-
1
-
-
0036013605
-
-
N. Gisin, G. Ribordy, W. Tittel, H. Zbinden, Rev. Mod. Phys. 74, 145 (2002)
-
(2002)
Rev. Mod. Phys.
, vol.74
, pp. 145
-
-
Gisin1
-
2
-
-
38349172638
-
-
edited by E. Wolf (Elsevier) Chap. 5
-
M. Dušek, N. Lütkenhaus, M. Hendrych, in Quantum Cryptography, Progress in Optics, edited by E. Wolf (Elsevier, 2006), Vol. 49, Chap. 5
-
(2006)
Quantum Cryptography, Progress in Optics
, vol.49
-
-
Dušek, M.1
Lütkenhaus, N.2
Hendrych, M.3
-
3
-
-
38349129346
-
-
in preparation
-
V. Scarani, H. Bechmann-Pasquinucci, N.J. Cerf, M. Dušek, N. Lütkenhaus, M. Peev, A framework for practical quantum cryptography, in preparation
-
A framework for practical quantum cryptography
-
-
Scarani, V.1
Bechmann-Pasquinucci, H.2
Cerf, N.J.3
Dušek M.Lütkenhaus N.Peev, M.4
-
4
-
-
0003259517
-
-
Bangalore, India
-
C.H. Bennett, G. Brassard, in Proc. of IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, India, pp. 175-179 (1984)
-
(1984)
Proc. of IEEE International Conference on Computers, Systems, and Signal Processing
, pp. 175-179
-
-
Bennett, C.H.1
Brassard, G.2
-
6
-
-
11944263767
-
-
C.H. Bennett, G. Brassard, D.N. Mermin, Phys. Rev. Lett. 68, 557 (1992)
-
(1992)
Phys. Rev. Lett.
, vol.68
, pp. 557
-
-
Bennett1
-
8
-
-
0029405656
-
-
C.H. Bennett, G. Brassard, C. Crépeau, U.M. Maurer, IEEE Trans. Inf. Theory 41, 1915 (1995)
-
(1995)
IEEE Trans. Inf. Theory
, vol.41
, pp. 1915
-
-
Bennett1
-
9
-
-
33846980802
-
-
H. Inamori, N. Lütkenhaus, D. Mayers, Eur. Phys. J. D 41, 599 (2007)
-
(2007)
Eur. Phys. J. D
, vol.41
, pp. 599
-
-
Inamori1
-
11
-
-
34247501418
-
-
T. Kim, I.S. genannt Wersborg, F.N.C. Wong, J.H. Shapiro, Phys. Rev. A 75, 042327 (2007)
-
(2007)
Phys. Rev. A
, vol.75
, pp. 042327
-
-
Kim1
-
12
-
-
33144490430
-
-
J.H. Shapiro, F.N.C. Wong, Phys. Rev. A 73, 012315 (2006)
-
(2006)
Phys. Rev. A
, vol.73
, pp. 012315
-
-
Shapiro1
-
13
-
-
0000005686
-
-
B.A. Slutsky, R. Rao, P.-C. Sun, Y. Fainman, Phys. Rev. A 57, 2383 (1998)
-
(1998)
Phys. Rev. A
, vol.57
, pp. 2383
-
-
Slutsky1
-
14
-
-
26944496484
-
-
H.E. Brandt, Phys. Rev. A 71, 042312 (2005)
-
(2005)
Phys. Rev. A
, vol.71
, pp. 042312
-
-
Brandt1
-
17
-
-
0001328001
-
-
C.A. Fuchs, A. Peres, Phys. Rev. A 53, 2038 (1996)
-
(1996)
Phys. Rev. A
, vol.53
, pp. 2038
-
-
Fuchs1
-
18
-
-
5344222062
-
-
C.A. Fuchs, N. Gisin, R.B. Griffiths, C.-S. Niu, A. Peres, Phys. Rev. A 56, 1163 (1997)
-
(1997)
Phys. Rev. A
, vol.56
, pp. 1163
-
-
Fuchs1
-
20
-
-
0036577478
-
-
E. Waks, A. Zeevi, Y. Yamamoto, Phys. Rev. A 65, 052310 (2002)
-
(2002)
Phys. Rev. A
, vol.65
, pp. 052310
-
-
Waks1
-
22
-
-
0000022642
-
-
M.A. Neumark, Izv. Akad. Nauk. SSSR, Ser. Mat. 4, 277 (1940)
-
(1940)
Ser. Mat.
, vol.4
, pp. 277
-
-
Neumark1
-
24
-
-
0003777488
-
-
Butterworth Heinemann, Oxford
-
L.D. Landau, E.M. Lifshitz, Quantum Mechanics. Non-relativistic Theory, Course of Theoretical Physics, 3rd edn. (Butterworth Heinemann, Oxford, 1981), Vol. 3
-
(1981)
Quantum Mechanics. Non-relativistic Theory, Course of Theoretical Physics, 3rd Edn.
, vol.3
-
-
Landau, L.D.1
Lifshitz, E.M.2
-
29
-
-
0002612922
-
-
edited by V.P. Belavkin, O. Hirota, R.L. Hudson (Plenum, New York) Proceedings of QCM94
-
L.B. Levitin, in Quantum Communication and Measurement, edited by V.P. Belavkin, O. Hirota, R.L. Hudson (Plenum, New York, 1995) pp. 439-448. Proceedings of QCM94
-
(1995)
Quantum Communication and Measurement
, pp. 439-448
-
-
Levitin, L.B.1
-
30
-
-
0001777508
-
-
C. Cachin, U.M. Maurer, J. Cryptol. 10, 97 (1997)
-
(1997)
J. Cryptol.
, vol.10
, pp. 97
-
-
Cachin1
-
31
-
-
51349163744
-
-
R. Jozsa, J. Mod. Opt. 41, 2315 (1994)
-
(1994)
J. Mod. Opt.
, vol.41
, pp. 2315
-
-
Jozsa1
-
32
-
-
5544314772
-
-
C.A. Fuchs, C.M. Caves, Phys. Rev. Lett. 73, 3047 (1994)
-
(1994)
Phys. Rev. Lett.
, vol.73
, pp. 3047
-
-
Fuchs1
-
33
-
-
38349088580
-
Quantum cryptography is hacked
-
april Online feature whose summary reads: "Simulation proves it's possible to eavesdrop on super-secure encrypted messages"
-
G. Brumfiel, Quantum cryptography is hacked, News @ Nature (april 2007). Online feature whose summary reads: "Simulation proves it's possible to eavesdrop on super-secure encrypted messages"
-
(2007)
News @ Nature
-
-
Brumfiel, G.1
-
34
-
-
34249287055
-
-
G. Brumfiel, Nature 447, 372 (2007). The editor's summary starts with: "Quantum cryptography is 100% hack-proof. Or at least it was, until the hackers got cracking. Recent simulations suggest that it is only a matter of time before a quantum-mechanical method of eavesdropping on super-secure encrypted messages is developed."
-
(2007)
Nature
, vol.447
, pp. 372
-
-
Brumfiel1
|