-
2
-
-
4544351377
-
Experimental open-air quantum key distribution with a single-photon source
-
R., Alléaume, F., Treussart, G., Messin et al., Experimental open-air quantum key distribution with a single-photon source, New J. Phys. 6, 92 (2004).
-
(2004)
New J. Phys
, vol.6
, pp. 92
-
-
Alléaume, R.1
Treussart, F.2
Messin, G.3
-
5
-
-
0016037512
-
Optimal decoding of linear codes for minimizing symbol error rate
-
L., R. Bahl, J., Cocke, F., Jelinek and J., Raviv, Optimal decoding of linear codes for minimizing symbol error rate, IEEE Trans. Inform. Theory IT-20, 284-287 (1974).
-
(1974)
IEEE Trans. Inform. Theory IT
, vol.20
, pp. 284-287
-
-
R. Bahl, L.1
Cocke, J.2
Jelinek, F.3
Raviv, J.4
-
6
-
-
84925092204
-
Analog speech security systems
-
Lecture Notes in Computer Science
-
H., J. Beker, Analog speech security systems, Advances in Cryptology - Eurocrypt ’82, Lecture Notes in Computer Science, 130-146 (1982).
-
(1982)
Advances in Cryptology - Eurocrypt
, vol.82
, pp. 130-146
-
-
J. Beker, H.1
-
7
-
-
0002757750
-
Keying hash functions for message authentication
-
Lecture Notes in Computer Science
-
M., Bellare, R., Canetti and H., Krawczyk, Keying hash functions for message authentication, Advances in Cryptology – Crypto.‘96, Lecture Notes in Computer Science, 1-15 (1996).
-
(1996)
Advances in Cryptology – Crypto
, vol.96
, pp. 1-15
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
8
-
-
24144445587
-
The universal composable security of quantum key distribution
-
M., Ben-Or, M., Horodecki, D., W. Leung, D., Mayers and J., Oppenheim, The universal composable security of quantum key distribution, Proc. Second Theory of Cryptography Conf. (TCC), 386-406 (2005).
-
(2005)
Proc. Second Theory of Cryptography Conf. (TCC)
, pp. 386-406
-
-
Ben-Or, M.1
Horodecki, M.2
W. Leung, D.3
Mayers, D.4
Oppenheim, J.5
-
9
-
-
0035841904
-
Quantum key distribution with continuous variables
-
K., Bencheikh, T., Symul, A., Jankovic and J.-A., Levenson, Quantum key distribution with continuous variables, J. Mod. Opt. 48, 1903-1920 (2001).
-
(2001)
J. Mod. Opt
, vol.48
, pp. 1903-1920
-
-
Bencheikh, K.1
Symul, T.2
Jankovic, A.3
Levenson, J.-A.4
-
10
-
-
0003259517
-
Public-key distribution and coin tossing
-
C., H. Bennett and G., Brassard, Public-key distribution and coin tossing, Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, India, 175-179 (1984).
-
(1984)
Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, India
, pp. 175-179
-
-
H. Bennett, C.1
Brassard, G.2
-
11
-
-
0023985539
-
Privacy amplification by public discussion
-
C., H. Bennett, G., Brassard and J., Robert, Privacy amplification by public discussion, Si Am J. Comput. 17, 210-229 (1988).
-
(1988)
Siam J. Comput
, vol.17
, pp. 210-229
-
-
H. Bennett, C.1
Brassard, G.2
Robert, J.3
-
12
-
-
0002977948
-
Quantum cryptography
-
C., H. Bennett, G., Brassard and A., K. Ekert, Quantum cryptography, Sci. Am. 267, 50-57 (1992).
-
(1992)
Sci. Am
, vol.267
, pp. 50-57
-
-
H. Bennett, C.1
Brassard, G.2
K. Ekert, A.3
-
13
-
-
0026626314
-
Experimental quantum cryptography
-
C., H. Bennett, F., Bessette, G., Brassard, L., Salvail and J., Smolin, Experimental quantum cryptography, J. Cryptol. 5, 3-28 (1992).
-
(1992)
J. Cryptol
, vol.5
, pp. 3-28
-
-
H. Bennett, C.1
Bessette, F.2
Brassard, G.3
Salvail, L.4
Smolin, J.5
-
14
-
-
11944254075
-
Quantum cryptography using any two non-orthogonal states
-
C., H. Bennett, Quantum cryptography using any two non-orthogonal states, Phys. Rev. Lett. 68, 3121-3124 (1992).
-
(1992)
Phys. Rev. Lett
, vol.68
, pp. 3121-3124
-
-
H. Bennett, C.1
-
15
-
-
0029405656
-
Generalized privacy amplification
-
C., H. Bennett, G., Brassard, C., Crepeau and U., M. Maurer, Generalized privacy amplification, IEEE Trans. Inform. Theory 41, 1915-1923 (1995).
-
(1995)
IEEE Trans. Inform. Theory
, vol.41
, pp. 1915-1923
-
-
H. Bennett, C.1
Brassard, G.2
Crepeau, C.3
M. Maurer, U.4
-
16
-
-
4243789313
-
Purification of noisy entanglement and faithful teleportation via noisy channels
-
C., H. Bennett, G., Brassard, S., Popescu et al., Purification of noisy entanglement and faithful teleportation via noisy channels, Phys. Rev. Lett. 76, 722-725 (1996).
-
(1996)
Phys. Rev. Lett
, vol.76
, pp. 722-725
-
-
H. Bennett, C.1
Brassard, G.2
Popescu, S.3
-
18
-
-
0037139035
-
Enhanced autocompensating quantum cryptography system
-
D. S. Bethune, M. Navarro and W. P. Risk, Enhanced autocompensating quantum cryptography system, Appl. Opt. LP 41, 1640-1648 (2002).
-
(2002)
Appl. Opt. LP
, vol.41
, pp. 1640-1648
-
-
Bethune, D.S.1
Navarro, M.2
Risk, W.P.3
-
19
-
-
0037191433
-
Single photon quantum cryptography
-
A. Beveratos, R. Brouri, T. Gacoin et al., Single photon quantum cryptography, Phys. Rev. Lett. 89, 187-901 (2002).
-
(2002)
Phys. Rev. Lett
, vol.89
, pp. 187-901
-
-
Beveratos, A.1
Brouri, R.2
Gacoin, T.3
-
20
-
-
84903595110
-
Differential cryptanalysis of des-like cryptosystems
-
Lecture Notes in Computer Science
-
E. Biham and A. Shamir, Differential cryptanalysis of DES-like cryptosystems, Advances in Cryptology – Crypto.‘90, Lecture Notes in Computer Science, 2-21 (1990).
-
(1990)
Advances in Cryptology – Crypto
, vol.90
, pp. 2-21
-
-
Biham, E.1
Shamir, A.2
-
21
-
-
0026397734
-
Differential cryptanalysis of des-like cryptosystems
-
E. Biham and A. Shamir, Differential cryptanalysis of DES-like cryptosystems, J. Cryptol. 4, 3-72 (1991).
-
(1991)
J. Cryptol
, vol.4
, pp. 3-72
-
-
Biham, E.1
Shamir, A.2
-
22
-
-
0002683004
-
Differential cryptanalysis of the full 16-round des
-
Lecture Notes in Computer Science
-
E. Biham and A. Shamir, Differential cryptanalysis of the full 16-round DES, Advances in Cryptology – Crypto 92, Lecture Notes in Computer Science, 494-502 (1992).
