-
1
-
-
26844463408
-
Information-theoretic limits to quantum cryptography
-
Barnett, S. M. & Phoenix, S. J. D. 1993a Information-theoretic limits to quantum cryptography. Phys. Rev. A 48, R5-R8.
-
(1993)
Phys. Rev. A
, vol.48
-
-
Barnett, S.M.1
Phoenix, S.J.D.2
-
2
-
-
18344363762
-
Bell's inequality and rejected-data protocols for quantum cryptography
-
Barnett, S. M. & Phoenix, S. J. D. 1993b Bell's inequality and rejected-data protocols for quantum cryptography. J. Mod. Opt. 40, 1443-1448.
-
(1993)
J. Mod. Opt.
, vol.40
, pp. 1443-1448
-
-
Barnett, S.M.1
Phoenix, S.J.D.2
-
3
-
-
0001129006
-
Eavesdropping strategies and rejected-data protocols in quantum cryptography
-
Barnett, S. M., Huttner, B. & Phoenix, S. J. D. 1993 Eavesdropping strategies and rejected-data protocols in quantum cryptography. J. Mod. Opt. 40, 2501-2513.
-
(1993)
J. Mod. Opt.
, vol.40
, pp. 2501-2513
-
-
Barnett, S.M.1
Huttner, B.2
Phoenix, S.J.D.3
-
6
-
-
11944254075
-
Quantum cryptography using any two non-orthogonal states
-
Bennett, C. H. 1992 Quantum cryptography using any two non-orthogonal states. Phys. Rev., Lett. 68, 3121-3124.
-
(1992)
Phys. Rev., Lett.
, vol.68
, pp. 3121-3124
-
-
Bennett, C.H.1
-
7
-
-
0020936237
-
Quantum cryptography, or unforgetable subway tokens
-
New York: Plenum
-
Bennett, C. H., Brassard, G., Breidbart, S. & Wiesner, S. 1983 Quantum cryptography, or unforgetable subway tokens. In Advances in Cryptology: Proc. Crypto 82, pp. 267-275. New York: Plenum.
-
(1983)
Advances in Cryptology: Proc. Crypto
, vol.82
, pp. 267-275
-
-
Bennett, C.H.1
Brassard, G.2
Breidbart, S.3
Wiesner, S.4
-
9
-
-
11944263767
-
Quantum cryptography without Bell's theorem
-
Bennett, C. H., Brassard, G. & Mermin, N. D. 19926 Quantum cryptography without Bell's theorem. Phys. Rev. Lett. 68, 557-559.
-
(1992)
Phys. Rev. Lett.
, vol.68
, pp. 557-559
-
-
Bennett, C.H.1
Brassard, G.2
Mermin, N.D.3
-
10
-
-
0023985539
-
Privacy amplification by public discussion
-
Bennett, C. H., Brassard, G. & Robert, J.-M. 1988 Privacy amplification by public discussion. SIAM Jl Comput. 17, 210-229.
-
(1988)
SIAM Jl Comput.
, vol.17
, pp. 210-229
-
-
Bennett, C.H.1
Brassard, G.2
Robert, J.-M.3
-
11
-
-
0026626314
-
Experimental quantum cryptography
-
Bennett, C. H., Bessette, F., Brassard, G., Salvail, L. & Smolin, J. 1992 Experimental quantum cryptography. J. Cryptol. 5, 3-28.
-
(1992)
J. Cryptol.
, vol.5
, pp. 3-28
-
-
Bennett, C.H.1
Bessette, F.2
Brassard, G.3
Salvail, L.4
Smolin, J.5
-
12
-
-
0001781833
-
On a fundamental theorem of quantum cryptography
-
Blow, K. J. & Phoenix, S. J. D. 1993 On a fundamental theorem of quantum cryptography. J. Mod. Opt. 40, 33-36.
-
(1993)
J. Mod. Opt.
, vol.40
, pp. 33-36
-
-
Blow, K.J.1
Phoenix, S.J.D.2
-
15
-
-
3042862001
-
The Adventure of the Dancing Men
-
Reprinted 1989 The original illustrated Sherlock Holmes Secaucus: Castle
-
Conan Doyle, A. 1903 The Adventure of the Dancing Men. The Strand Magazine 26, no. 156. (Reprinted 1989 The original illustrated Sherlock Holmes Secaucus: Castle.)
-
(1903)
The Strand Magazine
, vol.26
, Issue.156
-
-
Conan Doyle, A.1
-
17
-
-
0002496370
-
Quantum computational networks
-
Deutsch, D. 1989 Quantum computational networks. Proc. R. Soc. Lond. A 425, 73-90.
-
(1989)
Proc. R. Soc. Lond. A
, vol.425
, pp. 73-90
-
-
Deutsch, D.1
-
19
-
-
0343152990
-
Quantum cryptography based on Bell's theorem
-
Ekert, A. K. 1992 Quantum cryptography based on Bell's theorem. Phys. Rev. Lett. 67, 661-663.
-
(1992)
Phys. Rev. Lett.
, vol.67
, pp. 661-663
-
-
Ekert, A.K.1
-
20
-
-
0028442191
-
Quantum cryptography using optical fibres
-
Franson, J. D. & Ilves, H. 1994a Quantum cryptography using optical fibres. Appl. Opt. 33, 2949-2954.
-
(1994)
Appl. Opt.
, vol.33
, pp. 2949-2954
-
-
Franson, J.D.1
Ilves, H.2
-
21
-
-
0005246354
-
Quantum cryptography using polarisation feedback
-
Franson, J. D. & lives, H. 1994a Quantum cryptography using polarisation feedback. J. Mod. Opt. 41, 2391-2396.
