-
1
-
-
4243059985
-
Tele-porting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels
-
C. H. Bennett, G. Brassard, C. Cŕepeau, R. Jozsa, A. Peres, and W. K. Wootters (1993), Tele-porting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels, Phys. Rev. Lett., vol. 70, no. 13, pp. 1895-1899.
-
(1993)
Phys. Rev. Lett
, vol.70
, Issue.13
, pp. 1895-1899
-
-
Bennett, C.H.1
Brassard, G.2
Cŕepeau, C.3
Jozsa, R.4
Peres, A.5
Wootters, W.K.6
-
2
-
-
0034505624
-
Private quantum channels
-
A. Ambainis, M. A. Mosca, A. Tapp, and R. de Wolf (2000), Private quantum channels, in Proc. IEEE Symposium on Foundations of Computer Science, pp. 547-553.
-
(2000)
Proc. IEEE Symposium on Foundations of Computer Science
, pp. 547-553
-
-
Ambainis, A.1
Mosca, M.A.2
Tapp, A.3
de Wolf, R.4
-
3
-
-
17444433364
-
Optimal encryption of quantum bits
-
P. O. Boykin and V. Roychowdhury (2003), Optimal encryption of quantum bits, Phys. Rev. A, vol. 67, 042317.
-
(2003)
Phys. Rev. A
, vol.67
, pp. 042317
-
-
Boykin, P.O.1
Roychowdhury, V.2
-
4
-
-
33646411010
-
Quantum cryptography: Public key distribution and coin tossing
-
C. H. Bennett and G. Brassard (1984), Quantum cryptography: public key distribution and coin tossing, in Proc. IEEE International Conference on Computers, Systems, and Signal Processing, pp. 175-179.
-
(1984)
, pp. 175-179
-
-
Bennett, C.H.1
Brassard, G.2
-
5
-
-
0347090658
-
Simple proof of security of the BB84 quantum key distribution protocol
-
P. W. Shor and J. Preskill (2000), Simple proof of security of the BB84 quantum key distribution protocol, Phys. Rev. Lett., vol. 85, no. 2, pp. 441-444.
-
(2000)
Phys. Rev. Lett
, vol.85
, Issue.2
, pp. 441-444
-
-
Shor, P.W.1
Preskill, J.2
-
7
-
-
24944548357
-
Computational indistinguisha-bility between quantum states and its cryptographic application, in Advances
-
(LNCS 3494)
-
A. Kawachi, T. Koshiba, H. Nishimura, and T. Yamakami (2005), Computational indistinguisha-bility between quantum states and its cryptographic application, in Advances in Cryptology-EUROCRYPT 2005 (LNCS 3494), pp. 268-284.
-
(2005)
Cryptology-EUROCRYPT 2005
, pp. 268-284
-
-
Kawachi, A.1
Koshiba, T.2
Nishimura, H.3
Yamakami, T.4
-
8
-
-
41549130702
-
Applications of single-qubit rotations in quantum public-key cryptog-raphy
-
G. M. Nikolopoulos (2008), Applications of single-qubit rotations in quantum public-key cryptog-raphy, Phys. Rev. A, vol. 77, 032348.
-
(2008)
Phys. Rev. A
, vol.77
, pp. 032348
-
-
Nikolopoulos, G.M.1
-
9
-
-
84858019774
-
-
e-print arXiv:1012.5249v1
-
Li Yang, Min Liang, Bao Li, Lei Hu, and Deng-Guo Feng (2010), Quantum public-key cryptosystems based on induced trapdoor one-way transformations, e-print arXiv:1012.5249v1.
-
(2010)
Quantum Public-key Cryptosystems Based On Induced Trapdoor One-way Transformations
-
-
Li, Y.1
Liang, M.2
Li, B.3
Lei, H.4
Feng, D.-G.5
-
11
-
-
4243807288
-
Quantum mechanics helps in searching for a needle in a haystack
-
L. K. Grover (1997), Quantum mechanics helps in searching for a needle in a haystack, Phys. Rev. Lett., vol. 79, no. 2, pp. 325-328.
-
(1997)
Phys. Rev. Lett
, vol.79
, Issue.2
, pp. 325-328
-
-
Grover, L.K.1
-
13
-
-
0022582790
-
Knapsack-type cryptosystems and algebraic coding theory
-
H. Niederreiter (1986), Knapsack-type cryptosystems and algebraic coding theory, Problems of Control and Information Theory, vol. 15, no. 2, pp. 159-166.
-
(1986)
Problems of Control and Information Theory
, vol.15
, Issue.2
, pp. 159-166
-
-
Niederreiter, H.1
-
14
-
-
84858691417
-
A summary of McEliece-type cryptosystems and their security
-
D. Engelbert, R. Overbeck, and A. Schmidt (2007), A summary of McEliece-type cryptosystems and their security, J. Math. Crypt., vol. 1, pp. 151-199.
