-
3
-
-
0017930809
-
METHOD for OBTAINING DIGITAL SIGNATURES and PUBLIC-KEY CRYPTOSYSTEMS
-
DOI 10.1145/359340.359342
-
Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120-126 (1978) (Pubitemid 8591219)
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
4
-
-
85043762670
-
A provably-secure strongly-randomized cipher
-
Damgård, I.B. (ed.) EUROCRYPT 1990. Springer, Heidelberg
-
Maurer, U.: A provably-secure strongly-randomized cipher. In: Damgård, I.B. (ed.) EUROCRYPT 1990. LNCS, vol. 473, pp. 361-373. Springer, Heidelberg (1991)
-
(1991)
LNCS
, vol.473
, pp. 361-373
-
-
Maurer, U.1
-
5
-
-
45249112311
-
The bare bounded-storage model: The tight bound on the storage requirement for key agreement
-
Dziembowski, S., Maurer, U.: The bare bounded-storage model: The tight bound on the storage requirement for key agreement. IEEE Trans. on Information Theory 54(6), 2790-2792 (2008)
-
(2008)
IEEE Trans. on Information Theory
, vol.54
, Issue.6
, pp. 2790-2792
-
-
Dziembowski, S.1
Maurer, U.2
-
6
-
-
0016562514
-
The wire-tap channel
-
Wyner, A.D.: The wire-tap channel. Bell System Technical J 54(8), 1355-1387 (1975)
-
(1975)
Bell System Technical J
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
7
-
-
0017973511
-
Broadcast channels with confidential messages
-
Csiszár, I., Körner, J.: Broadcast channels with confidential messages. IEEE Trans. on Information Theory 24(3), 339-348 (1978)
-
(1978)
IEEE Trans. on Information Theory
, vol.24
, Issue.3
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
8
-
-
0026698501
-
Conditionally-perfect secrecy and a provably-secure randomized cipher
-
Maurer, U.: Conditionally-perfect secrecy and a provably-secure randomized cipher. J. of Cryptology 5(1), 53-66 (1992)
-
(1992)
J. of Cryptology
, vol.5
, Issue.1
, pp. 53-66
-
-
Maurer, U.1
-
10
-
-
0343152990
-
Quantum cryptography based on Bell's theorem
-
Ekert, A.K.: Quantum cryptography based on Bell's theorem. Phys. Rev. Lett. 67(6), 661-663 (1991)
-
(1991)
Phys. Rev. Lett.
, vol.67
, Issue.6
, pp. 661-663
-
-
Ekert, A.K.1
-
11
-
-
33646373811
-
Trojan-horse attacks on quantum-key-distribution systems
-
Gisin, N., Fasel, S., Kraus, B., Zbinden, H., Ribordy, G.: Trojan-horse attacks on quantum-key-distribution systems. Phys. Rev. A 73(2), 022320 (2006)
-
(2006)
Phys. Rev. A
, vol.73
, Issue.2
, pp. 022320
-
-
Gisin, N.1
Fasel, S.2
Kraus, B.3
Zbinden, H.4
Ribordy, G.5
-
12
-
-
33947205243
-
Phase-remapping attack in practical quantum-key-distribution systems
-
Fung, C.H.F., Qi, B., Tamaki, K., Lo, H.K.: Phase-remapping attack in practical quantum-key-distribution systems. Phys. Rev. A 75(3), 032314 (2007)
-
(2007)
Phys. Rev. A
, vol.75
, Issue.3
, pp. 032314
-
-
Fung, C.H.F.1
Qi, B.2
Tamaki, K.3
Lo, H.K.4
-
13
-
-
33846202211
-
Time-shift attack in practical quantum cryptosystems
-
Qi, B., Fung, C.H.F., Lo, H.K., Ma, X.: Time-shift attack in practical quantum cryptosystems. Quantum Information and Computation 7, 073-082 (2007)
-
(2007)
Quantum Information and Computation
, vol.7
, pp. 73-82
-
-
Qi, B.1
Fung, C.H.F.2
Lo, H.K.3
Ma, X.4
-
14
-
-
55049100546
-
Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems
-
Zhao, Y., Fung, C.H.F., Qi, B., Chen, C., Lo, H.K.: Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems. Phys. Rev. A 78(4), 042333 (2008)
-
(2008)
Phys. Rev. A
, vol.78
, Issue.4
, pp. 042333
-
-
Zhao, Y.1
Fung, C.H.F.2
Qi, B.3
Chen, C.4
Lo, H.K.5
-
15
-
-
67650035011
-
Controlling passively quenched single photon detectors by bright light
-
Makarov, V.: Controlling passively quenched single photon detectors by bright light. New J. of Physics 11(6), 065003 (2009)
-
(2009)
New J. of Physics
, vol.11
, Issue.6
, pp. 065003
-
-
Makarov, V.1
-
17
-
-
0032306873
-
Quantum cryptography with imperfect apparatus
-
Mayers, D.C., Yao, A.: Quantum cryptography with imperfect apparatus. In: FOCS 1998, pp. 503-509 (1998)
-
(1998)
FOCS 1998
, pp. 503-509
-
-
Mayers, D.C.1
Yao, A.2
-
18
-
-
27144477301
-
No signalling and quantum key distribution
-
Barrett, J., Hardy, L., Kent, A.: No signalling and quantum key distribution. Phys. Rev. Lett. 95, 010503 (2005)
-
(2005)
Phys. Rev. Lett.
