-
1
-
-
0036612254
-
Gaps between equations and experiments in quantum cryptography
-
J. M. Myers and F. H. Madjid, "Gaps between equations and experiments in quantum cryptography," J. Opt. B: Quantum Semiclass. Opt. 4, pp. S109-S116, 2002.
-
(2002)
J. Opt. B: Quantum Semiclass. Opt.
, vol.4
-
-
Myers, J.M.1
Madjid, F.H.2
-
2
-
-
27644596637
-
Matched detectors as definers offeree
-
arXiv:quant-ph/0404113 v2 ; accepted for publication
-
F. H. Madjid and J. M. Myers, "Matched detectors as definers offeree," arXiv:quant-ph/0404113 v2, 2004; accepted for publication in Annals of Physics.
-
(2004)
Annals of Physics
-
-
Madjid, F.H.1
Myers, J.M.2
-
3
-
-
10444255789
-
A proof that measured data and equations of quantum mechanics can be linked only by guesswork
-
Quantum Computation and Information, S. J. Lomonaco, Jr. and H. E. Brandt, eds., American Mathematical Society, Providence, RI
-
J. M. Myers and F. H. Madjid, "A proof that measured data and equations of quantum mechanics can be linked only by guesswork," Quantum Computation and Information, S. J. Lomonaco, Jr. and H. E. Brandt, eds., Contemporary Mathematics Series, Vol. 305, pp. 221-244, American Mathematical Society, Providence, RI, 2002.
-
(2002)
Contemporary Mathematics Series
, vol.305
, pp. 221-244
-
-
Myers, J.M.1
Madjid, F.H.2
-
4
-
-
27644580168
-
-
note
-
I am indebted to Chip Elliott of BBN Technologies for the distinction between attacks to which published proofs apply, which he has called "signature attacks," and a more vicious attack that modifies Bob's receiver, which he has called a "boundary attack."
-
-
-
-
5
-
-
0003259517
-
Quantum cryptography: Public key distribution and coin tossing
-
IEEE, New york
-
C. H. Bennett and G. Brassard, "Quantum cryptography: Public key distribution and coin tossing," Proc. IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, pp. 175-179, IEEE, New york, 1984.
-
(1984)
Proc. IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India
, pp. 175-179
-
-
Bennett, C.H.1
Brassard, G.2
-
9
-
-
0000005686
-
Security of quantum cryptography against individual attacks
-
B. A. Slutsky, R. Rao, P.-C. Sun, and Y. Fainman, "Security of quantum cryptography against individual attacks," Phys. Rev. A 57, pp. 2383-2398, 1998.
-
(1998)
Phys. Rev. A
, vol.57
, pp. 2383-2398
-
-
Slutsky, B.A.1
Rao, R.2
Sun, P.-C.3
Fainman, Y.4
-
10
-
-
0032073168
-
Defense frontier analysis of quantum cryptographic systems
-
B. A. Slutsky, R. Rao, P.-C. Sun, L. Tancevski, and S. Fainman, "Defense frontier analysis of quantum cryptographic systems," Applied Optics 37, pp. 2869-2878, 1998.
-
(1998)
Applied Optics
, vol.37
, pp. 2869-2878
-
-
Slutsky, B.A.1
Rao, R.2
Sun, P.-C.3
Tancevski, L.4
Fainman, S.5
-
11
-
-
0003083815
-
Linkages between the calculable and the incalculable in quantum theory
-
F. H. Madjid and J. M. Myers, "Linkages between the calculable and the incalculable in quantum theory," Annals of Physics 221, pp. 258-305, 1993.
-
(1993)
Annals of Physics
, vol.221
, pp. 258-305
-
-
Madjid, F.H.1
Myers, J.M.2
-
13
-
-
84861593360
-
-
Cambridge University Press, Cambridge, UK
-
M. A. Nielsen and I. L. Chuang, Quantum Computation and Quantum Information, p. 403, Cambridge University Press, Cambridge, UK, 2000.
-
(2000)
Quantum Computation and Quantum Information
, pp. 403
-
-
Nielsen, M.A.1
Chuang, I.L.2
|