-
(2007)
J. Math. Crypt
, vol.1
, pp. 151-199
-
-
Engelbert, D.1
Overbeck, R.2
Schmidt, A.3
-
15
-
-
77954400700
-
Code-based cryptography
-
in [41]
-
R. Overbeck and N. Sendrier (2009), Code-based cryptography, in [41].
-
(2009)
-
-
Overbeck, R.1
Sendrier, N.2
-
16
-
-
0017973512
-
On the inherent intractability of certain coding problems
-
E. R. Berlekamp, R. J. McEliece, and H. C. van Tilborg (1978), On the inherent intractability of certain coding problems, IEEE Transactions on Information Theory, vol. 24, no. 3, pp. 384-386.
-
(1978)
IEEE Transactions on Information Theory
, vol.24
, Issue.3
, pp. 384-386
-
-
Berlekamp, E.R.1
McEliece, R.J.2
van Tilborg, H.C.3
-
17
-
-
0028294826
-
On the equivalence of McEliece's and Niederreiter's public-key cryptosytems
-
Y. X. Li, R. H. Deng, and X. M. Wang (1994), On the equivalence of McEliece's and Niederreiter's public-key cryptosytems, IEEE Transactions on Information Theory, vol. 40, no. 1, pp. 271-273.
-
(1994)
IEEE Transactions on Information Theory
, vol.40
, Issue.1
, pp. 271-273
-
-
Li, Y.X.1
Deng, R.H.2
Wang, X.M.3
-
18
-
-
0003932204
-
Stabilizer codes and quantum error correction
-
Ph.D. thesis, Caltech. Available at
-
D. Gottesman (1997), Stabilizer Codes and Quantum Error Correction, Ph.D. thesis, Caltech. Available at http://arxiv.org/abs/quant-ph/9705052.
-
(1997)
-
-
Gottesman, D.1
-
19
-
-
0032121784
-
Quantum error correction via codes over GF(4)
-
A. R. Calderbank, E. M. Rains, P. W. Shor, and N. J. A. Sloane (1998), Quantum error correction via codes over GF(4), IEEE Transactions on Information Theory, vol. 44, no. 4, pp. 1369-1387.
-
(1998)
IEEE Transactions on Information Theory
, vol.44
, Issue.4
, pp. 1369-1387
-
-
Calderbank, A.R.1
Rains, E.M.2
Shor, P.W.3
Sloane, N.J.A.4
-
21
-
-
0010154970
-
Efficient computations of encodings for quantum error correction
-
R. Cleve and D. Gottesman (1997), Efficient computations of encodings for quantum error correction, Phys. Rev. A, vol. 56, 76-82.
-
(1997)
Phys. Rev. A
, vol.56
, pp. 76-82
-
-
Cleve, R.1
Gottesman, D.2
-
22
-
-
79961063895
-
NP-hardness of decoding quantum error correction codes
-
Min-Hsiu Hsieh and Francois Le Gall (2011), NP-hardness of decoding quantum error correction codes, Phys. Rev. A, vol. 83, 052331.
-
(2011)
Phys. Rev. A
, vol.83
, pp. 052331
-
-
Hsieh, M.-H.1
le Gall, F.2
-
23
-
-
0001398327
-
Good quantum error-correcting codes exist
-
A. R. Calderbank and P. W. Shor (1996), Good quantum error-correcting codes exist, Phys. Rev. A, vol. 54, no. 2, pp. 1098-1105.
-
(1996)
Phys. Rev. A
, vol.54
, Issue.2
, pp. 1098-1105
-
-
Calderbank, A.R.1
Shor, P.W.2
-
24
-
-
0007244732
-
Multiple particle interference and quantum error correction
-
A. M. Steane (1996), Multiple particle interference and quantum error correction, Proc. Roy. Soc. Lond. A, vol. 452, pp. 2551-2577.
-
(1996)
Proc. Roy. Soc. Lond. A
, vol.452
, pp. 2551-2577
-
-
Steane, A.M.1
-
25
-
-
84892733534
-
Efficient quantum circuits for non-qubit quantum error-correcting codes
-
M. Grassl, M. Rötteler, and T. Beth (2003), Efficient quantum circuits for non-qubit quantum error-correcting codes, International Journal of Fundations of Computer Science, vol. 14, no. 5, pp. 757-775.
-
(2003)
International Journal of Fundations of Computer Science
, vol.14
, Issue.5
, pp. 757-775
-
-
Grassl, M.1
Rötteler, M.2
Beth, T.3
-
27
-
-
84937740421
-
Shift-register synthesis and BCH decoding
-
J. L. Massey (1969), Shift-register synthesis and BCH decoding, IEEE Transactions on Information Theory, vol. 15, no. 1, pp. 122-127.
