-
1
-
-
11944254075
-
Quantum cryptography using any two nonorthogonal states
-
25 May
-
C.H. Bennett, “Quantum cryptography using any two nonorthogonal states”, Physical Review Letters, Vol. 68, no. 21, 25 May 1992, pp. 3121-3124.
-
(1992)
Physical Review Letters
, vol.68
, Issue.21
, pp. 3121-3124
-
-
Bennett, C.H.1
-
2
-
-
0026626314
-
Experimental quantum cryptography
-
C.H. Bennett, F. Bessette, G. Brassard, L. Salvail and J. Smolin, “Experimental quantum cryptography”, Journal of Cryptology, Vol. 5, no. 1, 1992, pp. 3-28.
-
(1992)
Journal of Cryptology
, vol.5
, Issue.1
, pp. 3-28
-
-
Bennett, C.H.1
Bessette, F.2
Brassard, G.3
Salvail, L.4
Smolin, J.5
-
3
-
-
0003259517
-
Quantum cryptography: Public key distribution and coin tossing
-
Bangalore, India, December
-
C.H. Bennett and G. Brassard, “Quantum cryptography: Public key distribution and coin tossing”, in Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, December 1994, pp. 175-179.
-
(1994)
Proceedings of IEEE International Conference on Computers, Systems and Signal Processing
, pp. 175-179
-
-
Bennett, C.H.1
Brassard, G.2
-
4
-
-
0029405656
-
Generalized privacy amplification
-
November
-
C.H. Bennett, G. Brassard, C. Crépeau and U. M. Maurer, “Generalized privacy amplification”, IEEE Transactions on Information Theory, Vol. IT-41, no. 6, November 1995, pp. 1915-1923.
-
(1995)
IEEE Transactions on Information Theory
, vol.41 IT
, Issue.6
, pp. 1915-1923
-
-
Bennett, C.H.1
Brassard, G.2
Crépeau, C.3
Maurer, U.M.4
-
5
-
-
0002977948
-
Quantum cryptography
-
October
-
C.H. Bennett, G. Brassard and A.K. Ekert, “Quantum cryptography”, Scientific American, Vol. 267, no. 4, October 1992, pp. 50-57.
-
(1992)
Scientific American
, vol.267
, Issue.4
, pp. 50-57
-
-
Bennett, C.H.1
Brassard, G.2
Ekert, A.K.3
-
6
-
-
0033702887
-
A proof of security of quantum key distribution
-
May, to appear
-
E. Biham, M. Boyer, P.O. Boykin, T. Mor and V. Roychowdhury, “A proof of security of quantum key distribution”, in Proceedings of 32nd ACM Symposium on Theory of Computing, May 2000, to appear.
-
(2000)
Proceedings of 32Nd ACM Symposium on Theory of Computing
-
-
Biham, E.1
Boyer, M.2
Boykin, P.O.3
Mor, T.4
Roychowdhury, V.5
-
7
-
-
84949006381
-
Security of quantum key distribution against all collective attacks
-
January
-
E. Biham, M. Boyer, G. Brassard, J. van-de-Graaf and T. Mor, “Security of quantum key distribution against all collective attacks”, Los Alamos archives quant-ph/9801022, January 1998.
-
(1998)
Los Alamos Archives Quant-Ph/9801022
-
-
Biham, E.1
Boyer, M.2
Brassard, G.3
van-de-Graaf, J.4
Mor, T.5
-
8
-
-
0031273993
-
Bounds on information and the security of quantum cryptography
-
17 November
-
E. Biham and T. Mor, “Bounds on information and the security of quantum cryptography”, Physical Review Letters, Vol. 79, no. 20, 17 November 1997, pp. 4034-4037.
-
(1997)
Physical Review Letters
, vol.79
, Issue.20
, pp. 4034-4037
-
-
Biham, E.1
Mor, T.2
-
9
-
-
0000439908
-
Continuum fields in quantum optics
-
K. J. Blow, R. Loudon, S. J. D. Phoenix and T. J. Sheperd, “Continuum fields in quantum optics”, Physical Review A, Vol. 42, no. 7, October 1990, pp. 4102-4114.
-
(1990)
Physical Review A
, vol.42
, Issue.7
, pp. 4102-4114
-
-
Blow, K.J.1
Loudon, R.2
Phoenix, S.J.3
Sheperd, T.J.4
-
10
-
-
33749582609
-
Quantum cryptography via parametric downconversion
-
P. Kumar, G. Mauro D’Ariano and O. Hirota (editors), Kluwer Academic/Plenum Publishers, New York
-
G. Brassard, T. Mor and B.C. Sanders, “Quantum cryptography via parametric downconversion”, in Quantum Communication, Computing, and Measurement 2, P. Kumar, G. Mauro D’Ariano and O. Hirota (editors), Kluwer Academic/Plenum Publishers, New York, 2000, pp. 381-386.
