-
1
-
-
0036013605
-
-
0034-6861, 10.1103/RevModPhys.74.145
-
N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden, Rev. Mod. Phys. 0034-6861 74, 145 (2002). 10.1103/RevModPhys.74.145
-
(2002)
Rev. Mod. Phys.
, vol.74
, pp. 145
-
-
Gisin, N.1
Ribordy, G.2
Tittel, W.3
Zbinden, H.4
-
2
-
-
0034689102
-
-
0950-0340, 10.1080/09500340008233380
-
A. Stefanov, N. Gisin, O. Guinnard, L. Guinnard, and H. Zbinden, J. Mod. Opt. 0950-0340 47, 595 (2000). 10.1080/09500340008233380
-
(2000)
J. Mod. Opt.
, vol.47
, pp. 595
-
-
Stefanov, A.1
Gisin, N.2
Guinnard, O.3
Guinnard, L.4
Zbinden, H.5
-
3
-
-
67651146510
-
-
0950-0340, 10.1080/09500340802553244
-
M. A. Wayne, E. R. Jeffrey, G. M. Akselrod, and P. G. Kwiat, J. Mod. Opt. 0950-0340 56, 0516 (2009). 10.1080/09500340802553244
-
(2009)
J. Mod. Opt.
, vol.56
, pp. 0516
-
-
Wayne, M.A.1
Jeffrey, E.R.2
Akselrod, G.M.3
Kwiat, P.G.4
-
4
-
-
77953607020
-
-
1094-4087, 10.1364/OE.18.013029
-
M. Fürst, H. Weier, S. Nauerth, D. G. Marangon, C. Kurtsiefer, and H. Weinfurter, Opt. Express 1094-4087 18, 13029 (2010). 10.1364/OE.18.013029
-
(2010)
Opt. Express
, vol.18
, pp. 13029
-
-
Fürst, M.1
Weier, H.2
Nauerth, S.3
Marangon, D.G.4
Kurtsiefer, C.5
Weinfurter, H.6
-
5
-
-
77952020607
-
-
1094-4087, 10.1364/OE.18.009351
-
M. A. Wayne and P. G. Kwiat, Opt. Express 1094-4087 18, 9351 (2010). 10.1364/OE.18.009351
-
(2010)
Opt. Express
, vol.18
, pp. 9351
-
-
Wayne, M.A.1
Kwiat, P.G.2
-
6
-
-
58149237483
-
-
0034-6748, 10.1063/1.3055912
-
M. Wahl, H. -J. Rahn, T. Röhlicke, G. Kell, D. Nettels, F. Hillger, B. Schuler, and R. Erdmann, Rev. Sci. Instrum. 0034-6748 79, 123113 (2008). 10.1063/1.3055912
-
(2008)
Rev. Sci. Instrum.
, vol.79
, pp. 123113
-
-
Wahl, M.1
Rahn, H.-J.2
Röhlicke, T.3
Kell, G.4
Nettels, D.5
Hillger, F.6
Schuler, B.7
Erdmann, R.8
-
7
-
-
70349860117
-
-
(Springer, Berlin), Vol.
-
S. K. Sanadhya and P. Sarkar, Information Security and Privacy Lecture Notes in Computer Science (Springer, Berlin, 2008), Vol. 5107, pp. 254-266.
-
(2008)
Information Security and Privacy Lecture Notes in Computer Science
, vol.5107
, pp. 254-266
-
-
Sanadhya, S.K.1
Sarkar, P.2
-
8
-
-
79955687335
-
-
(Springer, Berlin), Vol.
-
S. Indesteege, F. Mendel, B. Preneel, and C. Rechberger, Selected Areas in Cryptography Lecture Notes in Computer Science (Springer, Berlin, 2009), Vol. 5381.
-
(2009)
Selected Areas in Cryptography Lecture Notes in Computer Science
, vol.5381
-
-
Indesteege, S.1
Mendel, F.2
Preneel, B.3
Rechberger, C.4
-
9
-
-
0022198802
-
-
Proceedings of the IEEE Annual Symposium on Foundations of Computer Science, (IEEE, Los Alamitos, CA)
-
B. Chor, O. Goldreich, J. Hasted, J. Freidmann, S. Rudich, and R. Smolensky, Proceedings of the IEEE Annual Symposium on Foundations of Computer Science, (IEEE, Los Alamitos, CA, 1985), pp. 396-407.
-
(1985)
, pp. 396-407
-
-
Chor, B.1
Goldreich, O.2
Hasted, J.3
Freidmann, J.4
Rudich, S.5
Smolensky, R.6
-
10
-
-
85008060937
-
-
0018-9340, 10.1109/TC.2007.250627
-
B. Sunar, W. J. Martin, and D. R. Stinson, IEEE Trans. Comput. 0018-9340 56, 109 (2007). 10.1109/TC.2007.250627
-
(2007)
IEEE Trans. Comput.
, vol.56
, pp. 109
-
-
Sunar, B.1
Martin, W.J.2
Stinson, D.R.3
-
12
-
-
50249087449
-
-
Proceedings of FSE (Springer, Berlin)
-
P. Lacharme, Proceedings of FSE (Springer, Berlin, 2008), pp. 334-342.
-
(2008)
, pp. 334-342
-
-
Lacharme, P.1
-
13
-
-
70349620392
-
-
0018-9448, 10.1109/TIT.2009.2027483
-
P. Lacharme, IEEE Trans. Inf. Theory 0018-9448 55, 4742 (2009). 10.1109/TIT.2009.2027483
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, pp. 4742
-
-
Lacharme, P.1
-
14
-
-
79955690002
-
-
Proceedings of FPL, 23 September.
-
D. B. Thomas and W. Luk, Proceedings of FPL, 23 September 2008.
-
(2008)
-
-
Thomas, D.B.1
Luk, W.2
-
15
-
-
79955698268
-
-
Further detection during the dead time does not change the length of the dead time.
-
Further detection during the dead time does not change the length of the dead time.
-
-
-
-
16
-
-
79955682331
-
-
Data extracted with 8 bits actually passed statistical testing and resulted in a bitrate of 76 Mbit/s.
-
Data extracted with 8 bits actually passed statistical testing and resulted in a bitrate of 76 Mbit/s.
-
-
-
-
18
-
-
79955687185
-
-
For critical cryptographic applications the resilient function may be chosen with higher compression to limit the extracted number of bits per photon to min-entropy, 14.6 bits in our case.
-
For critical cryptographic applications the resilient function may be chosen with higher compression to limit the extracted number of bits per photon to min-entropy, 14.6 bits in our case.
-
-
-
-
19
-
-
34548237327
-
TestU01: A C library for empirical testing of random number generators
-
DOI 10.1145/1268776.1268777
-
P. L'Ecuyer and R. Simard, ACM Trans. Math. Softw. 0098-3500 33, 22 (2007). 10.1145/1268776.1268777 (Pubitemid 47330739)
-
(2007)
ACM Transactions on Mathematical Software
, vol.33
, Issue.4
, pp. 1268777
-
-
L'ecuyer, P.1
Simard, R.2
-
20
-
-
79955683672
-
-
For bitrates of other QRNGs, see.
-
For bitrates of other QRNGs, see http://qrbg.irb.hr/, http://www.qutools.com/products/quRNG/index.php?page=3, http://www.idquantique. com/ordering/shop.html.
-
-
-
|