-
(1969)
IEEE Transactions on Information Theory
, vol.15
, Issue.1
, pp. 122-127
-
-
Massey, J.L.1
-
28
-
-
84929257781
-
On insecurity of cryptosystems based on generalized Reed-Solomon codes
-
V. M. Sidelnikov and S. O. Shestakov (1992), On insecurity of cryptosystems based on generalized Reed-Solomon codes, Discrete Mathematics and Applications, vol. 2, no. 4, pp. 439-444.
-
(1992)
Discrete Mathematics and Applications
, vol.2
, Issue.4
, pp. 439-444
-
-
Sidelnikov, V.M.1
Shestakov, S.O.2
-
29
-
-
84958666890
-
Failure of the McEliece public-key cryptosystem under message-resend and related-message attack
-
T. Berson (1997), Failure of the McEliece public-key cryptosystem under message-resend and related-message attack, in Advances in Cryptology-CRYPTO '97 (LNCS 1294), pp. 213-220.
-
(1997)
Advances in Cryptology-CRYPTO '97 (LNCS 1294)
, pp. 213-220
-
-
Berson, T.1
-
31
-
-
80052017185
-
Security-related comments regarding McEliece's public-key cryptosystem
-
C. M. Adams and H. Meijer (1988), Security-related comments regarding McEliece's public-key cryptosystem, in Advances in Cryptology-CRYPTO '87 (LNCS 293), pp. 224-228.
-
(1988)
Advances in Cryptology-CRYPTO '87 (LNCS 293)
, pp. 224-228
-
-
Adams, C.M.1
Meijer, H.2
-
33
-
-
0024078914
-
A probabilistic algorithm for computing minimum weights of large error-correcting codes
-
J. S. Leon (1988), A probabilistic algorithm for computing minimum weights of large error-correcting codes, IEEE Transactions on Information Theory, vol. 34, pp. 1354-1359.
-
(1988)
IEEE Transactions on Information Theory
, vol.34
, pp. 1354-1359
-
-
Leon, J.S.1
-
34
-
-
84964937021
-
A method for finding codewords of small weight
-
J. Stern (1989), A method for finding codewords of small weight, in Coding Theory and Applications (LNCS 388), pp. 106-113.
-
(1989)
Coding Theory and Applications (LNCS 388)
, pp. 106-113
-
-
Stern, J.1
-
35
-
-
84948963042
-
On the security of some cryptosystems based on error-correcting codes
-
F. Chabaud (1995), on the security of some cryptosystems based on error-correcting codes, in Advances in Cryptology-EUROCRYPT '94 (LNCS 950), pp. 131-139.
-
(1995)
Advances in Cryptology-EUROCRYPT '94 (LNCS 950)
, pp. 131-139
-
-
Chabaud, F.1
-
36
-
-
0031675932
-
A new algorithm for finding minimum-weight words in a linear code: Application to primitive narrow-sense BCH-codes of length 511
-
A. Canteaut and F. Chabaut (1998), A new algorithm for finding minimum-weight words in a linear code: Application to primitive narrow-sense BCH-codes of length 511, IEEE Transactions on Information Theory, vol. 44, no. 1, pp. 367-378.
-
(1998)
IEEE Transactions on Information Theory
, vol.44
, Issue.1
, pp. 367-378
-
-
Canteaut, A.1
Chabaut, F.2
-
40
-
-
0142051871
-
Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer
-
Peter W. Shor (1997), Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer, SIAM Journal on Computing, vol. 26, pp. 1484-1509.
-
(1997)
SIAM Journal on Computing
, vol.26
, pp. 1484-1509
-
-
Shor, P.W.1
-
44
-
-
19844363007
-
A public-key cryptosystem for quantum message transmission
-
and see also e-print arXiv:quant-ph/0310076
-
L. Yang (2005), A public-key cryptosystem for quantum message transmission, Proceedings of the SPIE 5631(1), pp. 233-236 and see also e-print arXiv:quant-ph/0310076.
-
(2005)
Proceedings of the SPIE
, vol.5631
, Issue.1
, pp. 233-236
-
-
Yang, L.1
-
45
-
-
84957679077
-
Quantum Reed-Solomon codes
-
M. Grassl, W. Geiselmann, and T. Beth (1999), Quantum Reed-Solomon codes, in Applied Algebra, Algebraic Algorithms and Error-Correcting Codes (LNCS 1719), pp. 231-244.
-
(1999)
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes (LNCS 1719)
, pp. 231-244
-
-
Grassl, M.1
Geiselmann, W.2
Beth, T.3
|