-
1
-
-
0036013605
-
Quantum cryptography
-
N. Gisin, G. Ribordy, W. Tittel and H. Zbinden, "Quantum cryptography," Rev. Mod. Phys. 74, 145-195 (2002).
-
(2002)
Rev. Mod. Phys
, vol.74
, pp. 145-195
-
-
Gisin, N.1
Ribordy, G.2
Tittel, W.3
Zbinden, H.4
-
2
-
-
0003259517
-
Quantum cryptography: Public key distribution and coin tossing
-
IEEE, New York
-
C. H. Bennett and G. Brassard, "Quantum cryptography: public key distribution and coin tossing," in Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing, (IEEE, New York, 1984), pp. 175179.
-
(1984)
Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing
, pp. 175179
-
-
Bennett, C.H.1
Brassard, G.2
-
3
-
-
0026626314
-
Experimental quantum cryptography
-
C. H. Bennett, F. Bessette, G. Brassard, L. Smolin and J. Smolin, "Experimental quantum cryptography," J. Cryptol. 53-28 (1992).
-
(1992)
J. Cryptol
, vol.53 -28
-
-
Bennett, C.H.1
Bessette, F.2
Brassard, G.3
Smolin, L.4
Smolin, J.5
-
4
-
-
0011769922
-
Quantum key distribution over 67km with a plug & play system
-
D. Stucki, N. Gisin, O. Guinnard, G. Ribordy and H. Zbinden, "Quantum key distribution over 67km with a plug & play system," New J. Phys. 4 41.1-41.8 (2002).
-
(2002)
New J. Phys
, vol.4
-
-
Stucki, D.1
Gisin, N.2
Guinnard, O.3
Ribordy, G.4
Zbinden, H.5
-
5
-
-
2942611260
-
Quantum key distribution over 122km of standard telecom fiber
-
C. Gobby, Z. L. Yuan and A. J. Shields, "Quantum key distribution over 122km of standard telecom fiber," Appl. Phys. Lett. 84, 3762-3764 (2004).
-
(2004)
Appl. Phys. Lett
, vol.84
, pp. 3762-3764
-
-
Gobby, C.1
Yuan, Z.L.2
Shields, A.J.3
-
6
-
-
27744568650
-
Beating the photon pulse-number-splitting attack in practical quantum cryptography
-
Phys. Rev. Lett, 230503-1-4
-
X.-B. Wang, "Beating the photon pulse-number-splitting attack in practical quantum cryptography," Phys. Rev. Lett. 94, 230503-1-4 (2005)
-
(2005)
, vol.94
-
-
Wang, X.-B.1
-
7
-
-
27744479495
-
Decoy state quantum key distribution
-
Phys. Rev. Lett, 230504-1-4
-
and H.-K. Lo, X. Ma and K. Chen, "Decoy state quantum key distribution," Phys. Rev. Lett. 94, 230504-1-4 (2005).
-
(2005)
, vol.94
-
-
Lo, H.-K.1
Ma, X.2
Chen, K.3
-
8
-
-
0343536431
-
Limits on practical quantum cryptography
-
G. Brassard, N. Lütkenhaus, T. Mor and B. C. Sanders, "Limits on practical quantum cryptography," Phys. Rev. Lett. 85, 1330-1333 (2000).
-
(2000)
Phys. Rev. Lett
, vol.85
, pp. 1330-1333
-
-
Brassard, G.1
Lütkenhaus, N.2
Mor, T.3
Sanders, B.C.4
-
9
-
-
0041415963
-
Quantum key distribution with high loss: Toward global secure communication
-
Phys. Rev. Lett, 057901-1-4
-
W.-Y. Hwang, "Quantum key distribution with high loss: toward global secure communication," Phys. Rev. Lett. 91, 057901-1-4 (2003).
-
(2003)
, vol.91
-
-
Hwang, W.-Y.1
-
10
-
-
7044249607
-
Security of quantum key distribution with imperfect devices
-
D. Gottesman, H.-K. Lo, N. Lütkenhaus and J. Preskill, "Security of quantum key distribution with imperfect devices," Quant. Inf. Comp. 5, 325-360 (2004).
