-
1
-
-
67649495747
-
Strategic Agenda for Standardisation in support of the Artemis Strategic Research Agenda ARTEMIS
-
(accessed 5 May 2009)
-
Affenzeller J et al 2007 Strategic Agenda for Standardisation in support of the Artemis Strategic Research Agenda ARTEMIS-European Platform on Intelligent Embedded Systems https://www.artemisia-association.org/downloads/ standardisation.pdf (accessed 5 May 2009)
-
(2007)
European Platform on Intelligent Embedded Systems
-
-
Affenzeller, J.1
-
2
-
-
44049083607
-
-
arXiv:quant-ph/0701168
-
Alléaume R, Rarity J, Renner R, Ribordy G, Riguidel M, Salvail L, Shields A, Weinfurter H and Zeilinge A 2006 SECOQC White Paper on Quantum Key Distribution and Cryptography arXiv:quant-ph/0701168
-
(2006)
SECOQC White Paper on Quantum Key Distribution and Cryptography
-
-
Alléaume, R.1
Rarity, J.2
Renner, R.3
Ribordy, G.4
Riguidel, M.5
Salvail, L.6
Shields, A.7
Weinfurter, H.8
Zeilinge, A.9
-
3
-
-
0026626314
-
Experimental quantum cryptography
-
Bennett Ch, Bessette F, Brassard G, Salvail L and Smolin J 1992 Experimental quantum cryptography J. Cryptol 5 3-28
-
(1992)
J. Cryptol
, vol.5
, pp. 3-28
-
-
Bennett, C.1
Bessette, F.2
Brassard, G.3
Salvail, L.4
Smolin, J.5
-
4
-
-
2442492740
-
Quantum repeaters: The role of imperfect local operations in quantum communication
-
Briegel H.-J. Dur W. Cirac J.I. Zoller P. Quantum repeaters: The role of imperfect local operations in quantum communication Physical Review Letters 1998 81 26 5932-5935 Briegel H-J, Dür W, Cirac J and Zoller P 1998 Quantum repeaters: the role of imperfect local operations in quantum communication Phys. Rev. Lett 81 5932-5935 (Pubitemid 128628297)
-
(1998)
Physical Review Letters
, vol.81
, Issue.26
, pp. 5932-5935
-
-
Briegel, H.-J.1
Dur, W.2
Cirac, J.I.3
Zoller, P.4
-
5
-
-
38049009328
-
Unifying classical and quantum key distillation
-
(Lecture Notes in Computer Science vol 4392)
-
Christandl M, Ekert A, Horodecki M, Horodecki P, Oppenheim J and Renner R 2007 Unifying classical and quantum key distillation Proc. 4th Theory of Cryptography Conf (Lecture Notes in Computer Science vol 4392) pp 456-478
-
(2007)
Proc. 4th Theory of Cryptography Conf
, pp. 456-478
-
-
Christandl, M.1
Ekert, A.2
Horodecki, M.3
Horodecki, P.4
Oppenheim, J.5
Renner, R.6
-
6
-
-
67649501174
-
Communication from the Commission to the European Parliament and the Council on Promoting Data Protection by Privacy Enhancing Technologies (PETs)
-
D Celex number 52007DC0228
-
Communication from the Commission to the European Parliament and the Council on Promoting Data Protection by Privacy Enhancing Technologies (PETs) 2007 Off. J. Eur. Union D Celex number 52007DC0228
-
(2007)
Off. J. Eur. Union
-
-
-
7
-
-
67649473785
-
Communication from the Commission to the Council, the European Parliament and the European Economic and Social Committee-Towards an increased contribution from standardisation to innovation in Europe
-
D Celex number 52008DC0133
-
Communication from the Commission to the Council, the European Parliament and the European Economic and Social Committee-Towards an increased contribution from standardisation to innovation in Europe 2008 Off. J. Eur. Union D Celex number 52008DC0133
-
(2008)
Off. J. Eur. Union
-
-
-
8
-
-
12844277044
-
-
Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communications) L Celex number 02002L0058-20060503
-
Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communications) 2002 Off. J. Eur. Union L Celex number 02002L0058-20060503
-
(2002)
Off. J. Eur. Union
-
-
-
9
-
-
0017018484
-
New directions in cryptography IEEE Trans
-
Diffie W and Hellman M E 1976 New directions in cryptography IEEE Trans. Inf. Theory 22 644-654
-
(1976)
Inf. Theory
, vol.22
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
16
-
-
44049099202
-
Outline of the SECOQC quantum-key-distribution network in Vienna
-
Poppe A, Peev M and Maurhart O 2008 Outline of the SECOQC quantum-key-distribution network in Vienna Int. J. Quantum Inf. 6 209-218
-
(2008)
Int. J. Quantum Inf.
