-
1
-
-
0003259517
-
Public-key distribution and coin tossing
-
Bangalore, India
-
C. H. Bennett and G. Brassard, "Public-key distribution and coin tossing," in Proc. IEEE Int. Conf. Computers, Systems, and Signal Processing, Bangalore, India, 1984, pp. 175-179.
-
(1984)
Proc. IEEE Int. Conf. Computers, Systems, and Signal Processing
, pp. 175-179
-
-
Bennett, C.H.1
Brassard, G.2
-
2
-
-
11944254075
-
Quantum cryptography using any two nonorthogonal states
-
C. H. Bennett, "Quantum cryptography using any two nonorthogonal states," Phys. Rev. Lett., vol. 68, p. 3121, 1992.
-
(1992)
Phys. Rev. Lett.
, vol.68
, pp. 3121
-
-
Bennett, C.H.1
-
3
-
-
0002977948
-
Quantum cryptography
-
Oct.
-
C. H. Bennett, G. Brassard, and A. K. Ekert, "Quantum cryptography," Scientific Amer., vol. 267, pp. 50-57, Oct. 1992.
-
(1992)
Scientific Amer.
, vol.267
, pp. 50-57
-
-
Bennett, C.H.1
Brassard, G.2
Ekert, A.K.3
-
4
-
-
0036013605
-
Quantum cryptography
-
N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden, "Quantum cryptography," Rev. Mod. Phys., vol. 74, p. 145, 2002.
-
(2002)
Rev. Mod. Phys.
, vol.74
, pp. 145
-
-
Gisin, N.1
Ribordy, G.2
Tittel, W.3
Zbinden, H.4
-
5
-
-
0035332232
-
Quantum distribution of Gaussian keys using squeezed states
-
May
-
N. J. Cerf, M. Lévy, and G. Van Assche, "Quantum distribution of Gaussian keys using squeezed states," Phys. Rev. A, vol. 63, p. 052311, May 2001.
-
(2001)
Phys. Rev. A
, vol.63
, pp. 052311
-
-
Cerf, N.J.1
Lévy, M.2
Van Assche, G.3
-
6
-
-
0037017198
-
Continuous variable quantum cryptography using coherent states
-
Feb.
-
F. Grosshans and P. Grangier, "Continuous variable quantum cryptography using coherent states," Phys. Rev. Lett., vol. 88, p. 057902, Feb. 2002.
-
(2002)
Phys. Rev. Lett.
, vol.88
, pp. 057902
-
-
Grosshans, F.1
Grangier, P.2
-
7
-
-
0037448569
-
Quantum key distribution using gaussian-modulated coherent states
-
F. Grosshans, G. Van Assche, J. Wenger, R. Brouri, N. J. Cerf, and P. Grangier, "Quantum key distribution using gaussian-modulated coherent states," Nature, vol. 421, pp. 238-241, 2003.
-
(2003)
Nature
, vol.421
, pp. 238-241
-
-
Grosshans, F.1
Van Assche, G.2
Wenger, J.3
Brouri, R.4
Cerf, N.J.5
Grangier, P.6
-
8
-
-
0023985539
-
Privacy amplification by public discussion
-
C. H. Bennett, G. Brassard, and J.-M. Robert, "Privacy amplification by public discussion," SIAM J. Comput., vol. 17, no. 2, pp. 210-229, 1988.
-
(1988)
SIAM J. Comput.
, vol.17
, Issue.2
, pp. 210-229
-
-
Bennett, C.H.1
Brassard, G.2
Robert, J.-M.3
-
9
-
-
0001598288
-
Secret-key reconciliation by public discussion
-
T. Helleseth, Ed. Berlin, Germany: Springer-Verlag
-
G. Brassard and L. Salvail, "Secret-key reconciliation by public discussion," in Advances in Cryptology - Eurocrypt'93 (Lecture Notes in Computer Science), T. Helleseth, Ed. Berlin, Germany: Springer-Verlag, 1993, pp. 411-423.
-
(1993)
Advances in Cryptology - Eurocrypt'93 (Lecture Notes in Computer Science)
, pp. 411-423
-
-
Brassard, G.1
Salvail, L.2
-
10
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
May
-
U. M. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inform. Theory, vol. 39, pp. 733-742, May 1993.
-
(1993)
IEEE Trans. Inform. Theory
, vol.39
, pp. 733-742
-
-
Maurer, U.M.1
-
11
-
-
0029405656
-
Generalized privacy amplification
-
Nov.
-
C. H. Bennett, G. Brassard, C. Crépeau, and U. M. Maurer, "Generalized privacy amplification," IEEE Trans. Inform. Theory, vol. 41, pp. 1915-1923, Nov. 1995.
-
(1995)
IEEE Trans. Inform. Theory
, vol.41
, pp. 1915-1923
-
-
Bennett, C.H.1
Brassard, G.2
Crépeau, C.3
Maurer, U.M.4
-
13
-
-
0018456171
-
Universal classes of hash functions
-
J. L. Carter and M. N. Wegman, "Universal classes of hash functions," J. Comp. Syst. Sci., vol. 18, pp. 143-154, 1979.
-
(1979)
J. Comp. Syst. Sci.
, vol.18
, pp. 143-154
-
-
Carter, J.L.1
Wegman, M.N.2
-
14
-
-
0004013982
-
-
Ph. D. dissertation, ETH Zürich, Zürich, Switzerland
-
C. Cachin, "Entropy measures and unconditional security in cryptography," Ph. D. dissertation, ETH Zürich, Zürich, Switzerland, 1997.
