-
1
-
-
0001293325
-
Incoherent and coherent eavesdropping in the 6-state protocol of quantum cryptography
-
Bechmann-Pasquinucci, H., Gisin, N.: Incoherent and Coherent Eavesdropping in the 6-state Protocol of Quantum Cryptography. Phys. Rev. A 59, 4238-1248 (1999)
-
(1999)
Phys. Rev. A
, vol.59
, pp. 4238-11248
-
-
Bechmann-Pasquinucci, H.1
Gisin, N.2
-
2
-
-
11944254075
-
Quantum cryptography using any two nonorthogonal states
-
Bennett, C: Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68, 3121-3124 (1992)
-
(1992)
Phys. Rev. Lett.
, vol.68
, pp. 3121-3124
-
-
Bennett, C.1
-
3
-
-
0026626314
-
Experimental quantum cryptography
-
Bennett, C. H., Bessette, F., Brassard, G., Savail, L.: Experimental quantum cryptography. J. Crypt. 5, 3-28 (1992)
-
(1992)
J. Crypt.
, vol.5
, pp. 3-28
-
-
Bennett, C.H.1
Bessette, F.2
Brassard, G.3
Savail, L.4
-
4
-
-
0003259517
-
Quantum cryptography: Public-key distribution and coin tossing
-
Bangalore, India, New York: IEEE
-
Bennett, C. H., Brassard, G.: Quantum cryptography: Public-key distribution and coin tossing. In: Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, India, pp. 175-179. New York: IEEE 1984
-
(1984)
Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing
, pp. 175-179
-
-
Bennett, C.H.1
Brassard, G.2
-
5
-
-
0029405656
-
Generalized privacy amplification
-
Bennett, C. H., Brassard, G., Crépeau, C., Maurer, U. M.: Generalized privacy amplification. IEEE Trans. Inf. Theo. 41, 1915-1923 (1995)
-
(1995)
IEEE Trans. Inf. Theo.
, vol.41
, pp. 1915-1923
-
-
Bennett, C.H.1
Brassard, G.2
Crépeau, C.3
Maurer, U.M.4
-
7
-
-
0003432201
-
-
quant-ph/9801022
-
Biham, E., Boyer, M., Brassard, G., van de Graaf, J., Mor, T.: Security of quantum key distribution against all collective attacks, quant-ph/9801022 1998
-
(1998)
Security of Quantum Key Distribution Against All Collective Attacks
-
-
Biham, E.1
Boyer, M.2
Brassard, G.3
Van De Graaf, J.4
Mor, T.5
-
8
-
-
85027496257
-
Secret-key reconciliation by public discussion
-
Norway, 1993, Berlin: Springer
-
Brassard, G., Salvail, L.: Secret-key reconciliation by public discussion. In: Proceedings of Eurocrypt '93, held in Lofthus, Norway, 1993, pp 410-423. Berlin: Springer 1994
-
(1994)
Proceedings of Eurocrypt '93, Held in Lofthus
, pp. 410-423
-
-
Brassard, G.1
Salvail, L.2
-
9
-
-
2442492740
-
Quantum repeaters: The role of imperfect local operations in quantum communication
-
Briegel, H. J., Dür, W., Cirac, J. I., Zoller, P.: Quantum Repeaters: The Role of Imperfect Local Operations in Quantum Communication. Phys. Rev. Lett. 81, 5932-5935 (1998)
-
(1998)
Phys. Rev. Lett.
, vol.81
, pp. 5932-5935
-
-
Briegel, H.J.1
Dür, W.2
Cirac, J.I.3
Zoller, P.4
-
10
-
-
11544350211
-
Optimal eavesdropping in quantum cryptography with six states
-
Bruß, D.: Optimal eavesdropping in quantum cryptography with six states. Phys. Rev. Lett. 81, 3018-3021 (1998)
-
(1998)
Phys. Rev. Lett.
, vol.81
, pp. 3018-3021
-
-
Bruß, D.1
-
11
-
-
0000054462
-
Free-space quantum-key distribution
-
Buttler, W. T., Hughes, R. J., Kwiat, P. G., Luther, G. G., Morgan, G. L., Nordholt, J. E., Peterson, C. G., Simmons, C. M.: Free-space quantum-key distribution. Phys. Rev. A 57, 2379-2382 (1998)
-
(1998)
Phys. Rev. A
, vol.57
, pp. 2379-2382
-
-
Buttler, W.T.1
Hughes, R.J.2
Kwiat, P.G.3
Luther, G.G.4
Morgan, G.L.5
Nordholt, J.E.6
Peterson, C.G.7
Simmons, C.M.8
-
12
-
-
0041633351
-
Coherent eavesdropping strategies for the 4-state quantum cryptography protocol
-
Cirac, I., Gisin, N.: Coherent eavesdropping strategies for the 4-state quantum cryptography protocol. Phys. Lett. A 229, 1-7 (1997)
-
(1997)
Phys. Lett. A
, vol.229
, pp. 1-7
-
-
Cirac, I.1
Gisin, N.2
-
13
-
-
6144265213
-
Quantum privacy amplification and the security of quantum cryptography over noisy channels
-
Deutsch, D., Ekert, A., Josza, R., Macchiavello, C., Popescu, S., Sanpera, A.: Quantum privacy amplification and the security of quantum cryptography over noisy channels. Phys. Rev. Lett. 77, 2818-2821 (1996)
-
(1996)
Phys. Rev. Lett.
