-
1
-
-
0003259517
-
Quantum cryptography: Public key distribution and coin tossing
-
Bennett, Ch. H., & Brassard, G., "Quantum cryptography: public key distribution and coin tossing", IEEE Conference on Computer, Systems, and Signal Processing, 1984, pp. 175-190
-
IEEE Conference on Computer, Systems, and Signal Processing, 1984
, pp. 175-190
-
-
Bennett, Ch.H.1
Brassard, G.2
-
2
-
-
11944254075
-
Quantum cryptography using any two non-orthogonal states
-
Bennett, C. H., "Quantum cryptography using any two non-orthogonal states". Physics Review Letter, 68, 1992 p. 3121-3124.
-
(1992)
Physics Review Letter
, vol.68
, pp. 3121-3124
-
-
Bennett, C.H.1
-
3
-
-
0026626314
-
Experimental quantum cryptography
-
Bennett, C. H., Bessette, F., Brassard, G., Salvail, L., & Smolin, J., "Experimental quantum cryptography". Journal of Cryptology, 5(1), 1992 p. 3-28.
-
(1992)
Journal of Cryptology
, vol.5
, Issue.1
, pp. 3-28
-
-
Bennett, C.H.1
Bessette, F.2
Brassard, G.3
Salvail, L.4
Smolin, J.5
-
4
-
-
34547248279
-
Quantum cryptography: A survey
-
Bruss, D., Erdelyi, G., Meyer, T., Riege, T., & Rothe, J., "Quantum cryptography: A survey". ACM Computing Surveys, 39(2), 2007, p. 1-27.
-
(2007)
ACM Computing Surveys
, vol.39
, Issue.2
, pp. 1-27
-
-
Bruss, D.1
Erdelyi, G.2
Meyer, T.3
Riege, T.4
Rothe, J.5
-
5
-
-
33748538996
-
Perspective for cryptographic long-term security
-
Buchmann, J., May, A., & Vollmer U., "Perspective for cryptographic long-term security". Communications of ACM. 49(9), 2006, p. 50-56.
-
(2006)
Communications of ACM
, vol.49
, Issue.9
, pp. 50-56
-
-
Buchmann, J.1
May, A.2
Vollmer, U.3
-
6
-
-
33144485246
-
What is cryptography?
-
Coron, J. S., "What is cryptography?", IEEE Security & Privacy Journal, 12(8), 2006, p. 70-73.
-
(2006)
IEEE Security & Privacy Journal
, vol.12
, Issue.8
, pp. 70-73
-
-
Coron, J.S.1
-
7
-
-
33748538996
-
Perspective for cryptographic long-term security
-
Buchmann, J., May, A., & Vollmer U., "Perspective for cryptographic long-term security" Communications of ACM, Vol.49, No.9, 2006, pp. 50-56.
-
(2006)
Communications of ACM
, vol.49
, Issue.9
, pp. 50-56
-
-
Buchmann, J.1
May, A.2
Vollmer, U.3
-
8
-
-
33645761908
-
Quantum Networks: From Quantum Cryptography to Quantum Architecture
-
Curcic, T., Filipkowski, M. E., Chtchelkanova, A., D'Ambrosio, P. A., Wolf, S. A., Foster, M., & Cochran, D., "Quantum Networks: From Quantum Cryptography to Quantum Architecture", ACM SIGCOMM Computer Communication Review, Vol.34, No.5, 2004, pp. 3-8.
-
(2004)
ACM SIGCOMM Computer Communication Review
, vol.34
, Issue.5
, pp. 3-8
-
-
Curcic, T.1
Filipkowski, M.E.2
Chtchelkanova, A.3
D'Ambrosio, P.A.4
Wolf, S.A.5
Foster, M.6
Cochran, D.7
-
10
-
-
1242285756
-
Building the quantum network
-
Elliot, C., "Building the quantum network", New Journal of Physics, Vol. 46, No.4, 2002, pp. 1-12.
-
(2002)
New Journal of Physics
, vol.46
, Issue.4
, pp. 1-12
-
-
Elliot, C.1
-
11
-
-
1242332560
-
Quantum cryptography in practice
-
Elliot, C., Pearson, D., & Troxel, G., "Quantum cryptography in practice", ACM SIGCOMM, Proceeding of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, 2003, pp. 227-238.
-
ACM SIGCOMM, Proceeding of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, 2003
, pp. 227-238
-
-
Elliot, C.1
Pearson, D.2
Troxel, G.3
-
13
-
-
77951133958
-
-
Internet Resources: MagiQ Technologies, Inc.
-
Internet Resources: MagiQ Technologies, Inc. http://www.magiqtech.com
-
-
-
-
14
-
-
62749192478
-
An introduction to quantum cryptography
-
Papanikolaou, N., "An introduction to quantum cryptography", ACM Crossroads Magazine, Vol.11 No.3, 2005, pp. 1-16.
-
(2005)
ACM Crossroads Magazine
, vol.11
, Issue.3
, pp. 1-16
-
-
Papanikolaou, N.1
-
15
-
-
4544352907
-
Some facets of complexity theory and cryptography: A five-lecture tutorial
-
DOI 10.1145/592642.592646
-
Rothe, J. "Some facets of complexity theory and cryptography": A five-lecture tutorial. ACM Computing Surveys 2002, 34(4), p. 504-549. (Pubitemid 44159297)
-
(2002)
ACM Computing Surveys
, vol.34
, Issue.4
, pp. 504-549
-
-
Rothe, J.1
-
16
-
-
84890522850
-
Communication theory of secrecy system
-
Shannon, E. C., "Communication theory of secrecy system", Bell System Technical Journal, Vol.28, No.4, 1949, pp.656-715.
-
(1949)
Bell System Technical Journal
, vol.28
, Issue.4
, pp. 656-715
-
-
Shannon, E.C.1
-
17
-
-
33947147182
-
Key to the quantum industry
-
Shields, A., & Yuan, Z., "Key to the quantum industry", Physics World, 12, 2007, p. 24-29.
-
(2007)
Physics World
, vol.12
, pp. 24-29
-
-
Shields, A.1
Yuan, Z.2
-
18
-
-
0018705007
-
Symmetric and asymmetric encryption
-
Simmon, G. J. ,"Symmetric and asymmetric encryption", ACM Computing Surveys, 11(4), 1979, p. 305-330.
-
(1979)
ACM Computing Surveys
, vol.11
, Issue.4
, pp. 305-330
-
-
Simmon, G.J.1
-
19
-
-
0001998264
-
Conjugate coding
-
Wiesner, S., "Conjugate coding" SIGACT News , 1983, 15, p. 78-88.
-
(1983)
SIGACT News
, vol.15
, pp. 78-88
-
-
Wiesner, S.1
-
20
-
-
33746708860
-
A single quantum cannot be cloned
-
Wootters, W. K., & Zurek, W. H., "A single quantum cannot be cloned". Nature, 299, 1982, p. 802.
-
(1982)
Nature
, vol.299
, pp. 802
-
-
Wootters, W.K.1
Zurek, W.H.2
-
21
-
-
85008053969
-
The future of cryptography: Practice and theory
-
Young, A., "The future of cryptography: Practice and theory", IEEE IT Professional Journal, 2003, pp. 62-64.
-
(2003)
IEEE IT Professional Journal
, pp. 62-64
-
-
Young, A.1
|