-
(1992)
Advances in Cryptology – Crypto
, vol.92
, pp. 494-502
-
-
Biham, E.1
Shamir, A.2
-
23
-
-
0033702887
-
A proof of the security of quantum key distribution
-
E. Biham, M. Boyer, P. O. Boykin, T. Mor and V. Roychowdhury, A proof of the security of quantum key distribution, Proc. of the 32nd Annual ACM Symp. on Theory of Computing, 715-724 (1999).
-
(1999)
Proc. Of the 32Nd Annual ACM Symp. On Theory Of Computing
, pp. 715-724
-
-
Biham, E.1
Boyer, M.2
Boykin, P.O.3
Mor, T.4
Roychowdhury, V.5
-
24
-
-
84957068240
-
Umac: Fast and secure message authentication
-
Lecture Notes in Computer Science
-
J. Black, S. Halevi, H. Krawczyk, T. Krovetz and P. Rogaway, UMAC: fast and secure message authentication, Advances in Cryptology – Crypto.‘99, Lecture Notes in Computer Science, 216-233 (1999).
-
(1999)
Advances in Cryptology – Crypto
, vol.99
, pp. 216-233
-
-
Black, J.1
Halevi, S.2
Krawczyk, H.3
Krovetz, T.4
Rogaway, P.5
-
25
-
-
33947271684
-
Efficient reconciliation of correlated continuous random variables using ldpc codes
-
cs.IT/0509041
-
M. Bloch, A. Thangaraj and S. W. McLaughlin, Efficient reconciliation of correlated continuous random variables using LDPC codes, arXiv e-print cs.IT/0509041 (2005).
-
(2005)
Arxiv E-Print
-
-
Bloch, M.1
Thangaraj, A.2
McLaughlin, S.W.3
-
26
-
-
0000418120
-
Experiments on long- wavelength (1550 nm) ‘plug and play’ quantum cryptography systems
-
M. Bourennane, F. Gibson, A. Karlsson et al., Experiments on long- wavelength (1550 nm) ‘plug and play’ quantum cryptography systems, Opt. Express 4, 383-387 (1999).
-
(1999)
Opt. Express
, vol.4
, pp. 383-387
-
-
Bourennane, M.1
Gibson, F.2
Karlsson, A.3
-
27
-
-
85027496257
-
Secret-key reconciliation by public discussion
-
Lecture Notes in Computer Science
-
G. Brassard and L. Salvail, Secret-key reconciliation by public discussion, Advances in Cryptology – Eurocrypt.‘93, Lecture Notes in Computer Science, 410-423 (1993).
-
(1993)
Advances in Cryptology – Eurocrypt
, vol.93
, pp. 410-423
-
-
Brassard, G.1
Salvail, L.2
-
28
-
-
0038129641
-
A fast algorithm for testing reducibility of trinomials mod 2 and some new primitive trinomials of degree 3021377
-
B. P. Brent, S. Larvala and P. Zimmermann, A fast algorithm for testing reducibility of trinomials mod 2 and some new primitive trinomials of degree 3021377, Math. Comp. 72, 1443-1452 (2003).
-
(2003)
Math. Comp
, vol.72
, pp. 1443-1452
-
-
Brent, B.P.1
Larvala, S.2
Zimmermann, P.3
-
30
-
-
0000354712
-
Phase covariant quantum cloning
-
D. Brub, M. Cinchetti, G. M. D’Ariano and C. Macchiavello, Phase covariant quantum cloning, Phys. Rev. A 62, 012-302 (2000).
-
(2000)
Phys. Rev. A
, vol.62
, pp. 012-302
-
-
Brub, D.1
Cinchetti, M.2
D’Ariano, G.M.3
Macchiavello, C.4
-
31
-
-
0038783533
-
Fast, efficient error reconciliation for quantum cryptography
-
W. T. Buttler, S. K. Lamoreaux, J. R. Torgerson et al., Fast, efficient error reconciliation for quantum cryptography, Phys. Rev. A 67, 052-303 (2003).
-
(2003)
Phys. Rev. A
, vol.67
, pp. 052-303
-
-
Buttler, W.T.1
Lamoreaux, S.K.2
Torgerson, J.R.3
-
33
-
-
0024627773
-
Multilevel codes and multistage decoding
-
A. R. Calderbank, Multilevel codes and multistage decoding, IEEE Trans. Inform. Theory 37, 222-229 (1989).
-
(1989)
IEEE Trans. Inform. Theory
, vol.37
, pp. 222-229
-
-
Calderbank, A.R.1
-
34
-
-
0001398327
-
Good quantum error-correcting codes exist
-
A. R. Calderbank and P. W. Shor, Good quantum error-correcting codes exist, Phys. Rev. A 54, 1098-1105 (1996).
-
(1996)
Phys. Rev. A
, vol.54
, pp. 1098-1105
-
-
Calderbank, A.R.1
Shor, P.W.2
-
39
-
-
0034245761
-
Cloning of continuous quantum variables
-
N., J. Cerf, A., Ipe and X., Rottenberg, Cloning of continuous quantum variables, Phys. Rev. Lett. 85, 1754-1757 (2000).
-
(2000)
Phys. Rev. Lett
, vol.85
, pp. 1754-1757
-
-
J. Cerf, N.1
Ipe, A.2
Rottenberg, X.3
-
40
-
-
0035332232
-
Quantum distribution of gaussian keys using squeezed states
-
N., J. Cerf, M., Levy and G., Van Assche, Quantum distribution of Gaussian keys using squeezed states, Phys. Rev. A 63, 052-311 (2001).
-
(2001)
Phys. Rev. A
, vol.63
, pp. 052-311
-
-
J. Cerf, N.1
Levy, M.2
Van Assche, G.3
-
41
-
-
28844492599
-
Extremal quantum cloning machines
-
G., Chiribella, G., M. D’Ariano, P., Perinotti and N., J. Cerf, Extremal quantum cloning machines, Phys. Rev. A 72, 042-336 (2005).
-
(2005)
Phys. Rev. A
, vol.72
, pp. 042-336
-
-
Chiribella, G.1
M. D’Ariano, G.2
Perinotti, P.3
J. Cerf, N.4
-
42
-
-
19844376567
-
A generic security proof for quantum key distribution
-
quant-ph/0402131
-
M., Christandl, R., Renner and A., Ekert, A generic security proof for quantum key distribution, ar Xiv e-print quant-ph/0402131 (2004).
-
(2004)
Arxiv E-Print
-
-
Christandl, M.1
Renner, R.2
Ekert, A.3
-
43
-
-
85032399740
-
-
TM, http://www.comscire.com/Products/J1000KU/(2005).
-
(2005)
Tm
-
-
-
44
-
-
0004116989
-
-
second edition, Cambridge, MA, MIT Press
-
T., H. Cormen, C., E. Leiserson, R., L. Rivest and C., Stein, Introduction to Algorithms, second edition, Cambridge, MA, MIT Press (2001).
-
(2001)
Introduction to Algorithms
-
-
H. Cormen, T.1
E. Leiserson, C.2
L. Rivest, R.3
Stein, C.4
-
45
-
-
84958765510
-
Cryptanalysis of block ciphers with overdefined systems of equations
-
Lecture Notes in Computer Science
-
N., T. Courtois and J., Pieprzyk, Cryptanalysis of block ciphers with overdefined systems of equations, Advances in Cryptology - Asiacrypt 2002, Lecture Notes in Computer Science, 267-287 (2002).
