-
4
-
-
4243059985
-
Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels
-
C. Bennett, G. Brassard, C. Crepeau, R. Jozsa, A. Peres and W. Wootters, Teleporting an unknown quantum state via dual classical and Einstein-Podolsky- Rosen channels, Phys. Rev. Lett. 70 (1993), 1895.
-
(1993)
Phys. Rev. Lett.
, vol.70
, pp. 1895
-
-
Bennett, C.1
Brassard, G.2
Crepeau, C.3
Jozsa, R.4
Peres, A.5
Wootters, W.6
-
5
-
-
84928045174
-
Quantum cryptographic network based on quantum memories
-
E. Biham, B. Huttner and T. Mor, Quantum cryptographic network based on quantum memories, Phys. Rev. A 54 (1996), 2651.
-
(1996)
Phys. Rev. A
, vol.54
, pp. 2651
-
-
Biham, E.1
Huttner, B.2
Mor, T.3
-
6
-
-
2442492740
-
Quantum repeaters: The role of imperfect local operations in quantum communication
-
H.-J. Briegel, W. Dür, J.I. Cirac and P. Zoller, Quantum repeaters: The role of imperfect local operations in quantum communication, Phys. Rev. Lett. 89 (1998), 5932.
-
(1998)
Phys. Rev. Lett.
, vol.89
, pp. 5932
-
-
Briegel, H.-J.1
Dür, W.2
Cirac, J.I.3
Zoller, P.4
-
8
-
-
38049009328
-
Unifying Classical and Quantum Key Distillation
-
Proceedings of the 4th Theory of Cryptography Conference S.P. Vadhan, ed., Springer
-
M. Christandl, A. Ekert, M. Horodecki, P. Horodecki, J. Oppenheim and R. Renner, Unifying Classical and Quantum Key Distillation, in: Proceedings of the 4th Theory of Cryptography Conference, S.P. Vadhan, ed., Lecture Notes in Computer Science, vol.4392, Springer, 2007, p. 456.
-
(2007)
Lecture Notes in Computer Science
, vol.4392
, pp. 456
-
-
Christandl, M.1
Ekert, A.2
Horodecki, M.3
Horodecki, P.4
Oppenheim, J.5
Renner, R.6
-
9
-
-
26644437729
-
Quantum relays for long-distance quantum cryptography
-
D. Collins, N. Gisin and H. de Riedmatten, Quantum relays for long-distance quantum cryptography, J. Modern Opt. 52 (2005), 735.
-
(2005)
J. Modern Opt.
, vol.52
, pp. 735
-
-
Collins, D.1
Gisin, N.2
De Riedmatten, H.3
-
10
-
-
84888077711
-
Perfectly secure message transmission revisited in: Advances in Cryptology
-
Proceedings of Eurocrypt 2002 L. Knudsen ed., Springer
-
I. Desmedt and Y. Wang, Perfectly secure message transmission revisited, in: Advances in Cryptology - Proceedings of Eurocrypt 2002, L. Knudsen ed., Lecture Notes in Computer Science, vol.2332, Springer, 2002, p. 502.
-
(2002)
Lecture Notes in Computer Science
, vol.2332
, pp. 502
-
-
Desmedt, I.1
Wang, Y.2
-
12
-
-
67651232070
-
Architecture and protocols of the future European Quantum Key Distribution network
-
M. Dianati, R. Alléaume, M. Gagnaire and X. Shen, Architecture and protocols of the future European Quantum Key Distribution network, Security and Communication Networks 1 (2008), 57.
-
(2008)
Security and Communication Networks
, vol.1
, pp. 57
-
-
Dianati, M.1
Alléaume, R.2
Gagnaire, M.3
Shen, X.4
-
14
-
-
0027341860
-
Perfectly secure message transmission
-
D. Dolev, C. Dwork, O. Waarts and M. Yung, Perfectly secure message transmission, J. ACM 40 (1993), 17.
-
(1993)
J. ACM
, vol.40
, pp. 17
-
-
Dolev, D.1
Dwork, C.2
Waarts, O.3
Yung, M.4
-
15
-
-
85016162583
-
Quantum cryptography
-
E. Wolf, ed., Elsevier
-
M. Dusek, N. Lütkenhaus andM. Hendrych, Quantum cryptography, in: Progress in Optics, E. Wolf, ed., vol.49, Elsevier, 2006, p. 381.