, vol.95
, pp. 010503
-
-
Barrett, J.1
Hardy, L.2
Kent, A.3
-
19
-
-
33746830453
-
Efficient quantum key distribution secure against no-signalling eavesdroppers
-
DOI 10.1088/1367-2630/8/8/126, PII S1367263006261457
-
Acín, A., Massar, S., Pironio, S.: Efficient quantum key distribution secure against no-signalling eavesdroppers. New J. of Phys. 8(8), 126 (2006) (Pubitemid 44180726)
-
(2006)
New Journal of Physics
, vol.8
, pp. 126
-
-
Aci, A.1
Massar, S.2
Pironio, S.3
-
20
-
-
33750439445
-
Secrecy extraction from no-signalling correlations
-
Scarani, V., Gisin, N., Brunner, N., Masanes, L., Pino, S., Acín, A.: Secrecy extraction from no-signalling correlations. Phys. Rev. A 74(4), 042339 (2006)
-
(2006)
Phys. Rev. A
, vol.74
, Issue.4
, pp. 042339
-
-
Scarani, V.1
Gisin, N.2
Brunner, N.3
Masanes, L.4
Pino, S.5
Acín, A.6
-
21
-
-
33748942504
-
From Bell's theorem to secure quantum key distribution
-
Acín, A., Gisin, N., Masanes, L.: From Bell's theorem to secure quantum key distribution. Phys. Rev. Lett. 97, 120405 (2006)
-
(2006)
Phys. Rev. Lett.
, vol.97
, pp. 120405
-
-
Acín, A.1
Gisin, N.2
Masanes, L.3
-
22
-
-
34547380185
-
Device-independent security of quantum cryptography against collective attacks
-
Acín, A., Brunner, N., Gisin, N., Massar, S., Pironio, S., Scarani, V.: Device-independent security of quantum cryptography against collective attacks. Phys. Rev. Lett. 98, 230501 (2007)
-
(2007)
Phys. Rev. Lett.
, vol.98
, pp. 230501
-
-
Acín, A.1
Brunner, N.2
Gisin, N.3
Massar, S.4
Pironio, S.5
Scarani, V.6
-
23
-
-
72149091696
-
Device independent quantum key distribution secure against coherent attacks with memoryless measurement devices
-
McKague, M.: Device independent quantum key distribution secure against coherent attacks with memoryless measurement devices. New J. of Phys. 11(10), 103037 (2009)
-
(2009)
New J. of Phys.
, vol.11
, Issue.10
, pp. 103037
-
-
McKague, M.1
-
25
-
-
0000486090
-
On the Einstein-Podolsky-Rosen paradox
-
Bell, J.S.: On the Einstein-Podolsky-Rosen paradox. Physics 1, 195-200 (1964)
-
(1964)
Physics
, vol.1
, pp. 195-200
-
-
Bell, J.S.1
-
26
-
-
33947385649
-
Can quantum-mechanical description of physical reality be considered complete?
-
Einstein, A., Podolsky, B., Rosen, N.: Can quantum-mechanical description of physical reality be considered complete? Phys. Rev. 47, 777-780 (1935)
-
(1935)
Phys. Rev.
, vol.47
, pp. 777-780
-
-
Einstein, A.1
Podolsky, B.2
Rosen, N.3
-
27
-
-
36049056258
-
Proposed experiment to test local hidden-variable theories
-
Clauser, J.F., Horne, M.A., Shimony, A., Holt, R.A.: Proposed experiment to test local hidden-variable theories. Phys. Rev. Lett. 23(15), 880-884 (1969)
-
(1969)
Phys. Rev. Lett.
, vol.23
, Issue.15
, pp. 880-884
-
-
Clauser, J.F.1
Horne, M.A.2
Shimony, A.3
Holt, R.A.4
-
28
-
-
21344488159
-
Quantum nonlocality as an axiom
-
Popescu, S., Rohrlich, D.: Quantum nonlocality as an axiom. Found. Phys. 24(3), 379-385 (1994)
-
(1994)
Found. Phys.
, vol.24
, Issue.3
, pp. 379-385
-
-
Popescu, S.1
Rohrlich, D.2
-
29
-
-
34250250611
-
Quantum generalizations of Bell's inequality
-
Cirel'son, B.S.: Quantum generalizations of Bell's inequality. Lett. in Math. Phys. 4(2), 93-100 (1980)
-
(1980)
Lett. in Math. Phys.