-
(1994)
J. Mod. Opt.
, vol.41
, pp. 2391-2396
-
-
Franson, J.D.1
Lives, H.2
-
22
-
-
84948615972
-
Quantum cryptography
-
Hughes, R. J., Alde, D. M., Dyer, P., Luther, G. G., Morgan, G. L. & Schauer, M. 1995 Quantum cryptography. Contemp. Phys. 36, 149-163.
-
(1995)
Contemp. Phys.
, vol.36
, pp. 149-163
-
-
Hughes, R.J.1
Alde, D.M.2
Dyer, P.3
Luther, G.G.4
Morgan, G.L.5
Schauer, M.6
-
23
-
-
84907612820
-
Information gain in quantum eavesdroping
-
Huttner, B. & Ekert, A. K. 1994 Information gain in quantum eavesdroping. J. Mod. Opt. 41, 2455-2466.
-
(1994)
J. Mod. Opt.
, vol.41
, pp. 2455-2466
-
-
Huttner, B.1
Ekert, A.K.2
-
24
-
-
84956073647
-
Experimental demonstration of quantum cryptography using polarised photons in optical fibre over more than 1 km
-
Muller, A., Breguet, J. & Gisin, N. 1993 Experimental demonstration of quantum cryptography using polarised photons in optical fibre over more than 1 km. Europhys. Lett. 23, 383-388.
-
(1993)
Europhys. Lett.
, vol.23
, pp. 383-388
-
-
Muller, A.1
Breguet, J.2
Gisin, N.3
-
25
-
-
0041445423
-
Quantum cryptography without conjugate coding
-
Phoenix, S. J. D. 1993 Quantum cryptography without conjugate coding. Phys. Rev. A 28, 96-102.
-
(1993)
Phys. Rev. A
, vol.28
, pp. 96-102
-
-
Phoenix, S.J.D.1
-
26
-
-
0027575240
-
Quantum cryptography and secure optical communications
-
Phoenix, S. J. D. & Townsend, P. D. 1993 Quantum cryptography and secure optical communications. BT Tech. Jl 11, 65-75.
-
(1993)
BT Tech. Jl
, vol.11
, pp. 65-75
-
-
Phoenix, S.J.D.1
Townsend, P.D.2
-
27
-
-
0010204410
-
Quantum cryptography - How to beat the codebreakers using quantum mechanics
-
Phoenix, S. J. D. & Townsend, P. D. 1995 Quantum cryptography - how to beat the codebreakers using quantum mechanics. Contemp. Phys. 36, 165-195.
-
(1995)
Contemp. Phys.
, vol.36
, pp. 165-195
-
-
Phoenix, S.J.D.1
Townsend, P.D.2
-
28
-
-
84890522850
-
Communication theory of secrecy systems
-
Shannon, C. E. 1949 Communication theory of secrecy systems. Bell System Tech. Jl 28, 656-715.
-
(1949)
Bell System Tech. Jl
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
29
-
-
0028428439
-
Secure key distribution based on quantum cryptography
-
Townsend, P. D. 1994 Secure key distribution based on quantum cryptography. Electron. Lett. 30, 809-810.
-
(1994)
Electron. Lett.
, vol.30
, pp. 809-810
-
-
Townsend, P.D.1
-
30
-
-
0027580767
-
Single-photon interference in a 10 km long optical fibre interferometer
-
Townsend, P. D., Rarity, J. G. & Tapster, P. R. 1993a Single-photon interference in a 10 km long optical fibre interferometer. Electron. Lett. 29, 634-635.
-
(1993)
Electron. Lett.
, vol.29
, pp. 634-635
-
-
Townsend, P.D.1
Rarity, J.G.2
Tapster, P.R.3
-
31
-
-
0027912088
-
Enhanced single-photon fringe visibility in a 10 km long quantum cryptography channel
-
Townsend, P. D., Rarity, J. G. & Tapster, P. R. 19936 Enhanced single-photon fringe visibility in a 10 km long quantum cryptography channel. Electron. Lett. 29, 1292-1293.
-
(1993)
Electron. Lett.
, vol.29
, pp. 1292-1293
-
-
Townsend, P.D.1
Rarity, J.G.2
Tapster, P.R.3
-
32
-
-
0003445161
-
A quantum key distribution channel based on optical fibre
-
Townsend, P. D. & Thompson, I. 1994 A quantum key distribution channel based on optical fibre. J. Mod. Opt. 41, 2425-2434.
-
(1994)
J. Mod. Opt.
, vol.41
, pp. 2425-2434
-
-
Townsend, P.D.1
Thompson, I.2
-
33
-
-
0000478763
-
Cipher printing telegraph systems for secret wire and radio telegraphic communications
-
Vernam, G. S. 1926 Cipher printing telegraph systems for secret wire and radio telegraphic communications. J. Am. Inst. Elect. Engrs 45, 109-115.
-
(1926)
J. Am. Inst. Elect. Engrs
, vol.45
, pp. 109-115
-
-
Vernam, G.S.1
-
34
-
-
0001998264
-
Conjugate coding
-
The original manuscript was written ca. 1970
-
Wiesner, S. 1983 Conjugate coding. Sigact News 15, 78-88. (The original manuscript was written ca. 1970.)
-
(1983)
Sigact News
, vol.15
, pp. 78-88
-
-
Wiesner, S.1
-
35
-
-
33746708860
-
A single quantum cannot be cloned
-
Wootters, W. K. & Zurek, W. H. 1982 A single quantum cannot be cloned. Nature 299, 802-803.
-
(1982)
Nature
, vol.299
, pp. 802-803
-
-
Wootters, W.K.1
Zurek, W.H.2
|