, vol.6
, pp. 209-218
-
-
Poppe, A.1
Peev, M.2
Maurhart, O.3
-
18
-
-
0017930809
-
METHOD for OBTAINING DIGITAL SIGNATURES and PUBLIC-KEY CRYPTOSYSTEMS
-
DOI 10.1145/359340.359342
-
Rivest R.L. Shamir A. Adleman L. METHOD FOR OBTAINING DIGITAL SIGNATURES AND PUBLIC-KEY CRYPTOSYSTEMS. Communications of the ACM 1978 21 2 120-126 DOI 10.1145/359340.359342 Rivest R L, Shamir A and Adleman L M 1978 A method for obtaining digital signatures and public-key cryptosystems Commun. ACM 21 120-126 (Pubitemid 8591219)
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
19
-
-
67649474915
-
Security of trusted repearter QKD networks
-
Secur. at press (arXiv:0904.4072 [quant-ph])
-
Salvail L, Peev M, Diamanti E, Alléaume R, Lätkenhaus N and Länger Th 2009 Security of trusted repearter QKD networks J. Comput. Secur. at press (arXiv:0904.4072 [quant-ph])
-
(2009)
J. Comput.
-
-
Salvail, L.1
Peev, M.2
Diamanti, E.3
Alléaume, R.4
Lätkenhaus, N.5
Th, L.6
-
20
-
-
67649495745
-
A framework for practical quantum cryptography
-
at press (arXiv:quant-ph/0802.4155)
-
Scarani V, Bechmann-Pasquanucci H, Cerf N, Dusek M, Lütkenhaus N and Peev M 2009 A framework for practical quantum cryptography Rev. Mod. Phys. at press (arXiv:quant-ph/0802.4155)
-
(2009)
Rev. Mod. Phys.
-
-
Scarani, V.1
Bechmann-Pasquanucci, H.2
Cerf, N.3
Dusek, M.4
Lütkenhaus, N.5
Peev, M.6
-
22
-
-
84890522850
-
Communication theory of secrecy systems
-
Shannon C E 1949 Communication theory of secrecy systems Bell Syst. Tech. J. 28 656-715
-
(1949)
Bell Syst. Tech. J.
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
23
-
-
84942520895
-
On Fast and Provably Secure Message Authentication Based on Universal Hashing
-
Advances in Cryptology - CRYPTO '96
-
Shoup V. On Fast and Provably Secure Message Authentication Based on Universal Hashing LECTURE NOTES IN COMPUTER SCIENCE 1996 1109 313-328 Advances in Cryptology - CRYPTO '96 Shoup V 1996 On fast and provably secure message authentication based on universal hashing Proc. Crypto '96, Lect. Not. Comput. Sci. 1109 313-328 (Pubitemid 126106249)
-
(1996)
LECTURE NOTES in COMPUTER SCIENCE
, Issue.1109
, pp. 313-328
-
-
Shoup, V.1
-
26
-
-
0035841908
-
Large pulse attack as a method of conventional optical eavesdropping in quantum cryptography
-
DOI 10.1080/09500340110074691, Technologies for Quantum Communications
-
Vakhitov A. Makarov V. Hjelme D.R. Large pulse attack as a method of conventional optical eavesdropping in quantum cryptography Journal of Modern Optics 2001 48 13 SPEC. 2023-2038 DOI 10.1080/09500340110074691, Technologies for Quantum Communications Vakhitov A, Makarov V and Hjelme D R 2001 Large pulse attack as a method of conventional optical eaves-dropping in quantum cryptography J. Mod. Opt. 48 2023-2038 (Pubitemid 35381812)
-
(2001)
Journal of Modern Optics
, vol.48
, Issue.SPEC13
, pp. 2023-2038
-
-
Vakhitov, A.1
Makarov, V.2
Hjelme, D.R.3
-
27
-
-
24944591357
-
How to break MD5 and other hash functions Proc
-
Lect. Not. Comput. Sci.
-
Wang X and Yu H 2005 How to break MD5 and other hash functions Proc. EUROCRYPT2005 (Lect. Not. Comput. Sci. vol 3494) pp 19-35
-
(2005)
EUROCRYPT2005
, vol.3494
, pp. 19-35
-
-
Wang, X.1
Yu, H.2
-
29
-
-
0019572642
-
New hash functions and their use in authentication and set equality
-
Wegman M N and Carter J L 1981 New hash functions and their use in authentication and set equality J. Comput. Syst. Sci. 22 265-279s
-
(1981)
J. Comput. Syst. Sci.
, vol.22
-
-
Wegman, M.N.1
Carter, J.L.2
|