, vol.77
, pp. 2818-2821
-
-
Deutsch, D.1
Ekert, A.2
Josza, R.3
Macchiavello, C.4
Popescu, S.5
Sanpera, A.6
-
14
-
-
0017018484
-
-
Diffie, W., Hellman, M.: IEEE Trans. Inf. Theory IT-22, 644 (1977); Rivest, R., Shamir, A., Adleman, L.: "On Digital Signatures and Public-Key Cryptosystems", MIT Lab. for Comp. Science, Technical report, MIT/LCS/TR-212 (Jan. 1979)
-
(1977)
IEEE Trans. Inf. Theory
, vol.IT-22
, pp. 644
-
-
Diffie, W.1
Hellman, M.2
-
15
-
-
0004196798
-
On digital signatures and public-key cryptosystems
-
Technical report, MIT/LCS/TR-212 (Jan.)
-
Diffie, W., Hellman, M.: IEEE Trans. Inf. Theory IT-22, 644 (1977); Rivest, R., Shamir, A., Adleman, L.: "On Digital Signatures and Public-Key Cryptosystems", MIT Lab. for Comp. Science, Technical report, MIT/LCS/TR-212 (Jan. 1979)
-
(1979)
MIT Lab. for Comp. Science
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
16
-
-
0343152990
-
Quantum cryptography based on Bell's theorem
-
Ekert, A.: Quantum cryptography based on Bell's theorem. Phys. Rev. Lett. 67, 661-663 (1991)
-
(1991)
Phys. Rev. Lett.
, vol.67
, pp. 661-663
-
-
Ekert, A.1
-
17
-
-
0000515658
-
Eavesdropping on quantum-crypto-graphical systems
-
Ekert, A. K., Huttner, B., Palma, G. M. N., Peres, A.: Eavesdropping on quantum-crypto-graphical systems. Phys. Rev. A 50, 1047-1056 (1994)
-
(1994)
Phys. Rev. A
, vol.50
, pp. 1047-1056
-
-
Ekert, A.K.1
Huttner, B.2
Palma, G.M.N.3
Peres, A.4
-
18
-
-
5344222062
-
Optimal eavesdropping in quantum cryptography I
-
Fuchs, C. A., Gisin, N., Griffiths, R. B., Niu, C.-S., Peres, A.: Optimal Eavesdropping in Quantum Cryptography I. Phys. Rev. A 56, 1163-1176 (1997)
-
(1997)
Phys. Rev. A
, vol.56
, pp. 1163-1176
-
-
Fuchs, C.A.1
Gisin, N.2
Griffiths, R.B.3
Niu, C.-S.4
Peres, A.5
-
19
-
-
0001328001
-
Quantum state disturbance vs. information gain: Uncertainty relations for quantum information
-
Fuchs, C. A., Peres, A.: Quantum State Disturbance vs. Information Gain: Uncertainty Relations for Quantum Information. Phys. Rev. A 53, 2038-2045 (1996)
-
(1996)
Phys. Rev. A
, vol.53
, pp. 2038-2045
-
-
Fuchs, C.A.1
Peres, A.2
-
20
-
-
0000004338
-
Quantum cryptography based on orthogonal states
-
Goldenberg, L., Vaidman, L.: Quantum Cryptography based on Orthogonal States. Phys. Rev. Lett. 75, 1239-1243 (1995) Peres, A.: Quantum Cryptography with Orthogonal States? Phys. Rev. Lett. 77, 3264 (1996)
-
(1995)
Phys. Rev. Lett.
, vol.75
, pp. 1239-1243
-
-
Goldenberg, L.1
Vaidman, L.2
-
21
-
-
0000568953
-
Quantum cryptography with orthogonal states?
-
Goldenberg, L., Vaidman, L.: Quantum Cryptography based on Orthogonal States. Phys. Rev. Lett. 75, 1239-1243 (1995) Peres, A.: Quantum Cryptography with Orthogonal States? Phys. Rev. Lett. 77, 3264 (1996)
-
(1996)
Phys. Rev. Lett.