-
(2006)
Progress in Optics
, vol.49
, pp. 381
-
-
Dusek, M.1
Lütkenhaus, N.2
Hendrych, M.3
-
16
-
-
1242285756
-
Building the quantum network
-
C. Elliott, Building the quantum network, New J. Phys. 4 (2002), 46.
-
(2002)
New J. Phys.
, vol.4
, pp. 46
-
-
Elliott, C.1
-
17
-
-
27644552955
-
Current status of the DARPA quantum network
-
E. Donkor, A. Pirich and H. Brandt, eds, Proc. SPIE, vol.5815, SPIE - The International Society for Optical Engineering
-
C. Elliott, A. Colvin, D. Pearson, O. Pikalo, J. Schlafer and H. Yeh, Current status of the DARPA quantum network, in: Quantum Information and Computation III, E. Donkor, A. Pirich and H. Brandt, eds, Proc. SPIE, vol.5815, SPIE - The International Society for Optical Engineering, 2005, p. 138.
-
(2005)
Quantum Information and Computation III
, pp. 138
-
-
Elliott, C.1
Colvin, A.2
Pearson, D.3
Pikalo, O.4
Schlafer, J.5
Yeh, H.6
-
18
-
-
0036013605
-
Quantum cryptography
-
N. Gisin, G. Ribordy, W. Tittel and H. Zbinden, Quantum cryptography, Rev. Modern Phys. 74 (2002), 145.
-
(2002)
Rev. Modern Phys.
, vol.74
, pp. 145
-
-
Gisin, N.1
Ribordy, G.2
Tittel, W.3
Zbinden, H.4
-
19
-
-
7044249607
-
Security of Quantum Key Distribution with imperfect devices
-
D. Gottesman, H.-K. Lo, N. Lütkenhaus and J. Preskill, Security of Quantum Key Distribution with imperfect devices, Quantum. Inf. Comput. 4 (2004), 325.
-
(2004)
Quantum. Inf. Comput.
, vol.4
, pp. 325
-
-
Gottesman, D.1
Lo, H.-K.2
Lütkenhaus, N.3
Preskill, J.4
-
20
-
-
71749104990
-
-
http://www.secoqc.net.
-
-
-
-
21
-
-
71749105386
-
-
http://www.smartquantum.com, http://www.magiqtech.com
-
http://www.idquantique.com, http://www.smartquantum.com, http://www.magiqtech.com.
-
-
-
-
22
-
-
27144544067
-
Lower and upper bounds on the secret-key rate for Quantum Key Distribution protocols using one-way classical communication
-
B. Kraus, N. Gisin and R. Renner, Lower and upper bounds on the secret-key rate for Quantum Key Distribution protocols using one-way classical communication, Phys. Rev. Lett. 95 (2005), 080501.
-
(2005)
Phys. Rev. Lett.
, vol.95
, pp. 080501
-
-
Kraus, B.1
Gisin, N.2
Renner, R.3
-
23
-
-
84991939136
-
LFSR-based hashing and authentication
-
Proc. of CRYPTO'94 Y. Desmedt, ed., Springer
-
H. Krawczyk, LFSR-based hashing and authentication, in: Proc. of CRYPTO'94, Y. Desmedt, ed., Lecture Notes in Computer Science, vol.839, Springer, 1994, p. 129.
-
(1994)
Lecture Notes in Computer Science
, vol.839
, pp. 129
-
-
Krawczyk, H.1
-
26
-
-
34047263436
-
Small accessible quantum information does not imply security
-
R. König, R. Renner, A. Bariska and U. Maurer, Small accessible quantum information does not imply security, Phys. Rev. Lett. 98 (2007), 140502.
-
(2007)
Phys. Rev. Lett.
, vol.98
, pp. 140502
-
-
König, R.1
Renner, R.2
Bariska, A.3
Maurer, U.4
-
28
-
-
3042730516
-
Unconditional security in quantum cryptography
-
D. Mayers, Unconditional security in quantum cryptography, J. Assoc. Comput. Math. 48 (2001), 351.
-
(2001)
J. Assoc. Comput. Math.
, vol.48
, pp. 351
-
-
Mayers, D.1
-
30
-
-
44049099202
-
Outline of the SECOQC Quantum-Key-Distribution network in Vienna
-
A. Poppe, M. Peev and O. Maurhart, Outline of the SECOQC Quantum-Key-Distribution network in Vienna, Int. J. Quant. Inf. (IJQI) 6 (2008), 209.
