-
1
-
-
0001293325
-
Incoherent and coherent eavesdropping in the six-state protocol of quantum cryptography
-
H. Bechmann-Pasquinucci and N. Gisin, Incoherent and coherent eavesdropping in the six-state protocol of quantum cryptography, Phys. Rev. A, Vol. 59, No. 6, pp. 4238-4248, 1999.
-
(1999)
Phys. Rev. A
, vol.59
, Issue.6
, pp. 4238-4248
-
-
Bechmann-Pasquinucci, H.1
Gisin, N.2
-
2
-
-
4243789313
-
Purification of noisy entanglement and faithful teleportation via noisy channels
-
C. H. Bennett, G. Brassard, S. Popescu, B. Schumacher, J. A. Smolin, and W. K. Wooters, Purification of noisy entanglement and faithful teleportation via noisy channels, Phys. Rev. Lett., Vol. 76, pp. 722-725, 1996.
-
(1996)
Phys. Rev. Lett.
, vol.76
, pp. 722-725
-
-
Bennett, C.H.1
Brassard, G.2
Popescu, S.3
Schumacher, B.4
Smolin, J.A.5
Wooters, W.K.6
-
3
-
-
0003259517
-
Quantum cryptography: Public key distribution and coin tossing
-
C. H. Bennett and G. Brassard, Quantum cryptography: public key distribution and coin tossing, Proceedings of the IEEE International Conference on Computer, Systems, and Signal Processing, IEEE, pp. 175-179, 1984.
-
(1984)
Proceedings of the IEEE International Conference on Computer, Systems, and Signal Processing, IEEE
, pp. 175-179
-
-
Bennett, C.H.1
Brassard, G.2
-
4
-
-
11544350211
-
Optimal eavesdropping in quantum cryptography with six states
-
D. Bruss, Optimal eavesdropping in quantum cryptography with six states, Phys. Rev. Lett., Vol. 81, No. 14, pp. 3018-3021, 1998.
-
(1998)
Phys. Rev. Lett.
, vol.81
, Issue.14
, pp. 3018-3021
-
-
Bruss, D.1
-
5
-
-
0038465444
-
Quantum copying: Beyond the no-cloning theorem
-
V. Bužek and M. Hillery, Quantum copying: beyond the no-cloning theorem, Phys. Rev. A, Vol. 54, pp. 1844-1852, 1996.
-
(1996)
Phys. Rev. A
, vol.54
, pp. 1844-1852
-
-
Bužek, V.1
Hillery, M.2
-
6
-
-
36049056258
-
Proposed experiment to test local hidden-variable theories
-
J. F. Clauser, M. A. Horne, A. Shimony and R. A. Holt, Proposed experiment to test local hidden-variable theories, Phys. Rev. Lett., Vol. 23, pp. 880-884, 1969.
-
(1969)
Phys. Rev. Lett.
, vol.23
, pp. 880-884
-
-
Clauser, J.F.1
Horne, M.A.2
Shimony, A.3
Holt, R.A.4
-
8
-
-
6144265213
-
Quantum privacy amplification and the security of quantum cryptography over noisy channels
-
D. Deutsch, A. Ekert, R. Jozsa, C. Macchiavello, S. Popescu, and A. Sanpera, Quantum privacy amplification and the security of quantum cryptography over noisy channels, Phys. Rev. Lett., Vol. 77, pp. 2818-2821, 1996.
-
(1996)
Phys. Rev. Lett.
, vol.77
, pp. 2818-2821
-
-
Deutsch, D.1
Ekert, A.2
Jozsa, R.3
Macchiavello, C.4
Popescu, S.5
Sanpera, A.6
-
9
-
-
0141878927
-
-
quantph/ 9910026
-
D. P. DiVincenzo, P. W. Shor, J. A. Smolin, B. M. Terhal, and A. V. Thapliyal, Evidence for bound entangled states with negative partial transpose, quantph/ 9910026, 1999.