-
(2004)
Quant. Inf. Comp
, vol.5
, pp. 325-360
-
-
Gottesman, D.1
Lo, H.-K.2
Lütkenhaus, N.3
Preskill, J.4
-
11
-
-
33344454530
-
Experimental quantum key distribution with decoy states
-
Phys. Rev. Lett, 070502-1-4
-
Y. Zhao, B. Qi, X. Ma, H.-K. Lo and L.Qian, "Experimental quantum key distribution with decoy states," Phys. Rev. Lett. 96, 070502-1-4 (2006).
-
(2006)
, vol.96
-
-
Zhao, Y.1
Qi, B.2
Ma, X.3
Lo, H.-K.4
Qian, L.5
-
13
-
-
11144327171
-
Unconditionally secure quantum key distribution over 50 km of standard telecom fiber
-
Electron. Lett
-
C. Gobby, Z. L. Yuan and A. J. Shields, Elec. Lett. "Unconditionally secure quantum key distribution over 50 km of standard telecom fiber," Electron. Lett. 40, 1603-1605 (2004).
-
(2004)
, vol.40
, pp. 1603-1605
-
-
Gobby, C.1
Yuan, Z.L.2
Shields, A.J.3
-
14
-
-
27144453296
-
Practical decoy state for quantum key distribution
-
Phys. Rev. A, 012306-1-15
-
X. Ma, B. Qi, Y. Zhao and H.-K. Lo, "Practical decoy state for quantum key distribution," Phys. Rev. A 72, 012306-1-15 (2005).
-
(2005)
, vol.72
-
-
Ma, X.1
Qi, B.2
Zhao, Y.3
Lo, H.-K.4
-
15
-
-
33846356424
-
-
C.-Z. Peng, J. Zhang, D. Yang, W.-B. Gao, H.-Xin. Ma, H. Yin, H.-P. Zeng, T. Yang, X.-B. Wang and J.-W. Pan, Experimental long-distance decoy-state quantum key distribution based on polarization encoding, Phys. Rev. Lett. 98, 010505-1-4 (2007).
-
C.-Z. Peng, J. Zhang, D. Yang, W.-B. Gao, H.-Xin. Ma, H. Yin, H.-P. Zeng, T. Yang, X.-B. Wang and J.-W. Pan, "Experimental long-distance decoy-state quantum key distribution based on polarization encoding," Phys. Rev. Lett. 98, 010505-1-4 (2007).
-
-
-
-
16
-
-
33846363964
-
Long-distance decoy-State quantum key distribution in optical fiber
-
Phys. Rev. Lett, 010505-1-4
-
D. Rosenberg, J. W. Harrington, P. R. Rice, P. A. Hiskett, C. G. Peterson, R. J. Hughes, A. B. Lita, S-W. Nam and J. E. Nordholt, "Long-distance decoy-State quantum key distribution in optical fiber," Phys. Rev. Lett. 98, 010505-1-4 (2007).
-
(2007)
, vol.98
-
-
Rosenberg, D.1
Harrington, J.W.2
Rice, P.R.3
Hiskett, P.A.4
Peterson, C.G.5
Hughes, R.J.6
Lita, A.B.7
Nam, S.-W.8
Nordholt, J.E.9
-
17
-
-
0032049044
-
Performance of InGaAs/InP avalanche photodiodes as gated-mode photon counters
-
G. Ribordy, J. D. Gautier, H. Zbinden, and N. Gisin, "Performance of InGaAs/InP avalanche photodiodes as gated-mode photon counters," Appl. Opt. 37, 2272 (1998).
-
(1998)
Appl. Opt
, vol.37
, pp. 2272
-
-
Ribordy, G.1
Gautier, J.D.2
Zbinden, H.3
Gisin, N.4
-
18
-
-
34250842798
-
Upper bounds of eavesdropper's performances in finite-length code with decoy method
-
quantph/0702250
-
M. Hayashi, "Upper bounds of eavesdropper's performances in finite-length code with decoy method," quantph/0702250 (2007).
-
(2007)
-
-
Hayashi, M.1
|