Current and voltage based bit errors and their combined mitigation for the Kirchhoff-law–Johnson-noise secure key exchange
暂无分享,去创建一个
Laszlo B. Kish | Claes-Goran Granqvist | Robert Mingesz | Zoltan Gingl | Yessica Saez | L. Kish | C. Granqvist | Z. Gingl | R. Mingesz | Y. Saez
[1] Vadim Makarov,et al. Comment on “Resilience of gated avalanche photodiodes against bright illumination attacks in quantum cryptography” [Appl. Phys. Lett. 98, 231104 (2011)] , 2011, 1106.3756.
[2] Vadim Makarov,et al. Avoiding the blinding attack in QKD , 2010 .
[3] J. Skaar,et al. Thermal blinding of gated detectors in quantum cryptography. , 2010, Optics express.
[4] Vadim Makarov,et al. Controlling an actively-quenched single photon detector with bright light. , 2008, Optics express.
[5] Laszlo B. Kish,et al. Totally secure classical communication utilizing Johnson (-like) noise and Kirchoff's law , 2005, physics/0509136.
[6] Osamu Hirota,et al. Incompleteness and Limit of Quantum Key Distribution Theory : Yuen theory vs Renner theory , 2012, 1208.2106.
[7] Derek Abbott,et al. Critical Analysis of the Bennett–Riedel Attack on Secure Cryptographic Key Distributions via the Kirchhoff-Law–Johnson-Noise Scheme , 2013, PloS one.
[8] Laszlo B. Kish,et al. UNCONDITIONALLY SECURE COMPUTERS, ALGORITHMS AND HARDWARE, SUCH AS MEMORIES, PROCESSORS, KEYBOARDS, FLASH AND HARD DRIVES , 2008, 0803.4479.
[9] Horace P. Yuen. Unconditional Security In Quantum Key Distribution , 2012 .
[10] James F. Dynes,et al. Avoiding the blinding attack in QKD , 2010 .
[11] J. Skaar,et al. Tailored bright illumination attack on distributed-phase-reference protocols , 2010, 1012.4366.
[12] Gilles Brassard,et al. Quantum Cryptography, or Unforgeable Subway Tokens , 1982, CRYPTO.
[13] L. Kish,et al. TOTALLY SECURE CLASSICAL NETWORKS WITH MULTIPOINT TELECLONING (TELEPORTATION) OF CLASSICAL BITS THROUGH LOOPS WITH JOHNSON-LIKE NOISE , 2006, physics/0603041.
[14] Laszlo B. Kish,et al. Enhanced secure key exchange systems based on the Johnson-noise scheme , 2013, ArXiv.
[16] Ferdinand Peper,et al. Information Networks Secured by the Laws of Physics , 2011, IEICE Trans. Commun..
[17] Hatim Salih,et al. Protocol for direct counterfactual quantum communication. , 2012, Physical review letters.
[18] L. Kish,et al. Johnson(-like)-Noise-Kirchhoff-loop based secure classical communicator characteristics, for ranges of two to two thousand kilometers, via model-line ✩ , 2006, physics/0612153.
[19] V. Makarov. Controlling passively quenched single photon detectors by bright light , 2007, 0707.3987.
[20] J. Skaar,et al. After-gate attack on a quantum cryptosystem , 2010, 1009.2683.
[21] Robert S. Balog,et al. Information Theoretically Secure, Enhanced Johnson Noise Based Key Distribution over the Smart Grid with Switched Filters , 2013, PloS one.
[22] Laszlo B. Kish. PROTECTION AGAINST THE MAN-IN-THE-MIDDLE-ATTACK FOR THE KIRCHHOFF-LOOP-JOHNSON(-LIKE)-NOISE CIPHER AND EXPANSION BY VOLTAGE-BASED SECURITY , 2006 .
[23] Kentaro Kato,et al. Incompleteness and limit of security theory of quantum key distribution , 2012, Other Conferences.
[24] Laszlo B. Kish,et al. Unconditional Security by the Laws of Classical Physics , 2013 .
[25] Horace P. Yuen. Security Significance of the Trace Distance Criterion in Quantum Key Distribution , 2011 .
[26] Zeeya Merali,et al. Hackers blind quantum cryptographers , 2010 .
[27] Laszlo B. Kish,et al. Errors and Their Mitigation at the Kirchhoff-Law-Johnson-Noise Secure Key Exchange , 2013, PloS one.
[28] Carles Padró,et al. Information Theoretic Security , 2013, Lecture Notes in Computer Science.
[29] Igor Rychlik. On Some Reliability Applications of Rice's Formula for the Intensity of Level Crossings , 2000 .
[30] J. Skaar,et al. Hacking commercial quantum cryptography systems by tailored bright illumination , 2010, 1008.4593.
[31] Horace P. Yuen,et al. On the Foundations of Quantum Key Distribution - Reply to Renner and Beyond , 2012 .
[32] Vadim Makarov,et al. Superlinear threshold detectors in quantum cryptography , 2011, 1106.2119.
[33] J. Skaar,et al. Controlling a superconducting nanowire single-photon detector using tailored bright illumination , 2011, 1106.2396.
[34] Chiman Kwan,et al. Physical uncloneable function hardware keys utilizing Kirchhoff-law-Johnson-noise secure key exchange and noise-based logic , 2013, ArXiv.
[35] H.P. Yuen,et al. Key Generation: Foundations and a New Quantum Approach , 2009, IEEE Journal of Selected Topics in Quantum Electronics.
[36] Gerd Leuchs,et al. Device calibration impacts security of quantum key distribution. , 2011, Physical review letters.
[37] Christian Kurtsiefer,et al. Full-field implementation of a perfect eavesdropper on a quantum cryptography system. , 2010, Nature communications.
[38] Renato Renner,et al. Reply to recent scepticism about the foundations of quantum cryptography , 2012, ArXiv.
[39] S. Rice. Mathematical analysis of random noise , 1944 .
[40] Vadim Makarov,et al. Faked states attack using detector efficiency mismatch on SARG04, phase-time, DPSK, and Ekert protocols , 2007, Quantum Inf. Comput..
[41] Christian Kurtsiefer,et al. Experimentally faking the violation of Bell's inequalities. , 2011, Physical review letters.