-
(1997)
Entropy Measures and Unconditional Security in Cryptography
-
-
Cachin, C.1
-
15
-
-
84948960386
-
Information-theoretic key agreement: From weak to strong secrecy for free
-
B. Preneel, Ed. Berlin, Germany: Springer-Verlag
-
U. Maurer and S. Wolf, "Information-theoretic key agreement: From weak to strong secrecy for free," in Advances in Cryptology - Eurocrypt 2000 (Lecture Notes in Computer Science), B. Preneel, Ed. Berlin, Germany: Springer-Verlag, 2000, pp. 351-368.
-
(2000)
Advances in Cryptology - Eurocrypt 2000 (Lecture Notes in Computer Science)
, pp. 351-368
-
-
Maurer, U.1
Wolf, S.2
-
18
-
-
1442358427
-
Analogue of the Vernam system for continuous time series
-
MM 43-110-44, May
-
C. E. Shannon, "Analogue of the Vernam system for continuous time series," Bell Labs. Memo, MM 43-110-44, May 1943.
-
(1943)
Bell Labs. Memo
-
-
Shannon, C.E.1
-
20
-
-
0015648934
-
Noiseless coding of correlated information sources
-
July
-
D. Slepian and J. K. Wolf, "Noiseless coding of correlated information sources," IEEE Trans. Inform. Theory, vol. IT-19, pp. 471-480, July 1973.
-
(1973)
IEEE Trans. Inform. Theory
, vol.IT-19
, pp. 471-480
-
-
Slepian, D.1
Wolf, J.K.2
-
21
-
-
0032651629
-
Distributed source coding using syndromes (DISCUS): Design and construction
-
Mar.
-
S. S. Pradhan and K. Ramchandran, "Distributed source coding using syndromes (DISCUS): Design and construction," in Proc. IEEE Data Compression Conf., Mar. 1999, pp. 158-167.
-
(1999)
Proc. IEEE Data Compression Conf.
, pp. 158-167
-
-
Pradhan, S.S.1
Ramchandran, K.2
-
23
-
-
0034296204
-
A study on secret key reconciliation protocol Cascade
-
Oct.
-
T. Sugimoto and K. Yamazaki, "A study on secret key reconciliation protocol Cascade," IEICE Trans. Fundamentals, vol. E83-A, no. 10, pp. 1987-1991, Oct. 2000.
-
(2000)
IEICE Trans. Fundamentals
, vol.E83-A
, Issue.10
, pp. 1987-1991
-
-
Sugimoto, T.1
Yamazaki, K.2
-
25
-
-
0038783533
-
Fast, efficient error reconciliation for quantum cryptography
-
W. T. Buttler, S. K. Lamoreaux, J. R. Torgerson, G. H. Nickel, C. H. Donahue, and C. G. Peterson, "Fast, efficient error reconciliation for quantum cryptography," Phys. Rev. A., vol. 67, p. 052303, 2003.
-
(2003)
Phys. Rev. A.
, vol.67
, pp. 052303
-
-
Buttler, W.T.1
Lamoreaux, S.K.2
Torgerson, J.R.3
Nickel, G.H.4
Donahue, C.H.5
Peterson, C.G.6
-
26
-
-
4243703966
-
Quantum cryptography with a predetermined key, using continuous-variable Einstein-Podolsky-Rosen correlations
-
M. D. Reid, "Quantum cryptography with a predetermined key, using continuous-variable Einstein-Podolsky-Rosen correlations," Phys. Rev. A, vol. 62, p. 062308, 2000.
-
(2000)
Phys. Rev. A
, vol.62
, pp. 062308
-
-
Reid, M.D.1
-
27
-
-
0346688181
-
Continuous variable quantum cryptography
-
T. C. Ralph, "Continuous variable quantum cryptography," Phys. Rev. A, vol. 61, p. 010303(R), 2000.
-
(2000)
Phys. Rev. A
, vol.61
-
-
Ralph, T.C.1
-
28
-
-
4243332662
-
Quantum cryptography with squeezed states
-
M. Hillery, "Quantum cryptography with squeezed states," Phys. Rev. A, vol. 61, p. 022309, 2000.
-
(2000)
Phys. Rev. A
, vol.61
, pp. 022309
-
-
Hillery, M.1
-
29
-
-
0037156920
-
Quantum key distribution with bright entangled beams
-
C. Silberhorn, N. Korolkova, and G. Leuchs, "Quantum key distribution with bright entangled beams," Phys. Rev. Lett., vol. 88, p. 167902, 2002.
-
(2002)
Phys. Rev. Lett.
, vol.88
, pp. 167902
-
-
Silberhorn, C.1
Korolkova, N.2
Leuchs, G.3
|