-
(2000)
Quantum Communication, Computing, and Measurement 2
, pp. 381-386
-
-
Brassard, G.1
Mor, T.2
Sanders, B.C.3
-
11
-
-
0000054462
-
Free-space quantum-key distribution
-
April
-
W. T. Buttler, R. J. Hughes, P. G. Kwiat, G. G. Luther, G. L. Morgan, J.E. Nordholt, C.G. Peterson and C. M. Simmons, “Free-space quantum-key distribution”, Physical Review A, Vol. 57, no. 4, April 1998, pp. 2379-2382.
-
(1998)
Physical Review A
, vol.57
, Issue.4
, pp. 2379-2382
-
-
Buttler, W.T.1
Hughes, R.J.2
Kwiat, P.G.3
Luther, G.G.4
Morgan, G.L.5
Nordholt, J.E.6
Peterson, C.G.7
Simmons, C.M.8
-
12
-
-
0001635114
-
Practical quantum cryptography based on two-photon interferometry
-
31 August
-
A.K. Ekert, J. G. Rarity, P.R. Tapster and G.M. Palma, “Practical quantum cryptography based on two-photon interferometry”, Physical Review Letters, Vol. 69, no. 9, 31 August 1992, pp. 1293-1295.
-
(1992)
Physical Review Letters
, vol.69
, Issue.9
, pp. 1293-1295
-
-
Ekert, A.K.1
Rarity, J.G.2
Tapster, P.R.3
Palma, G.M.4
-
13
-
-
0005246354
-
Quantum cryptography using polarization feedback
-
J. D. Franson and H. Ilves, “Quantum cryptography using polarization feedback”, Journal of Modern Optics, Vol. 41, no. 12, December 1994, pp. 2391-2396.
-
(1994)
Journal of Modern Optics
, vol.41
, Issue.12
, pp. 2391-2396
-
-
Franson, J.D.1
Ilves, H.2
-
14
-
-
77956946118
-
Quantum phenomena in optical interferometry
-
P. Hariharan and B.C. Sanders, “Quantum phenomena in optical interferometry”, Progress in Optics, Vol. XXXVI, 1996, pp. 49-128.
-
(1996)
Progress in Optics
, vol.36
, pp. 49-128
-
-
Hariharan, P.1
Sanders, B.C.2
-
15
-
-
0000600063
-
Quantum cryptography with coherent states
-
B. Huttner, N. Imoto, N. Gisin and T. Mor, “Quantum cryptography with coherent states”, Physical Review A, Vol. 51, no. 3, March 1995, pp. 1863-1869.
-
(1995)
Physical Review A
, vol.51
, Issue.3
, pp. 1863-1869
-
-
Huttner, B.1
Imoto, N.2
Gisin, N.3
Mor, T.4
-
16
-
-
84923199214
-
Comparison of quantum and semiclassical radiation theories with application to the beam maser
-
E. T. Jaynes and F.W. Cummings, “Comparison of quantum and semiclassical radiation theories with application to the beam maser”, Proceedings of the IEEE, Vol. 51, 1963, pp. 89-109.
-
(1963)
Proceedings of the IEEE
, vol.51
, pp. 89-109
-
-
Jaynes, E.T.1
Cummings, F.W.2
-
17
-
-
0033545306
-
A single-photon turnstile device
-
J. Kim, O. Benson, H. Kan and Y. Yamamoto, “A single-photon turnstile device”, Nature, Vol. 397, no. 6719, 1999, pp. 500-503.
-
(1999)
Nature
, vol.397
, Issue.6719
, pp. 500-503
-
-
Kim, J.1
Benson, O.2
Kan, H.3
Yamamoto, Y.4
-
18
-
-
84948956833
-
Dim coherent states as signal states in the BB84 protocol: Is it secure?
-
P.Kumar, G. Mauro D’Ariano and O. Hirota (editors), Kluwer Academic/Plenum Publishers, New York
-
N. Lütkenhaus, “Dim coherent states as signal states in the BB84 protocol: Is it secure?”, in Quantum Communication, Computing, and Measurement 2, P.Kumar, G. Mauro D’Ariano and O. Hirota (editors), Kluwer Academic/Plenum Publishers, New York, 2000, pp. 387-392.
-
(2000)
Quantum Communication, Computing, and Measurement 2
, pp. 387-392
-
-
Lütkenhaus, N.1
-
19
-
-
0040163388
-
Security of quantum cryptography with realistic sources
-
N. Lütkenhaus, “Security of quantum cryptography with realistic sources”, Acta Physica Slovaca, Vol. 49, 1999, pp. 549-556.