, vol.4
, Issue.2
, pp. 93-100
-
-
Cirel'Son, B.S.1
-
30
-
-
0023985539
-
Privacy amplification by public discussion
-
Bennett, C.H., Brassard, G., Robert, J.M.: Privacy amplification by public discussion. SIAM J. on Computing 17(2), 210-229 (1988)
-
(1988)
SIAM J. on Computing
, vol.17
, Issue.2
, pp. 210-229
-
-
Bennett, C.H.1
Brassard, G.2
Robert, J.M.3
-
31
-
-
0024866111
-
Pseudo-random generation from one-way functions
-
Impagliazzo, R., Levin, L.A., Luby, M.: Pseudo-random generation from one-way functions. In: STOC 1989, pp. 12-24 (1989)
-
(1989)
STOC 1989
, pp. 12-24
-
-
Impagliazzo, R.1
Levin, L.A.2
Luby, M.3
-
32
-
-
0029405656
-
Generalized privacy amplification
-
Bennett, C.H., Brassard, G., Crépeau, C., Maurer, U.: Generalized privacy amplification. IEEE Trans. on Information Theory 41(6), 1915-1923 (1995)
-
(1995)
IEEE Trans. on Information Theory
, vol.41
, Issue.6
, pp. 1915-1923
-
-
Bennett, C.H.1
Brassard, G.2
Crépeau, C.3
Maurer, U.4
-
33
-
-
23744435400
-
On the power of quantum memory
-
König, R., Maurer, U., Renner, R.: On the power of quantum memory. IEEE Trans. on Information Theory 51(7), 2391-2401 (2005)
-
(2005)
IEEE Trans. on Information Theory
, vol.51
, Issue.7
, pp. 2391-2401
-
-
König, R.1
Maurer, U.2
Renner, R.3
-
34
-
-
24144485355
-
Universally composable privacy amplification against quantum adversaries
-
Kilian, J. (ed.) TCC 2005. Springer, Heidelberg
-
Renner, R., Koenig, R.: Universally composable privacy amplification against quantum adversaries. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 407-425. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3378
, pp. 407-425
-
-
Renner, R.1
Koenig, R.2
-
36
-
-
65549151429
-
Universally composable privacy amplification from causality constraints
-
Masanes, L.: Universally composable privacy amplification from causality constraints. Phys. Rev. Lett. 102(14), 140501 (2009)
-
(2009)
Phys. Rev. Lett.
, vol.102
, Issue.14
, pp. 140501
-
-
Masanes, L.1
-
37
-
-
79951822794
-
-
Masanes, L., Renner, R., Winter, A., Barrett, J., Christandl, M.: Security of key distribution from causality constraints (2009)
-
(2009)
Security of Key Distribution from Causality Constraints
-
-
Masanes, L.1
Renner, R.2
Winter, A.3
Barrett, J.4
Christandl, M.5
-
38
-
-
84947240143
-
Indistinguishability of random systems
-
Knudsen, L.R. (ed.) EUROCRYPT 2002. Springer, Heidelberg
-
Maurer, U.: Indistinguishability of random systems. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 110-132. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2332
, pp. 110-132
-
-
Maurer, U.1
-
40
-
-
1442292329
-
A composable cryptographic library with nested operations
-
Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003
-
Backes, M., Pfitzmann, B., Waidner, M.: A composable cryptographic library with nested operations. In: CCS 2003, pp. 220-230 (2003) (Pubitemid 40673804)
-
(2003)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 220-230
-
-
Backes, M.1
Pfitzmann, B.2
Waidner, M.3
-
41
-
-
0035163054
-
Universally composable security: A new paradigm for cryptographic protocols
-
Canetti, R.: Universally composable security: a new paradigm for cryptographic protocols. In: FOCS 2001, p. 136 (2001)
-
(2001)
FOCS 2001
, pp. 136
-
-
Canetti, R.1
-
43
-
-
84963650728
-
Universal classes of hash functions
-
extended abstract
-
Carter, J.L., Wegman, M.N.: Universal classes of hash functions (extended abstract). In: STOC 1977, pp. 106-112 (1977)
-
(1977)
STOC 1977
, pp. 106-112
-
-
Carter, J.L.1
Wegman, M.N.2
-
44
-
-
85027496257
-
Secret key reconciliation by public discussion
-
Advances in Cryptology - EUROCRYPT '93
-
Brassard, G., Salvail, L.: Secret-key reconciliation by public discussion. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 410-423. Springer, Heidelberg (1994) (Pubitemid 24767313)
-
(1994)
LECTURE NOTES in COMPUTER SCIENCE
, Issue.765
, pp. 410
-
-
Brassard, G.1
Salvail, L.2
-
45
-
-
29744466493
-
A de Finetti representation for finite symmetric quantum states
-
122108
-
König, R., Renner, R.: A de Finetti representation for finite symmetric quantum states. J. Math. Phys. 46(122108) (2005)
-
(2005)
J. Math. Phys.
, vol.46
-
-
König, R.1
Renner, R.2
|