantum cryptographic systems," Applied Optics, vol. 37, no. 14, 1998, pp. 2869-2878.
-
(1998)
Applied Optics
, vol.37
, Issue.14
, pp. 2869-2878
-
-
Slutsky, B.1
Rao, R.2
Sun, P.3
Tancevski, L.4
Fainman, S.5
|