메뉴 건너뛰기




Volumn 15, Issue 8, 2004, Pages 1259-1264

Security of quantum cryptography against Trojan horse attacking

Author keywords

Quantum cryptoanalysis; Quantum cryptographic algorithm; Quantum cryptography; Trojan horse attacking strategy

Indexed keywords

ALGORITHMS; ROBUSTNESS (CONTROL SYSTEMS); SECURITY OF DATA;

EID: 8644230913     PISSN: 10009825     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (4)

References (8)
  • 3
    • 0033605546 scopus 로고    scopus 로고
    • Unconditional security of quantum key distribution over arbitrary long distances
    • Lo H-K, Chau HF. Unconditional security of quantum key distribution over arbitrary long distances Science, 1999, 283: 2050-2056.
    • (1999) Science , vol.283 , pp. 2050-2056
    • Lo, H.-K.1    Chau, H.F.2
  • 5
    • 0006375145 scopus 로고    scopus 로고
    • Identity verification in quantum cryptography
    • Zeng G, Zhang W. Identity verification in quantum cryptography Physical Review A, 2000, 61: 032303/1-5.
    • (2000) Physical Review A , vol.61
    • Zeng, G.1    Zhang, W.2
  • 6
    • 8644238437 scopus 로고    scopus 로고
    • A practical Trojan horse for bell-inequality-based quantum cryptography
    • arXiv: quant-ph/0111073,13
    • Larsson J. A practical Trojan horse for bell-inequality-based quantum cryptography. arXiv: quant-ph/0111073,13 Nov 2001.
    • (2001)
    • Larsson, J.1
  • 7
    • 17944384432 scopus 로고    scopus 로고
    • Quantum key distribution via quantum encryption
    • Zhang Y, Li C, Guo G. Quantum key distribution via quantum encryption Physical Review A, 2001, 64: 024302/1-4.
    • (2001) Physical Review A , vol.64
    • Zhang, Y.1    Li, C.2    Guo, G.3
  • 8
    • 0012390653 scopus 로고    scopus 로고
    • Quantum vernam cipher
    • arXiv: quant-ph/0012077, newest version
    • Leung DW. Quantum vernam cipher. arXiv: quant-ph/0012077, newest version, 2001.
    • (2001)
    • Leung, D.W.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.