, vol.77
, pp. 3264
-
-
Peres, A.1
-
22
-
-
24444470425
-
Reply to comment: Quantum cryptography based on orthogonal states
-
Goldenberg, L., Vaidman, L.: Reply to Comment: Quantum Cryptography based on Orthogonal States. Phys. Rev. Lett. 77, 3265 (1996)
-
(1996)
Phys. Rev. Lett.
, vol.77
, pp. 3265
-
-
Goldenberg, L.1
Vaidman, L.2
-
24
-
-
84907612820
-
Information gain in quantum eavesdropping
-
Huttner, B., Ekert, A. K.: Information gain in quantum eavesdropping. J. Mod. Opt. 41, 2455-2466 (1994)
-
(1994)
J. Mod. Opt.
, vol.41
, pp. 2455-2466
-
-
Huttner, B.1
Ekert, A.K.2
-
25
-
-
0000600063
-
Quantum cryptography with coherent states
-
Huttner, B., Imoto, N., Gisin, N., Mor, T.: Quantum Cryptography with Coherent States. Phys. Rev. A 51, 1863-1869 (1995)
-
(1995)
Phys. Rev. A
, vol.51
, pp. 1863-1869
-
-
Huttner, B.1
Imoto, N.2
Gisin, N.3
Mor, T.4
-
26
-
-
0001532069
-
Quantum cryptography based on split transmission of one-bit information in two steps
-
Koashi, M., Imoto, N.: Quantum Cryptography Based on Split Transmission of One-Bit Information in Two Steps. Phys. Rev. Lett. 79, 2383-2386 (1997)
-
(1997)
Phys. Rev. Lett.
, vol.79
, pp. 2383-2386
-
-
Koashi, M.1
Imoto, N.2
-
28
-
-
0002136892
-
Security against eavesdropping in quantum cryptography
-
Lütkenhaus, N.: Security against eavesdropping in quantum cryptography. Phys. Rev. A 54, 97-111 (1996)
-
(1996)
Phys. Rev. A
, vol.54
, pp. 97-111
-
-
Lütkenhaus, N.1
-
29
-
-
0001619342
-
Estimates for practical quantum cryptography
-
Lütkenhaus, N.: Estimates for practical quantum cryptography. Phys. Rev. A 59, 3301-3319 (1999)
-
(1999)
Phys. Rev. A
, vol.59
, pp. 3301-3319
-
-
Lütkenhaus, N.1
-
30
-
-
0040163388
-
Security of quantum cryptography with realistic sources
-
Lütkenhaus, N.: Security of quantum cryptography with realistic sources. Acta Physica Slovaca 49, 549-556 (1999)
-
(1999)
Acta Physica Slovaca
, vol.49
, pp. 549-556
-
-
Lütkenhaus, N.1
-
31
-
-
0029357908
-
Quantum key distribution over distances as long as 30 km
-
Maraud, C., Townsend, P. T.: Quantum key distribution over distances as long as 30 km. Opt. Lett. 20, 1695-1697 (1995)
-
(1995)
Opt. Lett.
, vol.20
, pp. 1695-1697
-
-
Maraud, C.1
Townsend, P.T.2
-
34
-
-
0001155383
-
Quantum random-number generation and key sharing
-
Rarity, J. G., Owens, P. C. M., Tapster, P. R.: Quantum random-number generation and key sharing. J. Mod. Opt. 41, 2435-2444 (1994)
-
(1994)
J. Mod. Opt.
, vol.41
, pp. 2435-2444
-
-
Rarity, J.G.1
Owens, P.C.M.2
Tapster, P.R.3
-
35
-
-
0000005686
-
Security of quantum cryptography against individual attacks
-
Slutsky, B., Rao, R., Sun, P. C., Fainman, Y.: Security of quantum cryptography against individual attacks. Phys. Rev. A 57, 2383-2398 (1998)
-
(1998)
Phys. Rev. A
, vol.57
, pp. 2383-2398
-
-
Slutsky, B.1
Rao, R.2
Sun, P.C.3
Fainman, Y.4
-
36
-
-
33746708860
-
A single quantum cannot be cloned
-
Wootters, W. K., Zurek, W. H.: A single quantum cannot be cloned. Nature 299, 802-803 (1982)
-
(1982)
Nature
, vol.299
, pp. 802-803
-
-
Wootters, W.K.1
Zurek, W.H.2
-
37
-
-
0000239632
-
Practical aspects of quantum cryptographic key distribution
-
Zbinden, H., Gisin, N., Huttner, B., Muller, A., Tittel, W.: Practical aspects of quantum cryptographic key distribution. (To appear in: Journal of Cryptology)
-
Journal of Cryptology
-
-
Zbinden, H.1
Gisin, N.2
Huttner, B.3
Muller, A.4
Tittel, W.5
|