-
(2002)
Advances in Cryptology - Asiacrypt 2002
, pp. 267-287
-
-
T. Courtois, N.1
Pieprzyk, J.2
-
47
-
-
0004148969
-
-
P., Crescenzi, V., Kann, M., Halldorsson, M., Karpinski and G., Woeginger, A Compendium of NP Optimization Problems, http://www.nada.kth.se/∼viggo/problemlist/compendium.html (2005).
-
(2005)
A Compendium of NP Optimization Problems
-
-
Crescenzi, P.1
Kann, V.2
Halldorsson, M.3
Karpinski, M.4
Woeginger, G.5
-
48
-
-
0017973511
-
Broadcast channels with confidential messages
-
I., Csiszar and J., Körner, Broadcast channels with confidential messages, IEEE Trans. Inform. Theory 24, 339-348 (1978).
-
(1978)
IEEE Trans. Inform. Theory
, vol.24
, pp. 339-348
-
-
Csiszar, I.1
Körner, J.2
-
49
-
-
12044251580
-
Circuit implementation of synchronized chaos with applications to communications
-
K., M. Cuomo and A., V. Oppenheim, Circuit implementation of synchronized chaos with applications to communications, Phys. Rev. Lett. 71, 65-68 (1993).
-
(1993)
Phys. Rev. Lett
, vol.71
, pp. 65-68
-
-
M. Cuomo, K.1
V. Oppenheim, A.2
-
50
-
-
0039047093
-
Systematic and statistical errors in homodyne measurements of the density matrix
-
G., M. D’Ariano, C., Macchiavello and N., Sterpi, Systematic and statistical errors in homodyne measurements of the density matrix, Quantum Semiclass. Opt. 9, 929-939 (1997).
-
(1997)
Quantum Semiclass. Opt
, vol.9
, pp. 929-939
-
-
M. D’Ariano, G.1
Macchiavello, C.2
Sterpi, N.3
-
51
-
-
3042550970
-
Quantum tomography
-
G., M. D’Ariano, M., G. Paris and M., F. Sacchi, Quantum tomography, Adv. Imag. Elect. Phys. 128, 205-308 (2003).
-
(2003)
Adv. Imag. Elect. Phys
, vol.128
, pp. 205-308
-
-
M. D’Ariano, G.1
G. Paris, M.2
F. Sacchi, M.3
-
53
-
-
19544378326
-
Relating quantum privacy and quantum coherence: An operational approach
-
I., Devetak and A., Winter, Relating quantum privacy and quantum coherence: an operational approach, Phys. Rev. Lett. 93, 080-501 (2004).
-
(2004)
Phys. Rev. Lett
, vol.93
, pp. 080-501
-
-
Devetak, I.1
Winter, A.2
-
56
-
-
33947385649
-
Can quantum-mechanical description of physical reality be considered complete?
-
A., Einstein, B., Podolsky and N., Rosen, Can quantum-mechanical description of physical reality be considered complete?, Phys. Rev. 47, 777-780 (1935).
-
(1935)
Phys. Rev
, vol.47
, pp. 777-780
-
-
Einstein, A.1
Podolsky, B.2
Rosen, N.3
-
57
-
-
1242285756
-
Building the quantum network
-
C., Elliott, Building the quantum network, New J. Phys. 4, 46 (2002).
-
(2002)
New J. Phys
, vol.4
, pp. 46
-
-
Elliott, C.1
-
58
-
-
1242332560
-
Quantum cryptography in practice
-
C., Elliott, D., Pearson and G., Troxel, Quantum cryptography in practice, 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, 227-238 (2003).
-
(2003)
2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications
, pp. 227-238
-
-
Elliott, C.1
Pearson, D.2
Troxel, G.3
-
59
-
-
0034140877
-
Protecting secret keys with personal entropy
-
C., Ellison, C., Hall, R., Milbert and B., Schneier, Protecting secret keys with personal entropy, Future Gener. Comp. Syst. 16, 311-318 (2000).
-
(2000)
Future Gener. Comp. Syst
, vol.16
, pp. 311-318
-
-
Ellison, C.1
Hall, C.2
Milbert, R.3
Schneier, B.4
-
60
-
-
84925049140
-
-
Washington D.C., National Bureau of Standards, U.S. Department of Commerce
-
Federal Information Processing Standard (FIPS), Data Encryption Standard, Publication 46, Washington D.C., National Bureau of Standards, U.S. Department of Commerce (1977).
-
(1977)
Data Encryption Standard, Publication
, vol.46
-
-
-
61
-
-
5344222062
-
Optimal eavesdropping in quantum cryptography. I information bound and optimal strategy
-
C., A. Fuchs, N., Gisin, R., B. Griffiths, C.-S., Niu and A., Peres, Optimal eavesdropping in quantum cryptography. I Information bound and optimal strategy, Phys. Rev. A 56, 1163-1172 (1997).
-
(1997)
Phys. Rev. A
, vol.56
, pp. 1163-1172
-
-
A. Fuchs, C.1
Gisin, N.2
B. Griffiths, R.3
Niu, C.-S.4
Peres, A.5
-
64
-
-
0036013605
-
Quantum cryptography
-
N., Gisin, G., Ribordy, W., Tittel and H., Zbinden, Quantum cryptography, Rev. Mod. Phys. 74, 145-195 (2002).
-
(2002)
Rev. Mod. Phys
, vol.74
, pp. 145-195
-
-
Gisin, N.1
Ribordy, G.2
Tittel, W.3
Zbinden, H.4
-
65
-
-
33646373811
-
Trojan horse attacks on quantum key distribution systems
-
quant-ph/0507063
-
N., Gisin, S., Fasel, B., Kraus, H., Zbinden and G., Ribordy, Trojan horse attacks on quantum key distribution systems, ar Xiv e-print quant-ph/0507063 (2005).
-
(2005)
Arxiv E-Print
-
-
Gisin, N.1
Fasel, S.2
Kraus, B.3
Zbinden, H.4
Ribordy, G.5
-
66
-
-
2942611260
-
Quantum key distribution over 122 km of standard telecom fiber
-
Gobby, Z. L. Yuan and A., J. Shields, Quantum key distribution over 122 km of standard telecom fiber, Appl. Phys. Lett. 84, 3762-3864 (2004).
-
(2004)
Appl. Phys. Lett
, vol.84
, pp. 3762-3864
-
-
Gobby, Z.L.Y.1
J. Shields, A.2
-
68
-
-
0141771056
-
Secure quantum key distribution using squeezed states
-
D., Gottesman and J., Preskill, Secure quantum key distribution using squeezed states, Phys. Rev. A 63, 022-309 (2001).
-
(2001)
Phys. Rev. A
, vol.63
, pp. 022-309
-
-
Gottesman, D.1
Preskill, J.2
-
69
-
-
0037319628
-
Proof of security of quantum key distribution with two-way classical communications
-
D., Gottesman and H.-K., Lo, Proof of security of quantum key distribution with two-way classical communications, IEEE Trans. Inform. Theory 49, 457-475 (2003).
-
(2003)
IEEE Trans. Inform. Theory
, vol.49
, pp. 457-475
-
-
Gottesman, D.1
Lo, H.-K.2
-
70
-
-
7044249607
-
Security of quantum key distribution with imperfect devices
-
D., Gottesman, H.-K., Lo, N., Luotkenhaus and J., Preskill, Security of quantum key distribution with imperfect devices, Quantum Inf. Comput. 4, 325-360 (2004).
