-
2
-
-
9644289571
-
Experimental demonstration of quantum memory for light
-
B. Julsgaard, J. Sherson, J. I. Cirac, J. Fiuraek, and E. S. Polzik, "Experimental demonstration of quantum memory for light," Nature, vol.432, pp. 482-486, 2004.
-
(2004)
Nature
, vol.432
, pp. 482-486
-
-
Julsgaard, B.1
Sherson, J.2
Cirac, J.I.3
Fiuraek, J.4
Polzik, E.S.5
-
3
-
-
0035267639
-
Single photon detection with a quantum dot transistor
-
A. J. Shields, M. P. O'Sullivan, I. Farrer, D. A. Ritchie, M. L. Leadbeater, N. K. Patel, R. A. Hogg, C. E. Norman, N. J. Curson, and M. Pepper, "Single photon detection with a quantum dot transistor," Jpn. J. Appl. Phys., vol.40, pp. 2058-2064, 2001.
-
(2001)
Jpn. J. Appl. Phys.
, vol.40
, pp. 2058-2064
-
-
Shields, A.J.1
O'Sullivan, M.P.2
Farrer, I.3
Ritchie, D.A.4
Leadbeater, M.L.5
Patel, N.K.6
Hogg, R.A.7
Norman, C.E.8
Curson, N.J.9
Pepper, M.10
-
4
-
-
33748780938
-
Long-distance quantum key distribution in optical fibre
-
P. A. Hiskett, D. Rosenberg, C. G. Peterson, R. J. Hughes, S. Nam, A. E. Lita, A. J. Miller, and J. E. Nordholt, "Long-distance quantum key distribution in optical fibre," New J. Phys., vol.8, pp. 193-200, 2006.
-
(2006)
New J. Phys.
, vol.8
, pp. 193-200
-
-
Hiskett, P.A.1
Rosenberg, D.2
Peterson, C.G.3
Hughes, R.J.4
Nam, S.5
Lita, A.E.6
Miller, A.J.7
Nordholt, J.E.8
-
5
-
-
33750295398
-
Low cost and compact quantum key distribution
-
J. L.Duligall, M. S. Godfrey, K. A. Harrison,W. J. Munro, and J.G.Rarity, "Low cost and compact quantum key distribution," New J. Phys., vol.8, pp. 249-265, 2006.
-
(2006)
New J. Phys.
, vol.8
, pp. 249-265
-
-
Duligall, J.L.1
Godfrey, M.S.2
Harrison, K.A.3
Munro, W.J.4
Rarity, J.G.5
-
6
-
-
51249118182
-
Low cost quantum secret key growing for consumer transactions
-
J. L. Duligall, M. S. Godfrey, A. Lynch, W. Munro, K. Harrison, and J. G. Rarity, "Low cost quantum secret key growing for consumer transactions," in Proc. Int. Quantum Electron. Conf., 2007, pp. 4387012-4387012
-
(2007)
Proc. Int. Quantum Electron. Conf.
, pp. 4387012-4387012
-
-
Duligall, J.L.1
Godfrey, M.S.2
Lynch, A.3
Munro, W.4
Harrison, K.5
Rarity, J.G.6
-
7
-
-
0003259517
-
Quantum cryptography: Public key distribution and coin tossing
-
Bangalore, India
-
C. H. Bennett and G. Brassard, "Quantum cryptography: Public key distribution and coin tossing," in Proc. IEEE Int. Conf. Comput., Syst. Signal Process., Bangalore, India, 1984, pp. 175-179.
-
(1984)
Proc. IEEE Int. Conf. Comput., Syst. Signal Process.
, pp. 175-179
-
-
Bennett, C.H.1
Brassard, G.2
-
8
-
-
11944254075
-
Quantum cryptography using any two nonorthogonal states
-
C. H. Bennett, "Quantum cryptography using any two nonorthogonal states," Phys. Rev. Lett., vol.68, pp. 3121-3124, 1992.
-
(1992)
Phys. Rev. Lett.
, vol.68
, pp. 3121-3124
-
-
Bennett, C.H.1
-
9
-
-
8744225244
-
Increasing the efficiencies of random-choice-based quantum communication protocols with delayed measurement
-
F.-G. Deng, G.-L. Long,Y.Wang, and L.Xiao, "Increasing the efficiencies of random-choice-based quantum communication protocols with delayed measurement," Chinese Phys. Lett., vol.21, pp. 2097-2100, 2004.
-
(2004)
Chinese Phys. Lett.
, vol.21
, pp. 2097-2100
-
-
Deng, F.-G.1
Long, G.-L.2
Wang, Y.3
Xiao, L.4
-
10
-
-
34047236344
-
EPR quantum key distribution protocols with potential 100% qubit efficiency
-
T. Hwang and K.-C. Lee, "EPR quantum key distribution protocols with potential 100% qubit efficiency," IET Proc. Inf. Security, vol.1, pp. 43-45, 2007.