-
(1999)
Evidence for Bound Entangled States with Negative Partial Transpose
-
-
Divincenzo, D.P.1
Shor, P.W.2
Smolin, J.A.3
Terhal, B.M.4
Thapliyal, A.V.5
-
10
-
-
0343152990
-
Quantum cryptography based on Bell’s theorem
-
See also Physics World, March 1998
-
A. E. Ekert, Quantum cryptography based on Bell’s theorem, Phys. Rev. Lett., Vol. 67, pp. 661-663, 1991. See also Physics World, March 1998.
-
(1991)
Phys. Rev. Lett
, vol.67
, pp. 661-663
-
-
Ekert, A.E.1
-
11
-
-
5344222062
-
Optimal eavesdropping in quantum cryptography-I: Information bound and optimal strategy
-
C. Fuchs, N. Gisin, R. B. Griffiths, C. S. Niu, and A. Peres, Optimal eavesdropping in quantum cryptography-I: information bound and optimal strategy, Phys. Rev. A, Vol. 56, pp. 1163-1172, 1997.
-
(1997)
Phys. Rev. A
, vol.56
, pp. 1163-1172
-
-
Fuchs, C.1
Gisin, N.2
Griffiths, R.B.3
Niu, C.S.4
Peres, A.5
-
12
-
-
0000523928
-
Stochastic quantum dynamics and relativity
-
N. Gisin, Stochastic quantum dynamics and relativity, Helv. Phys. Acta, Vol. 62, pp. 363-371, 1989.
-
(1989)
Helv. Phys. Acta
, vol.62
, pp. 363-371
-
-
Gisin, N.1
-
13
-
-
0042735997
-
Quantum cloning, eavesdropping, and Bell inequality
-
N. Gisin and B. Huttner, Quantum cloning, eavesdropping, and Bell inequality, Phys. Lett. A, Vol. 228, pp. 13-21, 1997.
-
(1997)
Phys. Lett. A
, vol.228
, pp. 13-21
-
-
Gisin, N.1
Huttner, B.2
-
14
-
-
0001554545
-
Optimal quantum cloning machines
-
N. Gisin and S. Massar, Optimal quantum cloning machines, Phys. Rev. Lett., Vol. 79, pp. 2153-2156, 1997.
-
(1997)
Phys. Rev. Lett.
, vol.79
, pp. 2153-2156
-
-
Gisin, N.1
Massar, S.2
-
15
-
-
0000324562
-
Quantum cryptography on noisy channels: Quantum versus classical key agreement protocols
-
N. Gisin and S. Wolf, Quantum cryptography on noisy channels: quantum versus classical key agreement protocols, Phys. Rev. Lett., Vol. 83, pp. 4200-4203, 1999.
-
(1999)
Phys. Rev. Lett.
, vol.83
, pp. 4200-4203
-
-
Gisin, N.1
Wolf, S.2
-
16
-
-
0008001217
-
Mixed-state entanglement and distillation: Is there a “bound” entanglement in nature?
-
M. Horodecki, P. Horodecki, and R. Horodecki, Mixed-state entanglement and distillation: is there a “bound” entanglement in nature?, Phys. Rev. Lett., Vol. 80, pp. 5239-5242, 1998.
-
(1998)
Phys. Rev. Lett.
, vol.80
, pp. 5239-5242
-
-
Horodecki, M.1
Horodecki, P.2
Horodecki, R.3
-
17
-
-
0042542909
-
Separability criterion and inseparable mixed states with positive partial transposition
-
P. Horodecki, Separability criterion and inseparable mixed states with positive partial transposition, Phys. Lett. A, Vol. 232, p. 333, 1997.
-
(1997)
Phys. Lett. A
, vol.232
, pp. 333
-
-
Horodecki, P.1
-
18
-
-
0000239556
-
Bound entanglement can be activated
-
quant-ph/9806058
-
P. Horodecki, M. Horodecki, and R. Horodecki, Bound entanglement can be activated, Phys. Rev. Lett., Vol. 82, pp. 1056-1059, 1999. quant-ph/9806058.