-
(2004)
Quantum Inf. Comput
, vol.4
, pp. 325-360
-
-
Gottesman, D.1
Lo, H.-K.2
Luotkenhaus, N.3
Preskill, J.4
-
71
-
-
0004086411
-
-
United States Patent 2,632,058 (March 17
-
F., Gray, Pulse Code Communication, United States Patent 2,632,058 (March 17, 1953).
-
(1953)
Pulse Code Communication
-
-
Gray, F.1
-
74
-
-
0037017198
-
Continuous variable quantum cryptography using coherent states
-
F., Grosshans and P., Grangier, Continuous variable quantum cryptography using coherent states, Phys. Rev. Lett. 88, 057-902 (2002).
-
(2002)
Phys. Rev. Lett
, vol.88
, pp. 057-902
-
-
Grosshans, F.1
Grangier, P.2
-
75
-
-
0012895792
-
Reverse reconciliation protocols for quantum cryptography with continuous variables
-
quant-ph/0204127
-
F., Grosshans and P., Grangier, Reverse reconciliation protocols for quantum cryptography with continuous variables, ar Xiv e-print quant-ph/0204127 (2002).
-
(2002)
Arxiv E-Print
-
-
Grosshans, F.1
Grangier, P.2
-
77
-
-
0037448569
-
Quantum key distribution using gaussian-modulated coherent states
-
F., Grosshans, G., Van Assche, J., Wenger et al., Quantum key distribution using Gaussian-modulated coherent states, Nature 421, 238-241 (2003).
-
(2003)
Nature
, vol.421
, pp. 238-241
-
-
Grosshans, F.1
Van Assche, G.2
Wenger, J.3
-
78
-
-
1442298919
-
Virtual entanglement and reconciliation protocols for quantum cryptography with continuous variable
-
F., Grosshans, J., Wenger, R., Brouri, N., J. Cerf and P., Grangier, Virtual entanglement and reconciliation protocols for quantum cryptography with continuous variable, Quantum Inf. Comput. 3, 535-552 (2003).
-
(2003)
Quantum Inf. Comput
, vol.3
, pp. 535-552
-
-
Grosshans, F.1
Wenger, J.2
Brouri, R.3
J. Cerf, N.4
Grangier, P.5
-
79
-
-
1442331338
-
Continuous-variable quantum cryptography is secure against non-gaussian attacks
-
F., Grosshans and N., J. Cerf, Continuous-variable quantum cryptography is secure against non-Gaussian attacks, Phys. Rev. Lett 92, 047-905 (2004).
-
(2004)
Phys. Rev. Lett
, vol.92
, pp. 047-905
-
-
Grosshans, F.1
J. Cerf, N.2
-
80
-
-
18144364030
-
Collective attacks and unconditional security in continuous variable quantum key distribution
-
F., Grosshans, Collective attacks and unconditional security in continuous variable quantum key distribution, Phys. Rev. Lett. 94, 020-504 (2005).
-
(2005)
Phys. Rev. Lett
, vol.94
, pp. 020-504
-
-
Grosshans, F.1
-
81
-
-
1642383295
-
An identity-based key-exchange protocol
-
Lecture Notes in Computer Science
-
C., G. Gönther, An identity-based key-exchange protocol, Advances in Cryptology – Eurocrypt.‘89, Lecture Notes in Computer Science, 29-37 (1989).
-
(1989)
Advances in Cryptology – Eurocrypt
, vol.89
, pp. 29-37
-
-
G. Gönther, C.1
-
82
-
-
4243332662
-
Quantum cryptography with squeezed states
-
M., Hillery, Quantum cryptography with squeezed states, Phys. Rev. A 61, 022-309 (2000).
-
(2000)
Phys. Rev. A
, vol.61
, pp. 022-309
-
-
Hillery, M.1
-
83
-
-
0031675590
-
The capacity of the quantum channel with general signal states
-
A., S. Holevo, The capacity of the quantum channel with general signal states, IEEE Trans. Inform. Theory 44, 269-273 (1998).
-
(1998)
IEEE Trans. Inform. Theory
, vol.44
, pp. 269-273
-
-
S. Holevo, A.1
-
84
-
-
84925199027
-
-
Horst Guörtz Institute for IT-Security and Institute for Applied Information Processing and Communications
-
Horst Guörtz Institute for IT-Security and Institute for Applied Information Processing and Communications, Fourth Conference on the Advanced Encryption Standard (AES) (2004).
-
(2004)
Fourth Conference on the Advanced Encryption Standard (AES)
-
-
-
85
-
-
84938015047
-
A method for the construction of minimum redundancy codes
-
D., A. Huffman, A method for the construction of minimum redundancy codes, Proc. IRE, 1098-1101 (1952).
-
(1952)
Proc. IRE
, pp. 1098-1101
-
-
A. Huffman, D.1
-
86
-
-
0345299154
-
Practical quantum cryptography for secure free-space communications
-
quant-ph/9905009
-
R., J. Hughes, W., T. Buttler, P., G. Kwiat et al., Practical quantum cryptography for secure free-space communications, ar Xiv e-print quant-ph/9905009 (1999).
-
(1999)
Arxiv E-Print
-
-
J. Hughes, R.1
T. Buttler, W.2
G. Kwiat, P.3
-
87
-
-
0010758769
-
Practical free- space quantum key distribution over 10 km in daylight and at night
-
R., J. Hughes, J., E. Nordholt, D., Derkacs and C., G. Peterson, Practical free- space quantum key distribution over 10 km in daylight and at night, New J. Phys 4, 43 (2002).
-
(2002)
New J. Phys
, vol.4
, pp. 43
-
-
J. Hughes, R.1
E. Nordholt, J.2
Derkacs, D.3
G. Peterson, C.4
-
88
-
-
0041415963
-
Quantum key distribution with high loss: Toward global secure communication
-
W.-Y., Hwang, Quantum key distribution with high loss: toward global secure communication, Phys. Rev. Lett. 91, 057-901 (2003).
-
(2003)
Phys. Rev. Lett
, vol.91
, pp. 057-901
-
-
Hwang, W.-Y.1
-
89
-
-
19744380987
-
Security of quantum key distribution with coherent states and homodyne detection
-
S., Iblisdir, G., Van Assche and N., J. Cerf, Security of quantum key distribution with coherent states and homodyne detection, Phys. Rev. Lett. 93, 170-502 (2004).
-
(2004)
Phys. Rev. Lett
, vol.93
, pp. 170-502
-
-
Iblisdir, S.1
Van Assche, G.2
J. Cerf, N.3
-
90
-
-
85032406765
-
-
TM, http://www.idquantique.com/(2005).
-
(2005)
Tm
-
-
-
91
-
-
85032404963
-
-
TM, http://www.idquantique.com/(2005).
-
(2005)
Tm
-
-
-
93
-
-
84925199024
-
Scrambling and randomization
-
Lecture Notes in Computer Science
-
S., C. Kak, Scrambling and randomization, Advances in Cryptology – Crypto.’81, Lecture Notes in Computer Science, 59-63 (1981).
