-
1
-
-
0013237387
-
Inconditional Security for Practical Quantum Key Distribution
-
arXiv:quant-ph/0107017
-
H. Inamori, N. Lütkenhaus, D. Mayers, Inconditional Security for Practical Quantum Key Distribution, arXiv:quant-ph/0107017 (2001)
-
(2001)
-
-
Inamori, H.1
Lütkenhaus, N.2
Mayers, D.3
-
2
-
-
84955621476
-
Quantum key distribution and string oblivious transfer in noisy channels, In Advances in Cryptology
-
arXiv:quant-ph/9606003 Springer, Berlin
-
D. Mayers, Quantum key distribution and string oblivious transfer in noisy channels, In Advances in Cryptology - Proceedings of Crypto '96; available as arXiv:quant-ph/9606003 (Springer, Berlin, 1996), pp. 343-357
-
(1996)
Proceedings of Crypto '96; available as
, pp. 343-357
-
-
Mayers, D.1
-
3
-
-
3042730516
-
-
D. Mayers, Unconditional security in quantum cryptography, J. ACM (2001) (to appear); also available at arXiv:quant-ph/9802025
-
D. Mayers, Unconditional security in quantum cryptography, J. ACM (2001) (to appear); also available at arXiv:quant-ph/9802025
-
-
-
-
4
-
-
0000600063
-
-
B. Huttner, N. Imoto, N. Gisin, T. Mor, Phys. Rev. A 51, 1863 (1995)
-
(1995)
Phys. Rev. A
, vol.51
, pp. 1863
-
-
Huttner, B.1
Imoto, N.2
Gisin, N.3
Mor, T.4
-
6
-
-
0343536431
-
-
G. Brassard, N. Lütkenhaus, T. Mor, B. Sanders, Phys. Rev. Lett. 85, 1330 (2000)
-
(2000)
Phys. Rev. Lett
, vol.85
, pp. 1330
-
-
Brassard, G.1
Lütkenhaus, N.2
Mor, T.3
Sanders, B.4
-
8
-
-
0004201880
-
A proof of the security of quantum key distribution
-
arXiv:quant-ph/9912053
-
E. Biham, M. Boyer, P.O. Boykin, T. Mor, V. Roychowdhury, A proof of the security of quantum key distribution, arXiv:quant-ph/9912053 (1999)
-
(1999)
-
-
Biham, E.1
Boyer, M.2
Boykin, P.O.3
Mor, T.4
Roychowdhury, V.5
-
11
-
-
5344222062
-
-
Fuchs, N. Gisin, R. Griffiths, C.-S. Niu, A. Peres, Phys. Rev. A 56, 1163 (1997);
-
(1997)
Phys. Rev. A
, vol.56
, pp. 1163
-
-
Fuchs1
Gisin, N.2
Griffiths, R.3
Niu, C.-S.4
Peres, A.5
-
12
-
-
0000005686
-
-
B. Slutsky, R. Rao, P. Sun, Y. Fainman, Phys. Rev. A 57, 2383 (1998);
-
(1998)
Phys. Rev. A
, vol.57
, pp. 2383
-
-
Slutsky, B.1
Rao, R.2
Sun, P.3
Fainman, Y.4
-
17
-
-
33846954536
-
J. van de Graaf, T. Mor
-
arXiv:quant-ph/9801022
-
E. Biham, M. Boyer, G. Brassard, J. van de Graaf, T. Mor, arXiv:quant-ph/9801022 (1998)
-
(1998)
-
-
Biham, E.1
Boyer, M.2
Brassard, G.3
-
19
-
-
33847006715
-
-
D. Mayers, A. Yao, arXiv:quant-ph/9809039 (1998);
-
D. Mayers, A. Yao, arXiv:quant-ph/9809039 (1998);
-
-
-
-
20
-
-
33846956914
-
Violation of Locality and Self-Checking Source
-
to appear in:, held in Capri, Kluwer Academic/Plenum Publishers
-
Mayers, C. Tourenne, "Violation of Locality and Self-Checking Source", to appear in: Proceedings of Quantum Communication, Computing, and Measurement 3, held in Capri 2000 (Kluwer Academic/Plenum Publishers)
-
(2000)
Proceedings of Quantum Communication, Computing, and Measurement 3
-
-
Mayers, C.T.1
-
21
-
-
33846980926
-
-
C. Shannon, Bell Syst. Technical Jour. 28, 657 (1949)
-
C. Shannon, Bell Syst. Technical Jour. 28, 657 (1949)
-
-
-
-
24
-
-
0003259517
-
-
Bangalore, India, December
-
C.H. Bennett, G. Brassard, Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, December 1984, pp. 175-179
-
(1984)
Proceedings of IEEE International Conference on Computers, Systems and Signal Processing
, pp. 175-179
-
-
Bennett, C.H.1
Brassard, G.2
-
25
-
-
0026626314
-
-
C.H. Bennett, F. Bessette, G. Brassard, L. Salvail, J. Smolin. J. Cryptology 5, 3 (1992)
-
(1992)
J. Cryptology
, vol.5
, pp. 3
-
-
Bennett, C.H.1
Bessette, F.2
Brassard, G.3
Salvail, L.4
Smolin, J.5
-
27
-
-
0000418120
-
-
M. Bourennane, F. Gibson, A. Karlsson, A. Hening, P. Jonsson, T. Tsegaye, D. Ljunggren, E. Sundberg, Opt. Expr. 4, 383 (1999)
-
(1999)
Opt. Expr
, vol.4
, pp. 383
-
-
Bourennane, M.1
Gibson, F.2
Karlsson, A.3
Hening, A.4
Jonsson, P.5
Tsegaye, T.6
Ljunggren, D.7
Sundberg, E.8
|