Post-quantum key exchange protocols
暂无分享,去创建一个
[1] Louis H. Kauffman,et al. Braiding operators are universal quantum gates , 2004, quant-ph/0401090.
[2] H. Bechmann-Pasquinucci,et al. Quantum cryptography , 2001, quant-ph/0101098.
[3] Brian Hayes,et al. Randomness as a Resource , 2001, American Scientist.
[4] Giuliano Scarcelli,et al. Distant Clock Synchronization Using Entangled Photon Pairs , 2004 .
[5] Julia Kempe,et al. Quantum random walks: An introductory overview , 2003, quant-ph/0303081.
[6] Keisuke Tanaka,et al. Quantum Public-Key Cryptosystems , 2000, CRYPTO.
[7] Dorian Goldfeld,et al. Zeta functions, one-way functions, and pseudorandom number generators , 1997 .
[8] Peter W. Shor,et al. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..
[9] W. J. Klepczynski,et al. GPS: primary tool for time transfer , 1999, Proc. IEEE.
[10] G. Collins. Computing with quantum knots. , 2006, Scientific American.
[11] Gilles Brassard,et al. Strengths and Weaknesses of Quantum Computing , 1997, SIAM J. Comput..
[12] Dominic Mayers,et al. Unconditional security in quantum cryptography , 1998, JACM.
[13] Wenbo Mao,et al. Modern Cryptography: Theory and Practice , 2003 .
[14] Charles H. Bennett,et al. Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels. , 1993, Physical review letters.
[15] Andrew Chi-Chih Yao,et al. Quantum Circuit Complexity , 1993, FOCS.
[16] Gadiel Seroussi,et al. Efficient Quantum Algorithms for Estimating Gauss Sums , 2002, quant-ph/0207131.
[17] Thomas Beth,et al. Synchronizing quantum clocks with classical one-way communication: Bounds on the generated entropy , 2003 .
[18] Andris Ambainis,et al. Quantum walks on graphs , 2000, STOC '01.
[19] Albert Einstein,et al. Can Quantum-Mechanical Description of Physical Reality Be Considered Complete? , 1935 .
[20] Chuang. Quantum algorithm for distributed clock synchronization , 2000, Physical review letters.
[21] Hoi-Kwong Lo,et al. Security of Quantum Key Distribution , 1998 .
[22] Lov K. Grover. A fast quantum mechanical algorithm for database search , 1996, STOC '96.
[23] Richard J. Hughes,et al. FREE-SPACE QUANTUM-KEY DISTRIBUTION , 1998, quant-ph/9801006.
[24] H. Weinfurter,et al. Experimental quantum teleportation , 1997, Nature.
[25] Chil-Min Kim,et al. Quantum key distribution with blind polarization bases. , 2005, Physical review letters.
[26] Mark Hillery,et al. Scattering theory and discrete-time quantum walks , 2003, quant-ph/0312062.
[27] R. K. Shyamasundar,et al. Introduction to algorithms , 1996 .
[28] N. Gisin,et al. Quantum cryptography over 23 km in installed under-lake telecom fibre , 1996 .
[29] S. Bartlett,et al. Quantum methods for clock synchronization: Beating the standard quantum limit without entanglement , 2005, quant-ph/0505112.
[30] Michael O. Rabin,et al. Hyper-Encryption and Everlasting Security , 2002, STACS.
[31] Nancy A. Lynch,et al. An Overview of Clock Synchronization , 1986, Fault-Tolerant Distributed Computing.
[32] Shor,et al. Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.
[33] Louis H. Kauffman. Teleportation topology , 2005 .
[34] Yakir Aharonov,et al. Can we make sense out of the measurement process in relativistic quantum mechanics , 1981 .