-
(1981)
Advances in Cryptology – Crypto
, vol.81
, pp. 59-63
-
-
C. Kak, S.1
-
94
-
-
0033705991
-
Side channel cryptanalysis of product ciphers
-
J., Kelsey, B., Schneier, D., Wagner and C., Hall, Side channel cryptanalysis of product ciphers, J. Comput. Secur. 8, 141-158 (2000).
-
(2000)
J. Comput. Secur
, vol.8
, pp. 141-158
-
-
Kelsey, J.1
Schneier, B.2
Wagner, D.3
Hall, C.4
-
96
-
-
0003657590
-
-
third edition, Reading, MA, Addison-Wesley
-
D., E. Knuth, The Art of Computer Programming, vol. 2, third edition, Reading, MA, Addison-Wesley (1997).
-
(1997)
The Art of Computer Programming
, vol.2
-
-
E. Knuth, D.1
-
97
-
-
84939573910
-
Differential power analysis
-
Lecture Notes in Computer Science
-
P., Kocher, J., Jaffe and B., Jun, Differential power analysis, Advances in Cryptology – Crypto‘99, Lecture Notes in Computer Science, 388-397 (1999).
-
(1999)
Advances in Cryptology – Crypto
, vol.99
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
99
-
-
23744435400
-
On the power of quantum memory
-
R., König, U., Maurer and R., Renner, On the power of quantum memory, IEEE Trans. Inform. Theory 51, 2391-2401 (2005).
-
(2005)
IEEE Trans. Inform. Theory
, vol.51
, pp. 2391-2401
-
-
König, R.1
Maurer, U.2
Renner, R.3
-
101
-
-
0034858578
-
Minimum redundancy zerro-error source coding with side information
-
P., Koulgi, E., Tuncel, S., Regunathan and K., Rose, Minimum redundancy zerro-error source coding with side information, Proc. IEEE International Symposium on Information Theory (ISIT) (2001).
-
(2001)
Proc. IEEE International Symposium on Information Theory (ISIT)
-
-
Koulgi, P.1
Tuncel, E.2
Regunathan, S.3
Rose, K.4
-
102
-
-
0036352854
-
On zero-error coding of correlated sources
-
P., Koulgi, E., Tuncel and K., Rose, On zero-error coding of correlated sources, Proc. IEEE International Symposium on Information Theory (ISIT), 62 (2002).
-
(2002)
Proc. IEEE International Symposium on Information Theory (ISIT)
, vol.62
-
-
Koulgi, P.1
Tuncel, E.2
Rose, K.3
-
103
-
-
0037265324
-
On zero-error source coding with decoder side information
-
P., Koulgi, E., Tuncel, S., Regunathan and K., Rose, On zero-error source coding with decoder side information, IEEE Trans. Inform. Theory 49, 99-111 (2003).
-
(2003)
IEEE Trans. Inform. Theory
, vol.49
, pp. 99-111
-
-
Koulgi, P.1
Tuncel, E.2
Regunathan, S.3
Rose, K.4
-
104
-
-
84991939136
-
Lfsr-based hashing and authentication
-
Lecture Notes in Computer Science
-
H., Krawczyk, LFSR-based hashing and authentication, Advances in Cryptology – Crypto.‘94, Lecture Notes in Computer Science, 129-139 (1994).
-
(1994)
Advances in Cryptology – Crypto
, vol.94
, pp. 129-139
-
-
Krawczyk, H.1
-
105
-
-
0037015595
-
A step towards global key distribution
-
C., Kurtsiefer, P., Zarda, M., Halder et al., A step towards global key distribution, Nature 419, 450 (2002).
-
(2002)
Nature
, vol.419
, pp. 450
-
-
Kurtsiefer, C.1
Zarda, P.2
Halder, M.3
-
106
-
-
0021388021
-
An introduction to arithmetic coding
-
G., G. Langdon, An introduction to arithmetic coding, IBM J. Res. Dev. 28, 135-149 (1984).
-
(1984)
IBM J. Res. Dev
, vol.28
, pp. 135-149
-
-
G. Langdon, G.1
-
107
-
-
0036810616
-
Compression of binary sources with side information at the decoder using ldpc codes
-
A., D. Liveris, Z., Xiong and C., N. Georghiades, Compression of binary sources with side information at the decoder using LDPC codes, IEEE Commun. Lett. 6, 440-442 (2002).
-
(2002)
IEEE Commun. Lett
, vol.6
, pp. 440-442
-
-
D. Liveris, A.1
Xiong, Z.2
N. Georghiades, C.3
-
108
-
-
0033605546
-
Unconditional security of quantum key distribution over arbitrarily long distances
-
H.-K., Lo and H., F. Chau, Unconditional security of quantum key distribution over arbitrarily long distances, Science 283, 2050-2056 (1999).
-
(1999)
Science
, vol.283
, pp. 2050-2056
-
-
Lo, H.-K.1
F. Chau, H.2
-
109
-
-
3042620599
-
Method for decoupling error correction from privacy amplification
-
H.-K., Lo, Method for decoupling error correction from privacy amplification, New J. Phys 5, 36 (2003).
-
(2003)
New J. Phys
, vol.5
, pp. 36
-
-
Lo, H.-K.1
-
110
-
-
27744479495
-
Decoy state quantum key distribution
-
H.-K., Lo, X., Ma and K., Chen, Decoy state quantum key distribution, Phys. Rev. Lett. 94, 230-504 (2005).
-
(2005)
Phys. Rev. Lett
, vol.94
, pp. 230-504
-
-
Lo, H.-K.1
Ma, X.2
Chen, K.3
-
111
-
-
28844440400
-
Controlling excess noise in fiber-optics continuous-variable quantum key distribution
-
R
-
J., Lodewyck, T., Debuisschert, R., Tualle-Brouri and P., Grangier, Controlling excess noise in fiber-optics continuous-variable quantum key distribution, Phys. Rev. A 72, 050-303(R) (2005).
-
(2005)
Phys. Rev. A
, vol.72
, pp. 050-303
-
-
Lodewyck, J.1
Debuisschert, T.2
Tualle-Brouri, R.3
Grangier, P.4
-
112
-
-
4043069313
-
Continuous variable quantum key distribution using polarization encoding and post selection
-
S., Lorenz, N., Korolkova and G., Leuchs, Continuous variable quantum key distribution using polarization encoding and post selection, Appl. Phys. B 79, 273-277 (2004).
-
(2004)
Appl. Phys. B
, vol.79
, pp. 273-277
-
-
Lorenz, S.1
Korolkova, N.2
Leuchs, G.3
-
113
-
-
85032411849
-
-
MagiQ Technologies, QPNTM, http://www.magiqtech.com/(2005).
-
(2005)
QPNTM
-
-
-
114
-
-
38149074447
-
The computational complexity of universal hash functions
-
Y., Mansour, N., Nisan and P., Tiwari, The computational complexity of universal hash functions, Theor. Comput. Sci. 107, 121-133 (1993).
-
(1993)
Theor. Comput. Sci
, vol.107
, pp. 121-133
-
-
Mansour, Y.1
Nisan, N.2
Tiwari, P.3
-
115
-
-
85025704284
-
Linear cryptanalysis method for des cipher
-
Lecture Notes in Computer Science
-
M., Matsui, Linear cryptanalysis method for DES cipher, Advances in Cryptology - Eurocrypt‘93, Lecture Notes in Computer Science, 386-397 (1993).
