Reversed Space Attacks
暂无分享,去创建一个
Ran Gelles | Tal Mor | T. Mor | R. Gelles
[1] Johannes Skaar,et al. Security of quantum key distribution with arbitrary individual imperfections , 2009, 0903.3525.
[2] Yoshihiro Nambu,et al. BB84 Quantum Key Distribution System Based on Silica-Based Planar Lightwave Circuits , 2004, quant-ph/0404015.
[3] N. Lutkenhaus. Security against individual attacks for realistic quantum key distribution , 1999, quant-ph/9910093.
[4] J.-W. Park,et al. No-Clicking Event in the Quantum Key Distribution , 2004 .
[5] M. Dušek,et al. Chapter 5 - Quantum cryptography , 2006, quant-ph/0601207.
[6] J. Skaar,et al. Effects of detector efficiency mismatch on security of quantum cryptosystems , 2005, quant-ph/0511032.
[7] Gilles Brassard,et al. Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.
[8] Paul D. Townsend,et al. Asymmetric Mach-Zehnder germano-silicate channel waveguide interferometers for quantum cryptography systems , 2001 .
[9] Alexander V. Sergienko,et al. Entangled States in Quantum Key Distribution , 2006 .
[10] Charles H. Bennett,et al. Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.
[11] Adrian Kent,et al. Unconditionally secure device-independent quantum key distribution with only two devices , 2012, ArXiv.
[12] Dominic Mayers,et al. Unconditional security in quantum cryptography , 1998, JACM.
[13] Debbie W. Leung,et al. The Universal Composable Security of Quantum Key Distribution , 2004, TCC.
[14] M. Beck. Introductory Quantum Optics , 2005 .
[15] John Preskill,et al. Security of quantum key distribution with imperfect devices , 2002, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..
[16] Shor,et al. Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.
[17] T. Hatanaka,et al. Planar lightwave circuits for quantum cryptographic systems , 2003, quant-ph/0307074.
[18] Sanders,et al. Limitations on practical quantum cryptography , 2000, Physical review letters.
[19] M. Curty,et al. Measurement-device-independent quantum key distribution. , 2011, Physical review letters.
[20] Renato Renner,et al. Security of quantum key distribution , 2005, Ausgezeichnete Informatikdissertationen.
[21] Richard Hughes,et al. Quantum crytography over 14km of installed optical fiber , 1996 .
[22] P. Townsend. Secure key distribution system based on quantum cryptography , 1994 .
[23] N. Gisin,et al. Quantum cryptography , 1998 .
[24] S. Massar,et al. Efficient quantum key distribution secure against no-signalling eavesdroppers , 2006, quant-ph/0605246.
[25] Z. Yuan,et al. Quantum key distribution over 122 km of standard telecom fiber , 2004, quant-ph/0412171.
[26] Marco Tomamichel,et al. Tight finite-key analysis for quantum cryptography , 2011, Nature Communications.
[27] Dag R. Hjelme,et al. Faked states attack on quantum cryptosystems , 2005 .
[28] Akihisa Tomita,et al. Photonic Realization of Quantum Information Systems , 2006 .
[29] James F. Dynes,et al. Practical gigahertz quantum key distribution based on avalanche photodiodes , 2009 .
[30] Ran Gelles,et al. Attacks on Fixed Apparatus Quantum Key Distribution Schemes , 2012, TPNC.
[31] M. Teich,et al. Decoherence-free subspaces in quantum key distribution. , 2003, Physical review letters.
[32] Ran Gelles,et al. On the Security of Interferometric Quantum Key Distribution , 2011, TPNC.
[33] Biham,et al. Quantum cryptographic network based on quantum memories. , 1996, Physical review. A, Atomic, molecular, and optical physics.
[34] Vaidman,et al. Properties of a quantum system during the time interval between two measurements. , 1990, Physical review. A, Atomic, molecular, and optical physics.
[35] P. Oscar Boykin,et al. A Proof of the Security of Quantum Key Distribution , 1999, STOC '00.
[36] Andrew Chi-Chih Yao,et al. Quantum cryptography with imperfect apparatus , 1998, Proceedings 39th Annual Symposium on Foundations of Computer Science (Cat. No.98CB36280).
[37] Richard J. Hughes,et al. Quantum key distribution over a 48 km optical fibre network , 1999, quant-ph/9904038.
[38] A. Acín,et al. Secure device-independent quantum key distribution with causally independent measurement devices. , 2010, Nature communications.
[39] Reck,et al. Experimental realization of any discrete unitary operator. , 1994, Physical review letters.
[40] V. Scarani,et al. Device-independent security of quantum cryptography against collective attacks. , 2007, Physical review letters.
[41] T. Mor,et al. Quantum-Space Attacks , 2007, 0711.3019.
[42] Akihisa Tomita,et al. Single-photon Interference over 150 km Transmission Using Silica-based Integrated-optic Interferometers for Quantum Cryptography , 2004, quant-ph/0403104.
[43] J. Lebowitz,et al. TIME SYMMETRY IN THE QUANTUM PROCESS OF MEASUREMENT , 1964 .
[44] Chip Elliott,et al. Quantum cryptography in practice , 2003, SIGCOMM '03.