-
1
-
-
0003259517
-
Quantum cryptography: Public key distribution and coin tossing
-
IEEE Press, New York
-
C. H. Bennett and G. Brassard (1984), Quantum cryptography: Public key distribution and coin tossing, in Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing, IEEE Press, New York, pp. 175-179.
-
(1984)
Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing
, pp. 175-179
-
-
Bennett, C.H.1
Brassard, G.2
-
2
-
-
3042730516
-
Unconditional security in quantum cryptography
-
D. Mayers (2001), Unconditional security in quantum cryptography, J. Assoc. Comput. Mach., Vol. 48, pp. 351-406.
-
(2001)
J. Assoc. Comput. Mach.
, vol.48
, pp. 351-406
-
-
Mayers, D.1
-
4
-
-
0033605546
-
Unconditional security of quantum key distribution over arbitrarily long distances
-
H.-K. Lo and H. F. Chau (1999), Unconditional security of quantum key distribution over arbitrarily long distances, Science, Vol. 283, pp. 2050-2056.
-
(1999)
Science
, vol.283
, pp. 2050-2056
-
-
Lo, H.-K.1
Chau, H.F.2
-
5
-
-
0347090658
-
Simple proof of security of the BB84 quantum key distribution protocol
-
P. W. Shor and J. Preskill (2000), Simple proof of security of the BB84 quantum key distribution protocol, Phys. Rev. Lett., Vol. 85, pp. 441-444.
-
(2000)
Phys. Rev. Lett.
, vol.85
, pp. 441-444
-
-
Shor, P.W.1
Preskill, J.2
-
6
-
-
11544350211
-
Optimal eavesdropping in quantum cryptography with six states
-
D. Bruß (1998), Optimal eavesdropping in quantum cryptography with six states, Phys. Rev. Lett., Vol. 81, pp. 3018-3021.
-
(1998)
Phys. Rev. Lett.
, vol.81
, pp. 3018-3021
-
-
Bruß, D.1
-
7
-
-
0004586188
-
Optimal state estimation by mutually unbiased measurements
-
W. K. Wootters and B. D. Fields (1989), Optimal state estimation by mutually unbiased measurements, Ann. Phys. (N.Y.), Vol. 191, pp. 363-381.
-
(1989)
Ann. Phys. (N.Y.)
, vol.191
, pp. 363-381
-
-
Wootters, W.K.1
Fields, B.D.2
-
8
-
-
0037171183
-
Security of quantum key distribution using d-level systems
-
N. J. Cerf, M. Bourennane, A. Karlsson, and N. Gisin (2002), Security of quantum key distribution using d-level systems, Phys. Rev. Lett., Vol. 88, pp. 127902.
-
(2002)
Phys. Rev. Lett.
, vol.88
, pp. 127902
-
-
Cerf, N.J.1
Bourennane, M.2
Karlsson, A.3
Gisin, N.4
-
9
-
-
0033097504
-
Unconditionally secure key agreement and the intrinsic conditional information
-
U. Maurer and S. Wolf (1999), Unconditionally secure key agreement and the intrinsic conditional information, IEEE Trans. Inf. Theory, Vol. 45, pp. 499-514.
-
(1999)
IEEE Trans. Inf. Theory
, vol.45
, pp. 499-514
-
-
Maurer, U.1
Wolf, S.2
-
10
-
-
3142519923
-
Entanglement as a precondition for secure quantum key distribution
-
M. Curty, M. Lewenstein, and N. Lütkenhaus (2004), Entanglement as a precondition for secure quantum key distribution, Phys. Rev. Lett., Vol. 92, pp. 217903.
-
(2004)
Phys. Rev. Lett.
, vol.92
, pp. 217903
-
-
Curty, M.1
Lewenstein, M.2
Lütkenhaus, N.3
-
11
-
-
0017973511
-
Broadcast channels with confidential messages
-
I. Csiszár and J. Körner (1978), Broadcast channels with confidential messages, IEEE Trans. Inf. Theory, Vol. 24, pp. 339-348.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
12
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
U. M. Maurer (1993), Secret key agreement by public discussion from common information, IEEE Trans. Inf. Theory, Vol. 39, pp. 733-742.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, pp. 733-742
-
-
Maurer, U.M.1
-
13
-
-
0000324562
-
Quantum cryptography on noisy channels: Quantum versus classical key-agreement protocols
-
N. Gisin and S. Wolf (1999), Quantum cryptography on noisy channels: quantum versus classical key-agreement protocols, Phys. Rev. Lett., Vol. 83, pp. 4200-4203.
-
(1999)
Phys. Rev. Lett.