-
(1993)
Advances in Cryptology - Eurocrypt
, vol.93
, pp. 386-397
-
-
Matsui, M.1
-
116
-
-
0038218542
-
The first experimental cryptanalysis of the data encryption standard
-
Lecture Notes in Computer Science
-
M., Matsui, The first experimental cryptanalysis of the data encryption standard, Advances in Cryptology – Crypto.‘94, Lecture Notes in Computer Science, 1-11 (1994).
-
(1994)
Advances in Cryptology – Crypto
, vol.94
, pp. 1-11
-
-
Matsui, M.1
-
117
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
U., M. Maurer, Secret key agreement by public discussion from common information, Ie Ee Trans. Inform. Theory 39, 733-742 (1993).
-
(1993)
Ieee Trans. Inform. Theory
, vol.39
, pp. 733-742
-
-
M. Maurer, U.1
-
118
-
-
0345681331
-
Information-theoretically secure secret-key agreement by not authenticated public discussion
-
Lecture Notes in Computer Science
-
U., Maurer, Information-theoretically secure secret-key agreement by NOT authenticated public discussion, Advances in Cryptology – Eurocrypt.‘97, Lecture Notes in Computer Science, 209-225 (1997).
-
(1997)
Advances in Cryptology – Eurocrypt
, vol.97
, pp. 209-225
-
-
Maurer, U.1
-
120
-
-
0033097504
-
Unconditionally secure key agreement and the intrinsic conditional information
-
U., M. Maurer and S., Wolf, Unconditionally secure key agreement and the intrinsic conditional information, IEEE Trans. Inform. Theory 45, 499-514 (1999).
-
(1999)
IEEE Trans. Inform. Theory
, vol.45
, pp. 499-514
-
-
M. Maurer, U.1
Wolf, S.2
-
121
-
-
0034228863
-
Authentication theory and hypothesis testing
-
U., M. Maurer, Authentication theory and hypothesis testing, IEEE Trans. Inform. Theory 46, 1350-1356 (2000).
-
(2000)
IEEE Trans. Inform. Theory
, vol.46
, pp. 1350-1356
-
-
M. Maurer, U.1
-
122
-
-
84948960386
-
Information-theoretic key agreement: From weak to strong secrecy for free
-
Lecture Notes in Computer Science
-
U., Maurer and S., Wolf, Information-theoretic key agreement: from weak to strong secrecy for free, Advances in Cryptology - Eurocrypt 2000, Lecture Notes in Computer Science, 351-368 (2000).
-
(2000)
Advances in Cryptology - Eurocrypt 2000
, pp. 351-368
-
-
Maurer, U.1
Wolf, S.2
-
123
-
-
0037396695
-
Secret-key agreement over unauthenticated public channels—part i: Definitions and a completeness result
-
U., Maurer and S., Wolf, Secret-key agreement over unauthenticated public channels—part I: definitions and a completeness Result, IEEE Trans. Inform. Theory 49, 822-831 (2003).
-
(2003)
IEEE Trans. Inform. Theory
, vol.49
, pp. 822-831
-
-
Maurer, U.1
Wolf, S.2
-
124
-
-
0037399113
-
Secret-key agreement over unauthenticated public channels—part ii: The simulatability condition
-
U., Maurer and S., Wolf, Secret-key agreement over unauthenticated public channels—part II: the simulatability condition, IEEE Trans. Inform. Theory 49, 832-838 (2003).
-
(2003)
IEEE Trans. Inform. Theory
, vol.49
, pp. 832-838
-
-
Maurer, U.1
Wolf, S.2
-
125
-
-
0037396951
-
Secret-key agreement over unauthenticated public channels—part iii: Privacy amplification
-
U., Maurer and S., Wolf, Secret-key agreement over unauthenticated public channels—part III: privacy amplification, IEEE Trans. Inform. Theory 49, 839-851 (2003).
-
(2003)
IEEE Trans. Inform. Theory
, vol.49
, pp. 839-851
-
-
Maurer, U.1
Wolf, S.2
-
126
-
-
3042730516
-
Unconditional security in quantum cryptography
-
D., Mayers, Unconditional security in quantum cryptography, J. ACM 48, 351-406 (2001).
-
(2001)
J. ACM
, vol.48
, pp. 351-406
-
-
Mayers, D.1
-
127
-
-
84944878354
-
-
London, CRC Press LLC
-
A., J. Menezes, P., C. van Oorschot and S., A. Vanstone, Handbook of Applied Cryptography, London, CRC Press LLC (1997).
-
(1997)
Handbook of Applied Cryptography
-
-
J. Menezes, A.1
C. Van Oorschot, P.2
A. Vanstone, S.3
-
128
-
-
0038975723
-
Quantum cryptography over 23 km in installed under-lake telecom fibre
-
A., Muller, H., Zbinden and N., Gisin, Quantum cryptography over 23 km in installed under-lake telecom fibre, Europhys. Lett. 33, 335 (1996).
-
(1996)
Europhys. Lett
, vol.33
, pp. 335
-
-
Muller, A.1
Zbinden, H.2
Gisin, N.3
-
130
-
-
26844487465
-
Low-density parity-check matrices for coding of correlated sources
-
J., Muramatsu, T., Uyematsu and T., Wadayama, Low-density parity-check matrices for coding of correlated sources, IEEE Trans. Inform. Theory 51, 3645-3654 (2005).
-
(2005)
IEEE Trans. Inform. Theory
, vol.51
, pp. 3645-3654
-
-
Muramatsu, J.1
Uyematsu, T.2
Wadayama, T.3
-
131
-
-
84937413721
-
Essential algebraic structure within the aes
-
Lecture Notes in Computer Science
-
S., Murphy and M., J. Robshaw, Essential algebraic structure within the AES, Advances in Cryptology - Crypto 2002, Lecture Notes in Computer Science, 1-16 (2002).
-
(2002)
Advances in Cryptology - Crypto 2002
, pp. 1-16
-
-
Murphy, S.1
J. Robshaw, M.2
-
133
-
-
18144424865
-
Security bounds for continuous variables quantum key distribution
-
M., Navascues and A., Acin, Security bounds for continuous variables quantum key distribution, Phys. Rev. Lett. 94, 020-505 (2005).
-
(2005)
Phys. Rev. Lett
, vol.94
, pp. 020-505
-
-
Navascues, M.1
Acin, A.2
-
134
-
-
0042221863
-
Statistical confidentiality tests for a quantum transmission using continuous variables
-
P., Navez, Statistical confidentiality tests for a quantum transmission using continuous variables, Eur. Phys. J. D 18, 219-228 (2002).
-
(2002)
Eur. Phys. J. D
, vol.18
, pp. 219-228
-
-
Navez, P.1
-
141
-
-
0004888588
-
Iterating von neumann's procedure for extracting random bits
-
Y., Peres, Iterating von Neumann's procedure for extracting random bits, Annals of Statistics 20, 590-597 (1992).
-
(1992)
Annals of Statistics
, vol.20
, pp. 590-597
-
-
Peres, Y.1
-
144
-
-
0346688181
-
Continuous variable quantum cryptography
-
T., C. Ralph, Continuous variable quantum cryptography, Phys. Rev. A 61, 010-303 (2000).
-
(2000)
Phys. Rev. A
, vol.61
, pp. 010-303
-
-
C. Ralph, T.1
-
145
-
-
0032629108
-
Extracting all the randomness and reducing the error in trevisan's extractors
-
R., Raz, O., Reingold and S., Vadhan, Extracting all the randomness and reducing the error in Trevisan's extractors, Proc. Symp. Theory of Computing, 149-158 (1999).
