-
2
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
Maurer U.M. Secret key agreement by public discussion from common information. IEEE Transactions on Information Theory 39 (1993) 733-742
-
(1993)
IEEE Transactions on Information Theory
, vol.39
, pp. 733-742
-
-
Maurer, U.M.1
-
4
-
-
0033097504
-
Unconditionnally secure key agreement and intrinsic information
-
Maurer U.M., and Wolf S. Unconditionnally secure key agreement and intrinsic information. IEEE Transactions on Information Theory 45 (1999) 499-514
-
(1999)
IEEE Transactions on Information Theory
, vol.45
, pp. 499-514
-
-
Maurer, U.M.1
Wolf, S.2
-
5
-
-
0000324562
-
Quantum cryptography on noisy channels: quantum versus classical key-agreement protocols
-
Gisin N., and Wolf S. Quantum cryptography on noisy channels: quantum versus classical key-agreement protocols. Phys. Rev. Lett. 83 (1999) 4200-4203
-
(1999)
Phys. Rev. Lett.
, vol.83
, pp. 4200-4203
-
-
Gisin, N.1
Wolf, S.2
-
6
-
-
84974621399
-
Linking Classical and Quantum Key Agreement: Is There "Bound Information"?
-
Advances in cryptology-Proceedings of Crypto 2000
-
Gisin N., and Wolf S. Linking Classical and Quantum Key Agreement: Is There "Bound Information"?. Advances in cryptology-Proceedings of Crypto 2000. Lecture Notes in Computer Science Vol. 1880 (2000) 482-500
-
(2000)
Lecture Notes in Computer Science
, vol.1880
, pp. 482-500
-
-
Gisin, N.1
Wolf, S.2
-
7
-
-
0344899192
-
Equivalence between two-qubit entanglement and secure key distribution
-
also quant-ph/0303053
-
also quant-ph/0303053. Acin T., Gisin N., and Massanes L. Equivalence between two-qubit entanglement and secure key distribution. Phys. Rev. Lett. 91 (2003) 167901
-
(2003)
Phys. Rev. Lett.
, vol.91
, pp. 167901
-
-
Acin, T.1
Gisin, N.2
Massanes, L.3
-
9
-
-
33746708860
-
A single quanta cannot be cloned
-
Wooters W.K., and Zurek W.H. A single quanta cannot be cloned. Nature 299 (1982) 802-803
-
(1982)
Nature
, vol.299
, pp. 802-803
-
-
Wooters, W.K.1
Zurek, W.H.2
-
10
-
-
0001339556
-
Photons cannot always be replicated
-
Milonni P.W., and Hardies M.L. Photons cannot always be replicated. Phys. Lett. A 92 (1982) 321-322
-
(1982)
Phys. Lett. A
, vol.92
, pp. 321-322
-
-
Milonni, P.W.1
Hardies, M.L.2
-
11
-
-
33750978344
-
Communication by EPR devices
-
Dieks D. Communication by EPR devices. Phys. Lett. A 92 (1982) 271-272
-
(1982)
Phys. Lett. A
, vol.92
, pp. 271-272
-
-
Dieks, D.1
-
13
-
-
0026867928
-
Polarization mode dispersion: Time versus frequency domain
-
Gisin N., and Pellaux J.P. Polarization mode dispersion: Time versus frequency domain. Optics Commun. 89 (1992) 316-323
-
(1992)
Optics Commun.
, vol.89
, pp. 316-323
-
-
Gisin, N.1
Pellaux, J.P.2
-
15
-
-
0001395953
-
Observation of Berry's topological phase by use of an optical fiber
-
Tomita A., and Chiao R.Y. Observation of Berry's topological phase by use of an optical fiber. Phys. Rev. Lett. 57 (1986) 937-940
-
(1986)
Phys. Rev. Lett.
, vol.57
, pp. 937-940
-
-
Tomita, A.1
Chiao, R.Y.2
-
16
-
-
0032621435
-
Pulsed energy-time entangled twin-photon source for quantum communication
-
Brendel J., Gisin N., Tittel W., and Zbinden H. Pulsed energy-time entangled twin-photon source for quantum communication. Phys. Rev. Lett. 82 12 (1999) 2594-2597
-
(1999)
Phys. Rev. Lett.