-
(1999)
Acta Physica Slovaca
, vol.49
, pp. 549-556
-
-
Lütkenhaus, N.1
-
20
-
-
84949006382
-
Security against individual attacks for realistic quantum key distribution
-
October
-
N. Lütkenhaus, “Security against individual attacks for realistic quantum key distribution”, Los Alamos archives quant-ph/9910093, October 1999.
-
(1999)
Los Alamos Archives Quant-Ph/9910093
-
-
Lütkenhaus, N.1
-
21
-
-
0029357908
-
Quantum key distribution over distances as long as 30 km
-
August
-
C. Marand and P. D. Townsend, “Quantum key distribution over distances as long as 30 km”, Optics Letters, Vol. 20, 15 August 1995, pp. 1695-1697.
-
(1995)
Optics Letters
, vol.20
, Issue.15
, pp. 1695-1697
-
-
Marand, C.1
Townsend, P.D.2
-
22
-
-
84955621476
-
Quantum key distribution and string oblivious transfer in noisy channels
-
Springer-Verlag, August
-
D. Mayers, “Quantum key distribution and string oblivious transfer in noisy channels”, in Advances in Cryptology: Proceedings of Crypto’96, Lecture Notes in Computer Science, Vol. 1109, Springer-Verlag, August 1996, pp. 343-357.
-
(1996)
Advances in Cryptology: Proceedings of Crypto’96, Lecture Notes in Computer Science
, vol.1109
, pp. 343-357
-
-
Mayers, D.1
-
23
-
-
84949006383
-
Unconditional security in quantum cryptography
-
February
-
D. Mayers, “Unconditional security in quantum cryptography”, Los Alamos archives quant-ph/9802025, February 1998.
-
(1998)
Los Alamos Archives Quant-Ph/9802025
-
-
Mayers, D.1
-
24
-
-
33749571784
-
-
Ph.D. Thesis, Technion, Haifa, Los Alamos archives quant-ph/9906073
-
T. Mor, “Quantum memory in quantum cryptography”, Ph.D. Thesis, Technion, Haifa, 1997; Los Alamos archives quant-ph/9906073.
-
(1997)
"Quantum Memory in Quantum Cryptography"
-
-
Mor, T.1
-
25
-
-
0031076691
-
Plug and Play systems for quantum cryptography
-
A. Muller, T. Herzog, B. Huttner, W. Tittel, H. Zbinden and N. Gisin, “Plug and Play systems for quantum cryptography”, Applied Physics Letters, Vol. 70, 1997, pp. 793-795.
-
(1997)
Applied Physics Letters
, vol.70
, pp. 793-795
-
-
Muller, A.1
Herzog, T.2
Huttner, B.3
Tittel, W.4
Zbinden, H.5
Gisin, N.6
-
27
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R. L. Rivest, A. Shamir and L. M. Adleman, “A method for obtaining digital signatures and public-key cryptosystems”, Communications of the ACM, Vol. 21, no. 2, 1978, pp. 120-126.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
28
-
-
0346933103
-
Quantum cryptography using femtosecond-pulsed parametric down-conversion
-
A.V. Sergienko, M. Atatüre, Z. Walton, G. Jaeger, B. E.A. Saleh and M.C. Teich, “Quantum cryptography using femtosecond-pulsed parametric down-conversion”, Physical Review A, Vol. 60, no. 4, October 1999, pp. R2622-R2625.
-
(1999)
Physical Review A
, vol.60
, Issue.4
, pp. 2622-2625
-
-
Sergienko, A.V.1
Atatüre, M.2
Walton, Z.3
Jaeger, G.4
Saleh, B.5
Teich, M.C.6
-
29
-
-
0142051871
-
Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer
-
P.W. Shor, “Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer”, SIAM Journal on Computing, Vol. 26, no. 5, 1997, pp. 1484-1509.
-
(1997)
SIAM Journal on Computing
, vol.26
, Issue.5
, pp. 1484-1509
-
-
Shor, P.W.1
-
30
-
-
0032121772
-
Experimental investigation of the performance limits for first telecommunications-window quantum cryptography systems
-
P. D. Townsend, “Experimental investigation of the performance limits for first telecommunications-window quantum cryptography systems”, IEEE Photonics Technology Letters, Vol. 10, 1998, pp. 1048-1050.
-
(1998)
IEEE Photonics Technology Letters
, vol.10
, pp. 1048-1050
-
-
Townsend, P.D.1
-
32
-
-
0001020515
-
Quantum amplifiers, quantum duplicators and quantum cryptography
-
H.P. Yuen, “Quantum amplifiers, quantum duplicators and quantum cryptography”, Quantum and Semiclassical Optics, Vol. 8, 1996, pp. 939-949.
-
(1996)
Quantum and Semiclassical Optics
, vol.8
, pp. 939-949
-
-
Yuen, H.P.1
|