-
(1999)
Proc. Symp. Theory of Computing
, pp. 149-158
-
-
Raz, R.1
Reingold, O.2
Vadhan, S.3
-
146
-
-
4243703966
-
Quantum cryptography with a predetermined key, using continuous-variable einstein-podolsky-rosen correlations
-
M., D. Reid, Quantum cryptography with a predetermined key, using continuous-variable Einstein-Podolsky-Rosen correlations, Phys. Rev. A 62, 062-308 (2000).
-
(2000)
Phys. Rev. A
, vol.62
, pp. 062-308
-
-
D. Reid, M.1
-
147
-
-
35248888499
-
New bounds in secret-key agreement: The gap between formation and secrecy extraction
-
Lecture Notes in Computer Science
-
R., Renner and S., Wolf, New bounds in secret-key agreement: the gap between formation and secrecy extraction, Advances in Cryptology - Eurocrypt 2003, Lecture Notes in Computer Science, 562-577 (2003).
-
(2003)
Advances in Cryptology - Eurocrypt 2003
, pp. 562-577
-
-
Renner, R.1
Wolf, S.2
-
149
-
-
0034652078
-
Fast and user-friendly quantum key distribution
-
G., Ribordy, J., Gautier, H., Zbinden and N., Gisin, Fast and user-friendly quantum key distribution, J. Mod. Opt. 47, 517-531 (2000).
-
(2000)
J. Mod. Opt
, vol.47
, pp. 517-531
-
-
Ribordy, G.1
Gautier, J.2
Zbinden, H.3
Gisin, N.4
-
150
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R., L. Rivest, A., Shamir and L., M. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Commun. ACM 21, 120-126 (1978).
-
(1978)
Commun. ACM
, vol.21
, pp. 120-126
-
-
L. Rivest, R.1
Shamir, A.2
M. Adleman, L.3
-
151
-
-
33847106304
-
Single photons on demand
-
B., Sanders, J., Vučković and P., Grangier, Single photons on demand, Euro- phys. News 36, 56-58 (2005).
-
(2005)
Euro- Phys. News
, vol.36
, pp. 56-58
-
-
Sanders, B.1
Vučković, J.2
Grangier, P.3
-
153
-
-
0003855464
-
-
second edition, New York, John Wiley & Sons
-
B., Schneier, Applied Cryptography, second edition, New York, John Wiley & Sons (1995).
-
(1995)
Applied Cryptography
-
-
Schneier, B.1
-
154
-
-
34250459760
-
Schnelle multiplikation grofier zahlen
-
A., Schönhage and V., Strassen, Schnelle Multiplikation grofier Zahlen, Computing 7, 281-292 (1971).
-
(1971)
Computing
, vol.7
, pp. 281-292
-
-
Schönhage, A.1
Strassen, V.2
-
155
-
-
0000256895
-
Schnelle multiplikation von polynomen uber korpern der charakteristik 2
-
A., Schönhage, Schnelle Multiplikation von Polynomen uber Korpern der Charakteristik 2, Acta Inform. 7, 395-398 (1977).
-
(1977)
Acta Inform
, vol.7
, pp. 395-398
-
-
Schönhage, A.1
-
156
-
-
33748608655
-
Quantum coding
-
B., Schumacher, Quantum coding, Phys. Rev. A 51, 2738-2747 (1995).
-
(1995)
Phys. Rev. A
, vol.51
, pp. 2738-2747
-
-
Schumacher, B.1
-
157
-
-
0000712477
-
Sending classical information via noisy quantum channels
-
B., Schumacher and M., D. Westmoreland, Sending classical information via noisy quantum channels, Phys. Rev. A 56, 131-138 (1997).
-
(1997)
Phys. Rev. A
, vol.56
, pp. 131-138
-
-
Schumacher, B.1
D. Westmoreland, M.2
-
160
-
-
84856043672
-
A mathematical theory of communication
-
C., E. Shannon, A mathematical theory of communication, Bell Syst. Tech. J. 27, 623-656 (1948).
-
(1948)
Bell Syst. Tech. J
, vol.27
, pp. 623-656
-
-
E. Shannon, C.1
-
161
-
-
84890522850
-
Communication theory of secrecy systems
-
C., E. Shannon, Communication theory of secrecy systems, Bell Syst. Tech. J. 28, 656-715 (1949).
-
(1949)
Bell Syst. Tech. J
, vol.28
, pp. 656-715
-
-
E. Shannon, C.1
-
163
-
-
0347090658
-
Simple proof of security of the bb84 quantum key distribution protocol
-
P., W. Shor and J., Preskill, Simple proof of security of the BB84 quantum key distribution protocol, Phys. Rev. Lett. 85, 441-444 (2000).
-
(2000)
Phys. Rev. Lett
, vol.85
, pp. 441-444
-
-
W. Shor, P.1
Preskill, J.2
-
164
-
-
0037156920
-
Quantum key distribution with bright entangled beams
-
C., Silberhorn, N., Korolkova and G., Leuchs, Quantum key distribution with bright entangled beams, Phys. Rev. Lett. 88, 167-902 (2002).
-
(2002)
Phys. Rev. Lett
, vol.88
, pp. 167-902
-
-
Silberhorn, C.1
Korolkova, N.2
Leuchs, G.3
-
165
-
-
0038803456
-
Continuous variable quantum cryptography - beating the 3 db loss limit
-
C., Silberhorn, T., C. Ralph, N., Lütkenhaus and G., Leuchs, Continuous variable quantum cryptography - beating the 3 dB loss limit, Phys. Rev. Lett. 89, 167-901 (2002).
-
(2002)
Phys. Rev. Lett
, vol.89
, pp. 167-901
-
-
Silberhorn, C.1
C. Ralph, T.2
Lütkenhaus, N.3
Leuchs, G.4
-
166
-
-
0004034591
-
-
New York, Doubleday
-
S., Singh, The Code Book, New York, Doubleday (1999).
-
(1999)
The Code Book
-
-
Singh, S.1
-
167
-
-
0015648934
-
Noiseless coding of correlated information sources
-
D., Slepian and J., K. Wolf, Noiseless coding of correlated information sources, IEEE Trans. Inform. Theory 19, 471-480 (1973).
-
(1973)
IEEE Trans. Inform. Theory
, vol.19
, pp. 471-480
-
-
Slepian, D.1
K. Wolf, J.2
-
168
-
-
0007244732
-
Multiple particle interference and quantum error correction
-
A., Steane, Multiple particle interference and quantum error correction, Proc. R. Soc. London A 452, 2551-2577 (1996).
-
(1996)
Proc. R. Soc. London A
, vol.452
, pp. 2551-2577
-
-
Steane, A.1
-
169
-
-
0000410707
-
Universal hashing and authentication codes
-
D., R. Stinson, Universal hashing and authentication codes, Design. Code. Cryptogr. 4, 369-380 (1994).
-
(1994)
Design. Code. Cryptogr
, vol.4
, pp. 369-380
-
-
R. Stinson, D.1
-
171
-
-
0011769922
-
Quantum key distribution over 67 km with a plug & play system
-
D., Stucki, N., Gisin, O., Guinnard, G., Ribordy and H., Zbinden, Quantum key distribution over 67 km with a plug & play system, New J. Phys 4, 41 (2002).