, vol.82
, Issue.12
, pp. 2594-2597
-
-
Brendel, J.1
Gisin, N.2
Tittel, W.3
Zbinden, H.4
-
17
-
-
0002437815
-
Photonic Entanglement for Fundamental Tests and Quantum Communication
-
No. 2, Rinton Press
-
No. 2. Tittel W., and Weihs G. Photonic Entanglement for Fundamental Tests and Quantum Communication. QIC Vol. 1 (2001), Rinton Press 3-56
-
(2001)
QIC
, vol.1
, pp. 3-56
-
-
Tittel, W.1
Weihs, G.2
-
18
-
-
0343152990
-
Quantum cryptography based on Bell's theorem
-
Ekert A.K. Quantum cryptography based on Bell's theorem. Phys. Rev. Lett. 67 (1991) 661-663
-
(1991)
Phys. Rev. Lett.
, vol.67
, pp. 661-663
-
-
Ekert, A.K.1
-
19
-
-
0035127994
-
Highly efficient photon-pair source using a Periodically Poled Lithium Niobate waveguide
-
Tanzilli S., De Riedmatten H., Tittel W., Zbinden H., Baldi P., De Micheli M., Ostrowsky D.B., and Gisin N. Highly efficient photon-pair source using a Periodically Poled Lithium Niobate waveguide. Electr. Lett. 37 (2001) 26-28
-
(2001)
Electr. Lett.
, vol.37
, pp. 26-28
-
-
Tanzilli, S.1
De Riedmatten, H.2
Tittel, W.3
Zbinden, H.4
Baldi, P.5
De Micheli, M.6
Ostrowsky, D.B.7
Gisin, N.8
-
20
-
-
0000057408
-
Quantum Cryptography Using Entangled Photons in Energy-Time Bell States
-
Tittel W., Brendel J., Zbinden H., and Gisin N. Quantum Cryptography Using Entangled Photons in Energy-Time Bell States. Phys. Rev. Lett. 84 (2000) 4737-4740
-
(2000)
Phys. Rev. Lett.
, vol.84
, pp. 4737-4740
-
-
Tittel, W.1
Brendel, J.2
Zbinden, H.3
Gisin, N.4
-
21
-
-
3442883654
-
Bell Inequality for Position and Time
-
Franson J.D. Bell Inequality for Position and Time. Phys. Rev. Lett. 62 (1989) 2205-2208
-
(1989)
Phys. Rev. Lett.
, vol.62
, pp. 2205-2208
-
-
Franson, J.D.1
-
22
-
-
4243256974
-
Violation of Bell inequalities by photons more than 10 km apart
-
Tittel W., Brendel J., Zbinden H., and Gisin N. Violation of Bell inequalities by photons more than 10 km apart. Phys. Rev. Lett. 81 (1998) 3563-3566
-
(1998)
Phys. Rev. Lett.
, vol.81
, pp. 3563-3566
-
-
Tittel, W.1
Brendel, J.2
Zbinden, H.3
Gisin, N.4
-
24
-
-
4243836477
-
Long distance entanglement based quantum key distribution
-
Ribordy G., Brendel J., Gautier J.D., Gisin N., and Zbinden H. Long distance entanglement based quantum key distribution. Phys. Rev. A 63 (2001) 012309
-
(2001)
Phys. Rev. A
, vol.63
, pp. 012309
-
-
Ribordy, G.1
Brendel, J.2
Gautier, J.D.3
Gisin, N.4
Zbinden, H.5
-
25
-
-
77956697283
-
-
http://www.MagiQtech.com
-
-
-
-
26
-
-
0027580767
-
Single photon interference in a 10 km long optical fiber interferometer
-
Townsend P., Rarity J.G., and Tapster P.R. Single photon interference in a 10 km long optical fiber interferometer. Electron. Lett. 29 (1993) 634-639
-
(1993)
Electron. Lett.
, vol.29
, pp. 634-639
-
-
Townsend, P.1
Rarity, J.G.2
Tapster, P.R.3
-
27
-
-
0034652057
-
Quantum key distribution over a 48km optical fibre network
-
Hughes R., Morgan G., and Peterson C. Quantum key distribution over a 48km optical fibre network. J. Modern Opt. 47 (2000) 533-547
-
(2000)
J. Modern Opt.
, vol.47
, pp. 533-547
-
-
Hughes, R.1
Morgan, G.2
Peterson, C.3
-
28
-
-
0024716272
-
A universal compensator for polarization changes induced by birefringence on a retracing beam
-
Martinelli M. A universal compensator for polarization changes induced by birefringence on a retracing beam. Opt. Commun. 72 (1989) 341-344
-
(1989)
Opt. Commun.
, vol.72
, pp. 341-344
-
-
Martinelli, M.1
-
29
-
-
84862947674
-
Time reversal for the polarization state in optical systems
-
Martinelli M. Time reversal for the polarization state in optical systems. J. Modern Opt. 39 (1992) 451-455
-
(1992)
J. Modern Opt.
, vol.39
, pp. 451-455
-
-
Martinelli, M.1
-
30
-
-
77956690100
-
-
http://www.jdsu.com
-
-
-
-
31
-
-
0031076691
-
'Plug and play' systems for quantum cryptography
-
Muller A., Herzog T., Huttner B., Tittel W., Zbinden H., and Gisin N. 'Plug and play' systems for quantum cryptography. Applied Phys. Lett. 70 (1997) 793-795
-
(1997)
Applied Phys. Lett.