-
(2008)
Int. J. Quant. Inf. (IJQI)
, vol.6
, pp. 209
-
-
Poppe, A.1
Peev, M.2
Maurhart, O.3
-
31
-
-
44049101670
-
Security of Quantum Key Distribution
-
R. Renner, Security of Quantum Key Distribution, Int. J. Quant. Inf. (IJQI) 6 (2008), 1.
-
(2008)
Int. J. Quant. Inf. (IJQI)
, vol.6
, pp. 1
-
-
Renner, R.1
-
32
-
-
27144550522
-
Information-theoretic security proof for Quantum-Key-Distribution protocols
-
R. Renner, N. Gisin and B. Kraus, Information-theoretic security proof for Quantum-Key-Distribution protocols, Phys. Rev. A 72 (2005), 012332.
-
(2005)
Phys. Rev. A
, vol.72
, pp. 012332
-
-
Renner, R.1
Gisin, N.2
Kraus, B.3
-
33
-
-
24144485355
-
Universally composable privacy amplification against quantum adversaries
-
Theory of Cryptography: Second Theory of Cryptography Conference, TCC 2005, J. Kilian, ed., Springer
-
R. Renner and R. König, Universally composable privacy amplification against quantum adversaries, in: Theory of Cryptography: Second Theory of Cryptography Conference, TCC 2005, J. Kilian, ed., Lecture Notes in Computer Science, vol.3378, Springer, 2005, p. 407.
-
(2005)
Lecture Notes in Computer Science
, vol.3378
, pp. 407
-
-
Renner, R.1
König, R.2
-
36
-
-
38349129346
-
A framework for practical quantum cryptography
-
unpublished, eprint quantph/ 0802.4155
-
V. Scarani, H. Bechmann-Pasquinucci, N.J. Cerf, M. Dusek, N. Lütkenhaus and M. Peev, A framework for practical quantum cryptography, Rev. Modern Phys., 2009 unpublished, eprint quantph/ 0802.4155, 2008.
-
(2008)
Rev. Modern Phys. 2009
-
-
Scarani, V.1
Bechmann-Pasquinucci, H.2
Cerf, N.J.3
Dusek, M.4
Lütkenhaus, N.5
Peev, M.6
-
37
-
-
84856043672
-
A mathematical theory of communication
-
C.E. Shannon, A mathematical theory of communication, Bell System Technical Journal 27 (1948), 379, 623.
-
(1948)
Bell System Technical Journal
, vol.27
, pp. 623
-
-
Shannon, C.E.1
-
38
-
-
84890522850
-
Communication theory of secrecy systems
-
C.E. Shannon, Communication theory of secrecy systems, Bell System Technical Journal 28 (1949), 656.
-
(1949)
Bell System Technical Journal
, vol.28
, pp. 656
-
-
Shannon, C.E.1
-
39
-
-
0347090658
-
Simple proof of security of the BB84 Quantum Key Distribution protocol
-
P.W. Shor and J. Preskill, Simple proof of security of the BB84 Quantum Key Distribution protocol, Phys. Rev. Lett. 85 (2000), 441.
-
(2000)
Phys. Rev. Lett.
, vol.85
, pp. 441
-
-
Shor, P.W.1
Preskill, J.2
-
40
-
-
84942520895
-
On fast and provably secure message authentication based on universal hashing
-
Proc. Crypto'96, N. Koblitz, ed., Springer
-
V. Shoup, On fast and provably secure message authentication based on universal hashing, in: Proc. Crypto'96, N. Koblitz, ed., Lecture Notes in Computer Science, vol.1109, Springer, 1996, p. 313.
-
(1996)
Lecture Notes in Computer Science
, vol.1109
, pp. 313
-
-
Shoup, V.1
-
42
-
-
0019572642
-
New hash functions and their use in authentication and set equality
-
M.N. Wegman and J.L. Carter, New hash functions and their use in authentication and set equality, J. Comp. System Sci. 22 (1981), 265.
-
(1981)
J. Comp. System Sci.
, vol.22
, pp. 265
-
-
Wegman, M.N.1
Carter, J.L.2
|