-
(2002)
New J. Phys
, vol.4
, pp. 41
-
-
Stucki, D.1
Gisin, N.2
Guinnard, O.3
Ribordy, G.4
Zbinden, H.5
-
172
-
-
0005314594
-
Extractors and pseudorandom generators
-
L., Trevisan, Extractors and pseudorandom generators, J. ACM 48, 860-879 (2001).
-
(2001)
J. ACM
, vol.48
, pp. 860-879
-
-
Trevisan, L.1
-
173
-
-
1442337635
-
Reconciliation of a quantum- distributed gaussian key
-
G., Van Assche, J., Cardinal and N., J. Cerf, Reconciliation of a quantum- distributed Gaussian key, IEEE Trans. Inform. Theory 50, 394-400 (2004).
-
(2004)
IEEE Trans. Inform. Theory
, vol.50
, pp. 394-400
-
-
Van Assche, G.1
Cardinal, J.2
J. Cerf, N.3
-
175
-
-
26944463497
-
Secure coherent-state quantum key distribution protocols with efficient reconciliation
-
G., Van Assche, S., Iblisdir and N., J. Cerf, Secure coherent-state quantum key distribution protocols with efficient reconciliation, Phys. Rev. A 71, 052-304 (2005).
-
(2005)
Phys. Rev. A
, vol.71
, pp. 052-304
-
-
Van Assche, G.1
Iblisdir, S.2
J. Cerf, N.3
-
176
-
-
0000478762
-
Cipher printing telegraph systems for secret wire and radio telegraphic communications
-
G., S. Vernam, Cipher printing telegraph systems for secret wire and radio telegraphic communications, J. IEEE 55, 109-115 (1926).
-
(1926)
J. IEEE
, vol.55
, pp. 109-115
-
-
S. Vernam, G.1
-
177
-
-
0032680475
-
Multilevel codes: Theoretical concepts and practical design rules
-
U., Wachsmann, R., F. Fischer and J., B. Huber, Multilevel codes: theoretical concepts and practical design rules, IEEE Trans. Inform. Theory 45, 1361-1391 (1999).
-
(1999)
IEEE Trans. Inform. Theory
, vol.45
, pp. 1361-1391
-
-
Wachsmann, U.1
F. Fischer, R.2
B. Huber, J.3
-
178
-
-
0037180773
-
Quantum cryptography with a photon turnstile
-
E., Waks, K., Inoue, C., Santori et al., Quantum cryptography with a photon turnstile, Nature 420, 762 (2002).
-
(2002)
Nature
, vol.420
, pp. 762
-
-
Waks, E.1
Inoue, K.2
Santori, C.3
-
181
-
-
27744568650
-
Beating the photon-number-splitting attack in practical quantum cryptography
-
X.-B., Wang, Beating the photon-number-splitting attack in practical quantum cryptography, Phys. Rev. Lett. 94, 230-503 (2005).
-
(2005)
Phys. Rev. Lett
, vol.94
, pp. 230-503
-
-
Wang, X.-B.1
-
182
-
-
0019572642
-
New hash functions and their use in authentication and set equality
-
M., N. Wegman and J., L. Carter, New hash functions and their use in authentication and set equality, J. Comput. Syst. Sci. 22, 265-279 (1981).
-
(1981)
J. Comput. Syst. Sci
, vol.22
, pp. 265-279
-
-
N. Wegman, M.1
L. Carter, J.2
-
183
-
-
84925199014
-
-
from MathWorld - a Wolfram web resource
-
E., W. Weisstein, Number Theoretic Transform, from Math World - a Wolfram web resource, http://mathworld.wolfram.com/NumberTheoreticTransform.html (2005).
-
(2005)
Number Theoretic Transform
-
-
W. Weisstein, E.1
-
184
-
-
84925161759
-
-
from MathWorld - a Wolfram web resource
-
E., W. Weisstein, Gray Code, from Math World - a Wolfram web resource, http://mathworld.wolfram.com/GrayCode.html (2005).
-
(2005)
Gray Code
-
-
W. Weisstein, E.1
-
186
-
-
0001998264
-
Conjugate coding
-
S., Wiesner, Conjugate coding, Sigact News 15, 78-88 (1983).
-
(1983)
Sigact News
, vol.15
, pp. 78-88
-
-
Wiesner, S.1
-
187
-
-
0001467577
-
The zero-error side information problem and chromatic numbers
-
H., S. Witsenhausen, The zero-error side information problem and chromatic numbers, IEEE Trans. Inform. Theory 22, 592-593 (1976).
-
(1976)
IEEE Trans. Inform. Theory
, vol.22
, pp. 592-593
-
-
S. Witsenhausen, H.1
-
188
-
-
84907077814
-
Iterative decoding for multilevel codes using reliability information
-
T., Wörz and J., Hagenauer, Iterative decoding for multilevel codes using reliability information, Proc. IEEE Globecom Conference, 1779-1784 (1992).
-
(1992)
Proc. IEEE Globecom Conference
, pp. 1779-1784
-
-
Wörz, T.1
Hagenauer, J.2
-
189
-
-
0016562514
-
The wire-tap channel
-
A., D. Wyner, The wire-tap channel, Bell Syst. Tech. J. 54, 1355-1387 (1975).
-
(1975)
Bell Syst. Tech. J
, vol.54
, pp. 1355-1387
-
-
D. Wyner, A.1
-
191
-
-
0031098826
-
Interferometry with faraday mirrors for quantum cryptography
-
H., Zbinden, J., Gautier, N., Gisin et al., Interferometry with Faraday mirrors for quantum cryptography, Electron. Lett. 33, 586-588 (1997).
-
(1997)
Electron. Lett
, vol.33
, pp. 586-588
-
-
Zbinden, H.1
Gautier, J.2
Gisin, N.3
-
192
-
-
0032292753
-
Quantum cryptography
-
H., Zbinden, H., Bechmann-Pasquinucci, N., Gisin and G., Ribordy, Quantum cryptography, Appl. Phys. B 67, 743-748 (1998).
-
(1998)
Appl. Phys. B
, vol.67
, pp. 743-748
-
-
Zbinden, H.1
Bechmann-Pasquinucci, H.2
Gisin, N.3
Ribordy, G.4
-
193
-
-
0035000235
-
Optimal code design for lossless and near lossless source coding in multiple access networks
-
Q., Zhao and M., Effros, Optimal code design for lossless and near lossless source coding in multiple access networks, Proc. IEEE Data Compression Conf. (DCC), 263-272 (2001).
-
(2001)
Proc. IEEE Data Compression Conf. (DCC)
, pp. 263-272
-
-
Zhao, Q.1
Effros, M.2
-
195
-
-
84942245925
-
Low complexity code design for lossless and near- lossless side information source codes
-
Q., Zhao and M., Effros, Low complexity code design for lossless and near- lossless side information source codes, Proc. IEEE Data Compression Conf. (DCC) (2003).
-
(2003)
Proc. IEEE Data Compression Conf. (DCC)
-
-
Zhao, Q.1
Effros, M.2
-
196
-
-
0037271940
-
Lossless and near-lossless source coding for multiple access networks
-
Q., Zhao and M., Effros, Lossless and near-lossless source coding for multiple access networks, IEEE Trans. Inform. Theory 49, 112-128 (2003).
-
(2003)
IEEE Trans. Inform. Theory
, vol.49
, pp. 112-128
-
-
Zhao, Q.1
Effros, M.2
|