, vol.83
, pp. 4200-4203
-
-
Gisin, N.1
Wolf, S.2
-
14
-
-
35248888499
-
New bounds in secret-key agreement: The gap between formation and secrecy extraction
-
Springer-Verlag, Berlin
-
R. Renner and S. Wolf (2003), New bounds in secret-key agreement: The gap between formation and secrecy extraction, in Proceedings of EUROCRYPT 2003, Springer-Verlag, Berlin, pp. 562-577.
-
(2003)
Proceedings of EUROCRYPT 2003
, pp. 562-577
-
-
Renner, R.1
Wolf, S.2
-
15
-
-
0242323185
-
Grassmanian frames with applications to coding and communication
-
T. Strohmer and R. Heath (2003), Grassmanian Frames with Applications to Coding and Communication, Appl. Comp. Harm. Anal., Vol. 14, pp. 257-275.
-
(2003)
Appl. Comp. Harm. Anal.
, vol.14
, pp. 257-275
-
-
Strohmer, T.1
Heath, R.2
-
16
-
-
0037212207
-
Finite normalized tight frames
-
J. J. Benedetto and M. Fickus (2003), Finite Normalized Tight Frames, Adv. Comput. Math., Vol. 18, pp. 357-385.
-
(2003)
Adv. Comput. Math.
, vol.18
, pp. 357-385
-
-
Benedetto, J.J.1
Fickus, M.2
-
17
-
-
2942657646
-
Symmetric informationally complete quantum measurements
-
J. M. Renes, R. Blume-Kohout, A. J. Scott, and C. M. Caves (2004), Symmetric informationally complete quantum measurements, J. Math. Phys., Vol. 45, pp. 2171-2180.
-
(2004)
J. Math. Phys.
, vol.45
, pp. 2171-2180
-
-
Renes, J.M.1
Blume-Kohout, R.2
Scott, A.J.3
Caves, C.M.4
-
18
-
-
0041850238
-
Unambiguous discrimination between linearly independent quantum states
-
A. Chefles (1998), Unambiguous discrimination between linearly independent quantum states, Phys. Lett. A, Vol. 239, pp. 339-347.
-
(1998)
Phys. Lett. A
, vol.239
, pp. 339-347
-
-
Chefles, A.1
-
19
-
-
11944254075
-
Quantum cryptography using any two nonorthogonal states
-
C. H. Bennett (1992), Quantum cryptography using any two nonorthogonal states, Phys. Rev. Lett., Vol. 68, pp. 3121-3124.
-
(1992)
Phys. Rev. Lett.
, vol.68
, pp. 3121-3124
-
-
Bennett, C.H.1
-
20
-
-
42749104019
-
Spherical code key distribution protocols for qubits
-
J. M. Renes (2004), Spherical code key distribution protocols for qubits, Phys. Rev. A Vol. 70, pp. 052314.
-
(2004)
Phys. Rev. A
, vol.70
, pp. 052314
-
-
Renes, J.M.1
-
21
-
-
0242557609
-
Squeezing quantum information through a classical channel: Measuring the 'quantumness' of a qet of quantum states
-
C. A. Fuchs and M. Sasaki (2003), Squeezing quantum information through a classical channel: Measuring the 'quantumness' of a qet of quantum states, Quantum Inf. Comput., Vol. 3, pp. 377-404.
-
(2003)
Quantum Inf. Comput.
, vol.3
, pp. 377-404
-
-
Fuchs, C.A.1
Sasaki, M.2
-
22
-
-
1642383816
-
Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations
-
V. Scarani, A. Aćin, G. Ribordy, and N. Gisin (2004), Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations, Phys. Rev. Lett., Vol. 92, pp. 057901.
-
(2004)
Phys. Rev. Lett.
, vol.92
, pp. 057901
-
-
Scarani, V.1
Aćin, A.2
Ribordy, G.3
Gisin, N.4
-
24
-
-
0142057337
-
Tomographic quantum cryptography: Equivalence of quantum and classical key distillation
-
Dagmar Bruß, et al. (2003), Tomographic quantum cryptography: Equivalence of quantum and classical key distillation, Phys. Rev. Lett., Vol. 91, pp. 097901.
-
(2003)
Phys. Rev. Lett.
, vol.91
, pp. 097901
-
-
Bruß, D.1
-
25
-
-
0001336221
-
Accessible information and optimal strategies for real symmetrical quantum sources
-
M. Sasaki, et al. (1999), Accessible information and optimal strategies for real symmetrical quantum sources, Phys. Rev. A, Vol. 59, pp. 3325-3335.
-
(1999)
Phys. Rev. A
, vol.59
, pp. 3325-3335
-
-
Sasaki, M.1
-
26
-
-
0018019391
-
Information and quantum measurement
-
E. B. Davies (1978), Information and quantum measurement, IEEE Trans. Inf. Theory, Vol. 24, pp. 596-599.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, pp. 596-599
-
-
Davies, E.B.1
|