, vol.70
, pp. 793-795
-
-
Muller, A.1
Herzog, T.2
Huttner, B.3
Tittel, W.4
Zbinden, H.5
Gisin, N.6
-
32
-
-
0011769922
-
Quantum Key Distribution over 67 km with a plug & play system
-
Stucki D., Gisin N., Guinnard O., Ribordy G., and Zbinden H. Quantum Key Distribution over 67 km with a plug & play system. New Journal of Physics 4 (2002) 41.1-41.8
-
(2002)
New Journal of Physics
, vol.4
-
-
Stucki, D.1
Gisin, N.2
Guinnard, O.3
Ribordy, G.4
Zbinden, H.5
-
33
-
-
0033907404
-
An Autocompensating Fiber-Optic Quantum Cryptography System Based on Polarization Splitting of Light
-
Bethune D., and Risk W. An Autocompensating Fiber-Optic Quantum Cryptography System Based on Polarization Splitting of Light. IEEE J. Quantum Electron. 36 (2000) 340-347
-
(2000)
IEEE J. Quantum Electron.
, vol.36
, pp. 340-347
-
-
Bethune, D.1
Risk, W.2
-
34
-
-
0000418120
-
Experiments on long wavelength (1550nm) 'plug and play' quantum cryptography systems
-
Bourennane M., Gibson F., Karlsson A., Hening A., Jonsson P., Tsegaye T., Ljunggren D., and Sundberg E. Experiments on long wavelength (1550nm) 'plug and play' quantum cryptography systems. Opt. Express 4 (1999) 383-387
-
(1999)
Opt. Express
, vol.4
, pp. 383-387
-
-
Bourennane, M.1
Gibson, F.2
Karlsson, A.3
Hening, A.4
Jonsson, P.5
Tsegaye, T.6
Ljunggren, D.7
Sundberg, E.8
-
35
-
-
0347090658
-
Simple proof of security of the BB84 Quantum key distribution protocol
-
Shor P.W., and Preskill J. Simple proof of security of the BB84 Quantum key distribution protocol. Phys. Rev. Lett. 85 (2000) 441-444
-
(2000)
Phys. Rev. Lett.
, vol.85
, pp. 441-444
-
-
Shor, P.W.1
Preskill, J.2
-
36
-
-
0009956931
-
Unconditional security in quantum cryptography
-
(to be published); also quant-ph/9802025
-
(to be published); also quant-ph/9802025. Mayers D. Unconditional security in quantum cryptography. Journal for the Association of Computing Machinery (1998)
-
(1998)
Journal for the Association of Computing Machinery
-
-
Mayers, D.1
-
37
-
-
0033605546
-
Unconditional security of quantum key distribution over arbitrary long distances
-
also quant-ph/9803006
-
also quant-ph/9803006. Lo H.-K., and Chau H.F. Unconditional security of quantum key distribution over arbitrary long distances. Science 283 (1999) 2050-2056
-
(1999)
Science
, vol.283
, pp. 2050-2056
-
-
Lo, H.-K.1
Chau, H.F.2
-
39
-
-
0001817392
-
A local hidden variable model of quantum correlation exploiting the detection loophole
-
Gisin B., and Gisin N. A local hidden variable model of quantum correlation exploiting the detection loophole. Phys. Lett. A 260 (1999) 323-327
-
(1999)
Phys. Lett. A
, vol.260
, pp. 323-327
-
-
Gisin, B.1
Gisin, N.2
-
40
-
-
5344222062
-
Optimal Eavesdropping in Quantum Cryptography. I
-
Fuchs C.A., Gisin N., Griffiths R.B., Niu C.-S., and Peres A. Optimal Eavesdropping in Quantum Cryptography. I. Phys. Rev. A 56 (1997) 1163-1172
-
(1997)
Phys. Rev. A
, vol.56
, pp. 1163-1172
-
-
Fuchs, C.A.1
Gisin, N.2
Griffiths, R.B.3
Niu, C.-S.4
Peres, A.5
-
41
-
-
0347111146
-
Security against individual attacks for realistic quantum key distribution
-
Lütkenhaus N. Security against individual attacks for realistic quantum key distribution. Phys. Rev. A 61 (2000) 052304
-
(2000)
Phys. Rev. A
, vol.61
, pp. 052304
-
-
Lütkenhaus, N.1
-
42
-
-
0001293325
-
Incoherent and Coherent Eavesdropping in the 6-state Protocol of Quantum Cryptography
-
Bechmann-Pasquinucci H., and Gisin N. Incoherent and Coherent Eavesdropping in the 6-state Protocol of Quantum Cryptography. Phys. Rev. A 59 (1999) 4238-4248
-
(1999)
Phys. Rev. A
, vol.59
, pp. 4238-4248
-
-
Bechmann-Pasquinucci, H.1
Gisin, N.2
-
43
-
-
11544350211
-
Optimal eavesdropping in quantum cryptography with six states
-
Bruss D. Optimal eavesdropping in quantum cryptography with six states. Phys. Rev. Lett. 81 (1998) 3018-3021
-
(1998)
Phys. Rev. Lett.
