메뉴 건너뛰기




Volumn 4, Issue 4, 2004, Pages 273-286

Self testing quantum apparatus

Author keywords

Quantum cryptography; Quantum information; Self testing; Violation of locality

Indexed keywords

QUANTUM COMMUNICATION; QUANTUM CRYPTOGRAPHY; QUANTUM OPTICS; SPECIFICATIONS;

EID: 4043062903     PISSN: 15337146     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (507)

References (18)
  • 1
    • 84955621476 scopus 로고    scopus 로고
    • Quantum key distribution and string oblivious transfer in noisy channel
    • Lecture Notes in Comp. Sci. (Springer-Verlag)
    • D. Mayers, "Quantum key distribution and string oblivious transfer in noisy channel", Advances in Cryptology: Proceedings of Crypto'96, Lecture Notes in Comp. Sci., vol 1109, (Springer-Verlag, 1996), pp. 343-357; D. Mayers, "Unconditional security in quantum cryptography", Los Alamos preprint archive quant-ph/9802025 (1998).
    • (1996) Advances in Cryptology: Proceedings of Crypto'96 , vol.1109 , pp. 343-357
    • Mayers, D.1
  • 2
    • 84955621476 scopus 로고    scopus 로고
    • Los Alamos preprint archive quant-ph/9802025
    • D. Mayers, "Quantum key distribution and string oblivious transfer in noisy channel", Advances in Cryptology: Proceedings of Crypto'96, Lecture Notes in Comp. Sci., vol 1109, (Springer-Verlag, 1996), pp. 343-357; D. Mayers, "Unconditional security in quantum cryptography", Los Alamos preprint archive quant-ph/9802025 (1998).
    • (1998) Unconditional Security in Quantum Cryptography
    • Mayers, D.1
  • 4
    • 0023985539 scopus 로고
    • Privacy amplification by public discussion
    • April
    • Bennett, C. H., Brassard, G. and Robert, J.-M., "Privacy amplification by public discussion", SIAM Journal on Computing, vol. 17, no. 2, April 1988, pp. 210 - 229.
    • (1988) SIAM Journal on Computing , vol.17 , Issue.2 , pp. 210-229
    • Bennett, C.H.1    Brassard, G.2    Robert, J.-M.3
  • 5
    • 0343152990 scopus 로고
    • Quantum cryptography based on bell's theorem
    • 5 August
    • A.K. Ekert, Quantum cryptography based on Bell's theorem, Physical Review Letters, vol. 67, no. 6, 5 August 1991, pp. 661-663.
    • (1991) Physical Review Letters , vol.67 , Issue.6 , pp. 661-663
    • Ekert, A.K.1
  • 7
    • 11944263767 scopus 로고
    • Quantum cryptography without bell's theorem
    • 3 February
    • C.H. Bennett, G. Brassard and N.D. Mermin, "Quantum Cryptography without Bell's Theorem", Physical Review Letters, vol. 68, no. 5, 3 February 1992, pp. 557-559.
    • (1992) Physical Review Letters , vol.68 , Issue.5 , pp. 557-559
    • Bennett, C.H.1    Brassard, G.2    Mermin, N.D.3
  • 12
    • 4043116461 scopus 로고    scopus 로고
    • Differential power analysis: Leaking secrets
    • Lecture Notes in Comp. Sci., Springer-Verlag
    • Paul Kocher, Joshua Jaffe and Benjamin Jun, "Differential Power Analysis: Leaking Secrets", Advances in Cryptology: Proceedings of Crypto '99, Lecture Notes in Comp. Sci., vol 1666, Springer-Verlag, 1996.
    • (1996) Advances in Cryptology: Proceedings of Crypto '99 , vol.1666
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 17
    • 0001992982 scopus 로고
    • A complete classification of quantum ensembles having a given density matrix
    • L. P. Hughston, Richard Jozsa and William K. Wootters, A complete classification of quantum ensembles having a given density matrix", Physics Letters A, vol. 183, pp. 14-18, 1993.
    • (1993) Physics Letters A , vol.183 , pp. 14-18
    • Hughston, L.P.1    Jozsa, R.2    Wootters, W.K.3
  • 18
    • 4043170051 scopus 로고    scopus 로고
    • D. Mayers (in preparation)
    • D. Mayers (in preparation).


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.