메뉴 건너뛰기




Volumn 11, Issue , 2009, Pages

Standardization of quantum key distribution and the ETSI standardization initiative ISG-QKD

Author keywords

[No Author keywords available]

Indexed keywords

BUSINESS APPLICATIONS; COMMERCIAL PRODUCTS; CONTROLLED ENVIRONMENT; INTENSIVE RESEARCH; LEVERAGE EFFECTS; PHYSICAL LABORATORY; PRACTICAL USE; QUANTUM KEY DISTRIBUTION; REAL WORLD ENVIRONMENTS; SECURITY EVALUATION; SECURITY PROOFS; SYSTEM INTEROPERABILITY; TECHNICAL DEVELOPMENT; TECHNOLOGICAL DEVELOPMENT; USER REQUIREMENTS;

EID: 67649535645     PISSN: 13672630     EISSN: None     Source Type: Journal    
DOI: 10.1088/1367-2630/11/5/055051     Document Type: Article
Times cited : (56)

References (29)
  • 1
    • 67649495747 scopus 로고    scopus 로고
    • Strategic Agenda for Standardisation in support of the Artemis Strategic Research Agenda ARTEMIS
    • (accessed 5 May 2009)
    • Affenzeller J et al 2007 Strategic Agenda for Standardisation in support of the Artemis Strategic Research Agenda ARTEMIS-European Platform on Intelligent Embedded Systems https://www.artemisia-association.org/downloads/ standardisation.pdf (accessed 5 May 2009)
    • (2007) European Platform on Intelligent Embedded Systems
    • Affenzeller, J.1
  • 4
    • 2442492740 scopus 로고    scopus 로고
    • Quantum repeaters: The role of imperfect local operations in quantum communication
    • Briegel H.-J. Dur W. Cirac J.I. Zoller P. Quantum repeaters: The role of imperfect local operations in quantum communication Physical Review Letters 1998 81 26 5932-5935 Briegel H-J, Dür W, Cirac J and Zoller P 1998 Quantum repeaters: the role of imperfect local operations in quantum communication Phys. Rev. Lett 81 5932-5935 (Pubitemid 128628297)
    • (1998) Physical Review Letters , vol.81 , Issue.26 , pp. 5932-5935
    • Briegel, H.-J.1    Dur, W.2    Cirac, J.I.3    Zoller, P.4
  • 6
    • 67649501174 scopus 로고    scopus 로고
    • Communication from the Commission to the European Parliament and the Council on Promoting Data Protection by Privacy Enhancing Technologies (PETs)
    • D Celex number 52007DC0228
    • Communication from the Commission to the European Parliament and the Council on Promoting Data Protection by Privacy Enhancing Technologies (PETs) 2007 Off. J. Eur. Union D Celex number 52007DC0228
    • (2007) Off. J. Eur. Union
  • 7
    • 67649473785 scopus 로고    scopus 로고
    • Communication from the Commission to the Council, the European Parliament and the European Economic and Social Committee-Towards an increased contribution from standardisation to innovation in Europe
    • D Celex number 52008DC0133
    • Communication from the Commission to the Council, the European Parliament and the European Economic and Social Committee-Towards an increased contribution from standardisation to innovation in Europe 2008 Off. J. Eur. Union D Celex number 52008DC0133
    • (2008) Off. J. Eur. Union
  • 8
    • 12844277044 scopus 로고    scopus 로고
    • Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communications) L Celex number 02002L0058-20060503
    • Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communications) 2002 Off. J. Eur. Union L Celex number 02002L0058-20060503
    • (2002) Off. J. Eur. Union
  • 9
    • 0017018484 scopus 로고
    • New directions in cryptography IEEE Trans
    • Diffie W and Hellman M E 1976 New directions in cryptography IEEE Trans. Inf. Theory 22 644-654