, vol.81
, pp. 3018-3021
-
-
Bruss, D.1
-
45
-
-
0037171194
-
Optimal eavesdropping in cryptography with three-dimensional quantum states
-
Bruss D., and Macchiavello C. Optimal eavesdropping in cryptography with three-dimensional quantum states. Phys. Rev. Lett. 88 (2002) 127901
-
(2002)
Phys. Rev. Lett.
, vol.88
, pp. 127901
-
-
Bruss, D.1
Macchiavello, C.2
-
46
-
-
0037195657
-
Quantum Key Distribution using Multilevel Encoding: Security Analysis
-
Bourennane M., Karlsson A., Björn G., Gisin N., and Cerf N. Quantum Key Distribution using Multilevel Encoding: Security Analysis. J. Phys. A: Math. and Gen. 35 (2002) 10065-10076
-
(2002)
J. Phys. A: Math. and Gen.
, vol.35
, pp. 10065-10076
-
-
Bourennane, M.1
Karlsson, A.2
Björn, G.3
Gisin, N.4
Cerf, N.5
-
47
-
-
77956707792
-
Quantum and classical advantage distillation are not equivalent
-
quant-ph/0310144
-
D. Kaszlikowski, A. Gopinathan, Y. C. Liang, L. C. Kwek, B.-G. Englert, "Quantum and classical advantage distillation are not equivalent", quant-ph/0310144.
-
-
-
Kaszlikowski, D.1
Gopinathan, A.2
Liang, Y.C.3
Kwek, L.C.4
Englert, B.-G.5
-
48
-
-
0013237387
-
Unconditional Security of Practical Quantum Key Distribution
-
quant-ph/0107017
-
H. Inamori, N. Lütkenhaus and D. Mayers, "Unconditional Security of Practical Quantum Key Distribution", quant-ph/0107017.
-
-
-
Inamori, H.1
Lütkenhaus, N.2
Mayers, D.3
-
50
-
-
0037191433
-
Single photon quantum cryptography
-
Beveratos A., Brouri R., Gacoin T., Villing A., Poizat J.-P., and Grangier P. Single photon quantum cryptography. Phys. Rev. Lett. 89 (2002) 187901
-
(2002)
Phys. Rev. Lett.
, vol.89
, pp. 187901
-
-
Beveratos, A.1
Brouri, R.2
Gacoin, T.3
Villing, A.4
Poizat, J.-P.5
Grangier, P.6
-
51
-
-
0037180773
-
Secure communication: Quantum cryptography with a photon turnstile
-
Waks E., Inoue K., Santori C., Fattal D., Vuckovic J., Solomon G.S., and Yamamoto Y. Secure communication: Quantum cryptography with a photon turnstile. Nature 420 (2002) 762
-
(2002)
Nature
, vol.420
, pp. 762
-
-
Waks, E.1
Inoue, K.2
Santori, C.3
Fattal, D.4
Vuckovic, J.5
Solomon, G.S.6
Yamamoto, Y.7
-
53
-
-
77956669660
-
Coherent pulse implementations of quantum cryptography protocols resistant to photon number splitting attacks, quant-ph/0302037, accepted in Phys
-
A. Acin, V. Scarani and N. Gisin, "Coherent pulse implementations of quantum cryptography protocols resistant to photon number splitting attacks", quant-ph/0302037, accepted in Phys. Rev. A.
-
Rev. A
-
-
Acin, A.1
Scarani, V.2
Gisin, N.3
-
54
-
-
77956708402
-
Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulses implementations, quant-ph/0211131, submitted to Phys
-
V. Scarani, A. Acin, G. Ribordy and N. Gisin, "Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulses implementations", quant-ph/0211131, submitted to Phys. Rev. Lett.
-
Rev. Lett
-
-
Scarani, V.1
Acin, A.2
Ribordy, G.3
Gisin, N.4
|