-
(1999)
Phys. Rev. Lett
, vol.82
, pp. 1056-1059
-
-
Horodecki, P.1
Horodecki, M.2
Horodecki, R.3
-
19
-
-
0001992982
-
A complete classification of quantum ensembles having a given density matrix
-
L. P. Hughston, R. Jozsa, and W. K. Wootters, A complete classification of quantum ensembles having a given density matrix, Phys. Lett. A, Vol. 183, pp. 14-18, 1993.
-
(1993)
Phys. Lett. A
, vol.183
, pp. 14-18
-
-
Hughston, L.P.1
Jozsa, R.2
Wootters, W.K.3
-
20
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
U. Maurer, Secret key agreement by public discussion from common information, IEEE Transactions on Information Theory, Vol. 39, No. 3, pp. 733-742, 1993.
-
(1993)
IEEE Transactions on Information Theory
, vol.39
, Issue.3
, pp. 733-742
-
-
Maurer, U.1
-
21
-
-
84948960386
-
Information-theoretic key agreement: From weak to strong secrecy for free
-
Springer-Verlag
-
U. Maurer and S. Wolf, Information-theoretic key agreement: from weak to strong secrecy for free, Proceedings of EUROCRYPT 2000, Lecture Notes in Computer Science, Vol. 1807, pp. 352-368, Springer-Verlag, 2000.
-
(2000)
Proceedings of EUROCRYPT 2000, Lecture Notes in Computer Science
, vol.1807
, pp. 352-368
-
-
Maurer, U.1
Wolf, S.2
-
22
-
-
0033097504
-
Unconditionally secure key agreement and the intrinsic conditional information
-
U. Maurer and S. Wolf, Unconditionally secure key agreement and the intrinsic conditional information, IEEE Transactions on Information Theory, Vol. 45, No. 2, pp. 499-514, 1999.
-
(1999)
IEEE Transactions on Information Theory
, vol.45
, Issue.2
, pp. 499-514
-
-
Maurer, U.1
Wolf, S.2
-
23
-
-
0032207846
-
The Ithaca interpretation of quantum mechanics
-
N. D. Mermin, The Ithaca interpretation of quantum mechanics, Pramana, Vol. 51, pp. 549-565, 1998.
-
(1998)
Pramana
, vol.51
, pp. 549-565
-
-
Mermin, N.D.1
-
25
-
-
0037574296
-
Separability criterion for density matrices
-
A. Peres, Separability criterion for density matrices, Phys. Rev. Lett., Vol. 77, pp. 1413-1415, 1996.
-
(1996)
Phys. Rev. Lett.
, vol.77
, pp. 1413-1415
-
-
Peres, A.1
-
27
-
-
0032178451
-
Automated plug and play quantum key distribution
-
G. Ribordy, J. D. Gautier, N. Gisin, O. Guinnard, and H. Zbinden, Automated plug and play quantum key distribution, Electron. Lett., Vol. 34, pp. 2116-2117, 1998.
-
(1998)
Electron. Lett.
, vol.34
, pp. 2116-2117
-
-
Ribordy, G.1
Gautier, J.D.2
Gisin, N.3
Guinnard, O.4
Zbinden, H.5
-
28
-
-
84890522850
-
Communication theory of secrecy systems
-
C. E. Shannon, Communication theory of secrecy systems, Bell System Technical Journal, Vol. 28, pp. 656-715, 1949.
-
(1949)
Bell System Technical Journal
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
30
-
-
0016562514
-
The wire-tap channel
-
A. D. Wyner, The wire-tap channel, Bell System Technical Journal, Vol. 54, No. 8, pp. 1355-1387, 1975.
-
(1975)
Bell System Technical Journal
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
31
-
-
0032292753
-
Quantum cryptography
-
H. Zbinden, H. Bechmann, G. Ribordy, and N. Gisin, Quantum cryptography, Applied Physics B, Vol. 67, pp. 743-748, 1998.
-
(1998)
Applied Physics B
, vol.67
, pp. 743-748
-
-
Zbinden, H.1
Bechmann, H.2
Ribordy, G.3
Gisin, N.4
|