-
(2007)
IET Proc. Inf. Security
, vol.1
, pp. 43-45
-
-
Hwang, T.1
Lee, K.-C.2
-
11
-
-
33745142417
-
Sequences of games: A tool for taming complexity in security proof
-
[Online]. Available
-
V. Shoup. (2006). Sequences of games: A tool for taming complexity in security proof, Cryptology ePrint Archive, Rep. 2004/332 [Online]. Available: http://www.shoup.net/
-
(2006)
Cryptology EPrint Archive, Rep. 2004/332
-
-
Shoup., V.1
-
12
-
-
38148999450
-
A framework for game-based security proofs
-
D. Nowak, "A framework for game-based security proofs," Inf. Commun. Security, vol.4861, pp. 319-333, 2007.
-
(2007)
Inf. Commun. Security
, vol.4861
, pp. 319-333
-
-
Nowak, D.1
-
13
-
-
33947512019
-
Formal proofs for the security of signcryption
-
J. Baek, R. Steinfeld, and Y. Zheng, "Formal proofs for the security of signcryption," J. Cryptol., vol.20, pp. 203-235, 2007.
-
(2007)
J. Cryptol.
, vol.20
, pp. 203-235
-
-
Baek, J.1
Steinfeld, R.2
Zheng, Y.3
-
14
-
-
33646373811
-
Trojan-horse attacks on quantumkey-Distribution systems
-
N. Gisin, S. Fasel, B. Kraus, H. Zbinden, and G. Ribordy, "Trojan-horse attacks on quantumkey-Distribution systems," Phys. Rev. A, vol.73, pp. 0223201-0223206, 2006.
-
(2006)
Phys. Rev. A
, vol.73
, pp. 0223201-0223206
-
-
Gisin, N.1
Fasel, S.2
Kraus, B.3
Zbinden, H.4
Ribordy, G.5
-
15
-
-
33751277651
-
Improving the security of secure direct communication based on the secret transmitting order of particles
-
X.-H. Li, F.-G. Deng, and H.-Y. Zhou, "Improving the security of secure direct communication based on the secret transmitting order of particles," Phys. Rev. A, vol.74, pp. 0543021-0543024, 2006.
-
(2006)
Phys. Rev. A
, vol.74
, pp. 0543021-0543024
-
-
Li, X.-H.1
Deng, F.-G.2
Zhou, H.-Y.3
-
16
-
-
0006375145
-
Identity verification in quantum key distribution
-
G. Zeng andW. Zhang, "Identity verification in quantum key distribution," Phys. Rev. A, vol.61, pp. 0223031-0223035, 2000.
-
(2000)
Phys. Rev. A
, vol.61
, pp. 0223031-0223035
-
-
Zeng, G.1
Zhang, W.2
-
17
-
-
33847744655
-
Provably secure three-party authenticated quantum key distribution protocols
-
DOI 10.1109/TDSC.2007.13
-
T. Hwang, K.-C. Lee, and C.-M. Li, "Provably secure three-party authenticated quantum key distribution protocols," IEEE Trans. Dependable Secure Comput., vol.4, no.1, pp. 71-80, Jan.-Mar. 2007. (Pubitemid 46384622)
-
(2007)
IEEE Transactions on Dependable and Secure Computing
, vol.4
, Issue.1
, pp. 71-80
-
-
Hwang, T.1
Lee, K.-C.2
Li, C.-M.3
-
18
-
-
24144499140
-
Secure quantum key distribution network with Bell states and local unitary operations
-
C.-Y. Li, H.-Y. Zhou, Y.Wang, and F.-G. Deng, "Secure quantum key distribution network with Bell states and local unitary operations," Chinese Phys. Lett., vol.22, pp. 1049-1052, 2005.
-
(2005)
Chinese Phys. Lett.
, vol.22
, pp. 1049-1052
-
-
Li, C.-Y.1
Zhou, H.-Y.2
Wang, Y.3
Deng, F.-G.4
-
19
-
-
0029322598
-
Multiuser quantum cryptography on optical networks
-
S. Phoenix, S. Barnett, P. Townsend, and K. Blow, "Multi-user quantum cryptography on optical networks," J. Modern Opt., vol.42, pp. 1155-1163, 1995.
-
(1995)
J. Modern Opt.
, vol.42
, pp. 1155-1163
-
-
Phoenix, S.1
Barnett, S.2
Townsend, P.3
Blow, K.4
-
20
-
-
84928045174
-
Quantum cryptographic network based on quantum memories
-
E. Biham, B. Huttner, and T. Mor, "Quantum cryptographic network based on quantum memories," Phys. Rev. A, vol.54, pp. 2651-2658, 1996.
-
(1996)
Phys. Rev. A
, vol.54
, pp. 2651-2658
-
-
Biham, E.1
Huttner, B.2
Mor, T.3
|