A Proof of the Security of Quantum Key Distribution
暂无分享,去创建一个
P. Oscar Boykin | Eli Biham | Vwani P. Roychowdhury | Tal Mor | Michel Boyer | P. O. Boykin | V. Roychowdhury | E. Biham | P. Boykin | T. Mor | Michel Boyer
[1] Lo,et al. Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.
[2] Barry C. Sanders,et al. Security Aspects of Practical Quantum Cryptography , 2000, EUROCRYPT.
[3] Jeroen van de Graaf,et al. Security of Quantum Key Distribution against All Collective Attacks , 2002, Algorithmica.
[4] Peter W. Shor,et al. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..
[5] F. MacWilliams,et al. The Theory of Error-Correcting Codes , 1977 .
[6] W. Hoeffding. Probability Inequalities for sums of Bounded Random Variables , 1963 .
[7] Bennett,et al. Parity bit in quantum cryptography. , 1996, Physical review. A, Atomic, molecular, and optical physics.
[8] Kevin Barraclough,et al. I and i , 2001, BMJ : British Medical Journal.
[9] I. Chuang,et al. Quantum Computation and Quantum Information: Bibliography , 2010 .
[10] Sanders,et al. Limitations on practical quantum cryptography , 2000, Physical review letters.
[11] Ueli Maurer,et al. Generalized privacy amplification , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.
[12] Tal Mor. Quantum memory in quantum cryptography , 1999 .
[13] Stephen Wiesner,et al. Conjugate coding , 1983, SIGA.
[14] Gilles Brassard,et al. Secret-Key Reconciliation by Public Discussion , 1994, EUROCRYPT.
[15] E. Biham,et al. Security of Quantum Cryptography against Collective Attacks , 1996, quant-ph/9605007.
[16] Dominic Mayers,et al. Unconditional security in quantum cryptography , 1998, JACM.
[17] Patrick Billingsley,et al. Probability and Measure. , 1986 .
[18] E. Biahm,et al. Bounds on Information and the Security of Quantum Cryptography , 1996 .
[19] Dominic Mayers,et al. On the Security of the Quantum Oblivious Transfer and Key Distribution Protocols , 1995, CRYPTO.
[20] Hoi-Kwong Lo,et al. A simple proof of the unconditional security of quantum key distribution , 1999, ArXiv.
[21] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[22] N. Gisin,et al. Optimal Eavesdropping in Quantum Cryptography. I , 1997, quant-ph/9701039.
[23] Andrew Chi-Chih Yao,et al. Security of quantum protocols against coherent measurements , 1995, STOC '95.
[24] László Györfi,et al. A Probabilistic Theory of Pattern Recognition , 1996, Stochastic Modelling and Applied Probability.
[25] Gilles Brassard,et al. