-
1
-
-
0003259517
-
Quantum cryptography: Public key distribution and coin tossing
-
Bangalore, India
-
C. Bennett and G. Brassard, "Quantum cryptography: Public key distribution and coin tossing," in Proceedings of IEEE International Conference on Computers, Systems & Signal Processing, Bangalore, India, 1984, pp. 175-179.
-
(1984)
Proceedings of IEEE International Conference on Computers, Systems & Signal Processing
, pp. 175-179
-
-
Bennett, C.1
Brassard, G.2
-
2
-
-
0018036292
-
An overview of public key cryptography
-
November
-
M. Hellman, "An overview of public key cryptography," Communications Society Magazine, IEEE, Vol. 16, no. 6, pp. 24-32, November 1978.
-
(1978)
Communications Society Magazine, IEEE
, vol.16
, Issue.6
, pp. 24-32
-
-
Hellman, M.1
-
3
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Feb.
-
R. L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Commun. ACM, Vol. 21, no. 2, pp. 120-126, Feb. 1978.
-
(1978)
Commun. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
4
-
-
84944878354
-
-
1st ed. Boca Raton, FL, USA: CRC Press, Inc.
-
A. J. Menezes, S. A. Vanstone, and P. C. V. Oorschot, Handbook of Applied Cryptography, 1st ed. Boca Raton, FL, USA: CRC Press, Inc., 1996.
-
(1996)
Handbook of Applied Cryptography
-
-
Menezes, A.J.1
Vanstone, S.A.2
Oorschot, P.C.V.3
-
5
-
-
0142051871
-
Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer
-
Oct. [Online]. Available
-
P. W. Shor, "Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer," SIAM J. Comput., Vol. 26, no. 5, pp. 1484-1509, Oct. 1997. [Online]. Available: http://dx.doi.org/10.1137/S0097539795293172
-
(1997)
SIAM J. Comput.
, vol.26
, Issue.5
, pp. 1484-1509
-
-
Shor, P.W.1
-
6
-
-
0343152990
-
Quantum cryptography based on bells theorem
-
Aug [Online]. Available
-
A. K. Ekert, "Quantum cryptography based on bells theorem," Phys. Rev. Lett., Vol. 67, pp. 661-663, Aug 1991. [Online]. Available: http://link.aps.org/doi/10.1103/PhysRevLett.67.661
-
(1991)
Phys. Rev. Lett.
, vol.67
, pp. 661-663
-
-
Ekert, A.K.1
-
7
-
-
0041415963
-
Quantum key distribution with high loss: Toward global secure communication
-
Aug [Online]. Available
-
W.-Y. Hwang, "Quantum key distribution with high loss: Toward global secure communication," Phys. Rev. Lett., Vol. 91, p. 057901, Aug 2003. [Online]. Available: http://link.aps.org/doi/10.1103/PhysRevLett.91.057901
-
(2003)
Phys. Rev. Lett.
, vol.91
-
-
Hwang, W.-Y.1
-
8
-
-
1642383816
-
Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations
-
Feb [Online]. Available
-
V. Scarani, A. Acin, G. Ribordy, and N. Gisin, "Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations," Phys. Rev. Lett., Vol. 92, p. 057901, Feb 2004. [Online]. Available: http://link.aps.org/doi/10.1103/PhysRevLett.92.057901
-
(2004)
Phys. Rev. Lett.
, vol.92
-
-
Scarani, V.1
Acin, A.2
Ribordy, G.3
Gisin, N.4
-
9
-
-
84915803625
-
Quantum key distribution based on selective post-processing in passive optical networks
-
May
-
J. Martinez-Mateo, A. Ciurana, and V. Martin, "Quantum key distribution based on selective post-processing in passive optical networks," Photonics Technology Letters, IEEE, Vol. 26, no. 9, pp. 881-884, May 2014.
-
(2014)
Photonics Technology Letters, IEEE
, vol.26
, Issue.9
, pp. 881-884
-
-
Martinez-Mateo, J.1
Ciurana, A.2
Martin, V.3
-
10
-
-
84876213250
-
Secure optical networks based on quantum key distribution and weakly trusted repeaters
-
IEEE/OSA Journal of April
-
D. Elkouss, J. Martinez-Mateo, A. Ciurana, and V. Martin, "Secure optical networks based on quantum key distribution and weakly trusted repeaters," Optical Communications and Networking, IEEE/OSA Journal of, Vol. 5, no. 4, pp. 316-328, April 2013.
-
(2013)
Optical Communications and Networking
, vol.5
, Issue.4
, pp. 316-328
-
-
Elkouss, D.1
Martinez-Mateo, J.2
Ciurana, A.3
Martin, V.4
-
11
-
-
84891363941
-
Multi-photon tolerant secure quantum communication 2014; from theory to practice
-
2013 IEEE International Conference on, June
-
Y. Chen, S. Kak, P. Verma, G. Macdonald, M. El Rifai, and N. Punekar, "Multi-photon tolerant secure quantum communication 2014; from theory to practice," in Communications (ICC), 2013 IEEE International Conference on, June 2013, pp. 2111-2116.
-
(2013)
Communications (ICC)
, pp. 2111-2116
-
-
Chen, Y.1
Kak, S.2
Verma, P.3
Macdonald, G.4
El Rifai, M.5
Punekar, N.6
-
12
-
-
33646470713
-
A three-stage quantum cryptography protocol
-
S. Kak, "A three-stage quantum cryptography protocol," Foundations of Physics Letters, Vol. 19, no. 3, pp. 293-296, 2006.
-
(2006)
Foundations of Physics Letters
, vol.19
, Issue.3
, pp. 293-296
-
-
Kak, S.1
-
13
-
-
74849116818
-
K08: A generalized bb84/b92 protocol in quantum cryptography
-
[Online]. Available
-
S. V. Kartalopoulos, "K08: a generalized bb84/b92 protocol in quantum cryptography," Security and Communication Networks, Vol. 2, no. 6, pp. 686-693, 2009. [Online]. Available: http://dx.doi.org/10.1002/sec.111
-
(2009)
Security and Communication Networks
, vol.2
, Issue.6
, pp. 686-693
-
-
Kartalopoulos, S.V.1
-
14
-
-
84858966799
-
A qkd protocol with a two-way quantum channel
-
2011 IEEE 5th International Conference on, Dec
-
F. Zamani and P. Verma, "A qkd protocol with a two-way quantum channel," in Advanced Networks and Telecommunication Systems (ANTS), 2011 IEEE 5th International Conference on, Dec 2011, pp. 1-6.
-
(2011)
Advanced Networks and Telecommunication Systems (ANTS)
, pp. 1-6
-
-
Zamani, F.1
Verma, P.2
-
15
-
-
84886305560
-
A probabilistic quantum key transfer protocol
-
[Online]. Available
-
A. Parakh, "A probabilistic quantum key transfer protocol," Security and Communication Networks, Vol. 6, no. 11, pp. 1389-1395, 2013. [Online]. Available: http://dx.doi.org/10.1002/sec.736
-
(2013)
Security and Communication Networks
, vol.6
, Issue.11
, pp. 1389-1395
-
-
Parakh, A.1
-
16
-
-
1542593353
-
Authentication and authenticated key exchanges
-
Jun. [Online]. Available
-
W. Diffie, P. C. Van Oorschot, and M. J. Wiener, "Authentication and authenticated key exchanges," Des. Codes Cryptography, Vol. 2, no. 2, pp. 107-125, Jun. 1992. [Online]. Available: http://dx.doi.org/10.1007/BF00124891
-
(1992)
Des. Codes Cryptography
, vol.2
, Issue.2
, pp. 107-125
-
-
Diffie, W.1
Van Oorschot, P.C.2
Wiener, M.J.3
-
17
-
-
0017018484
-
New directions in cryptography
-
Sep. [Online]. Available
-
W. Diffie and M. Hellman, "New directions in cryptography," IEEE Trans. Inf. Theor., Vol. 22, no. 6, pp. 644-654, Sep. 2006. [Online]. Available: http://dx.doi.org/10.1109/TIT.1976.1055638
-
(2006)
IEEE Trans. Inf. Theor.
, vol.22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.2
|