    • (1976) Inf. Theory , vol.22 , pp. 644-654
    • Diffie, W.1    Hellman, M.E.2
  • 16
    • 44049099202 scopus 로고    scopus 로고
    • Outline of the SECOQC quantum-key-distribution network in Vienna
    • Poppe A, Peev M and Maurhart O 2008 Outline of the SECOQC quantum-key-distribution network in Vienna Int. J. Quantum Inf. 6 209-218
    • (2008) Int. J. Quantum Inf. , vol.6 , pp. 209-218
    • Poppe, A.1    Peev, M.2    Maurhart, O.3
  • 18
    • 0017930809 scopus 로고
    • METHOD for OBTAINING DIGITAL SIGNATURES and PUBLIC-KEY CRYPTOSYSTEMS
    • DOI 10.1145/359340.359342
    • Rivest R.L. Shamir A. Adleman L. METHOD FOR OBTAINING DIGITAL SIGNATURES AND PUBLIC-KEY CRYPTOSYSTEMS. Communications of the ACM 1978 21 2 120-126 DOI 10.1145/359340.359342 Rivest R L, Shamir A and Adleman L M 1978 A method for obtaining digital signatures and public-key cryptosystems Commun. ACM 21 120-126 (Pubitemid 8591219)
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 22
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • Shannon C E 1949 Communication theory of secrecy systems Bell Syst. Tech. J. 28 656-715
    • (1949) Bell Syst. Tech. J. , vol.28 , pp. 656-715
    • Shannon, C.E.1
  • 23
    • 84942520895 scopus 로고    scopus 로고
    • On Fast and Provably Secure Message Authentication Based on Universal Hashing
    • Advances in Cryptology - CRYPTO '96
    • Shoup V. On Fast and Provably Secure Message Authentication Based on Universal Hashing LECTURE NOTES IN COMPUTER SCIENCE 1996 1109 313-328 Advances in Cryptology - CRYPTO '96 Shoup V 1996 On fast and provably secure message authentication based on universal hashing Proc. Crypto '96, Lect. Not. Comput. Sci. 1109 313-328 (Pubitemid 126106249)
    • (1996) LECTURE NOTES in COMPUTER SCIENCE , Issue.1109 , pp. 313-328
    • Shoup, V.1
  • 26
    • 0035841908 scopus 로고    scopus 로고
    • Large pulse attack as a method of conventional optical eavesdropping in quantum cryptography
    • DOI 10.1080/09500340110074691, Technologies for Quantum Communications
    • Vakhitov A. Makarov V. Hjelme D.R. Large pulse attack as a method of conventional optical eavesdropping in quantum cryptography Journal of Modern Optics 2001 48 13 SPEC. 2023-2038 DOI 10.1080/09500340110074691, Technologies for Quantum Communications Vakhitov A, Makarov V and Hjelme D R 2001 Large pulse attack as a method of conventional optical eaves-dropping in quantum cryptography J. Mod. Opt. 48 2023-2038 (Pubitemid 35381812)
    • (2001) Journal of Modern Optics , vol.48 , Issue.SPEC13 , pp. 2023-2038
    • Vakhitov, A.1    Makarov, V.2    Hjelme, D.R.3
  • 27
    • 24944591357 scopus 로고    scopus 로고
    • How to break MD5 and other hash functions Proc
    • Lect. Not. Comput. Sci.
    • Wang X and Yu H 2005 How to break MD5 and other hash functions Proc. EUROCRYPT2005 (Lect. Not. Comput. Sci. vol 3494) pp 19-35
    • (2005) EUROCRYPT2005 , vol.3494 , pp. 19-35
    • Wang, X.1    Yu, H.2
  • 28
  • 29
    • 0019572642 scopus 로고
    • New hash functions and their use in authentication and set equality
    • Wegman M N and Carter J L 1981 New hash functions and their use in authentication and set equality J. Comput. Syst. Sci. 22 265-279s
    • (1981) J. Comput. Syst. Sci. , vol.22
    • Wegman, M.N.1    Carter, J.L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.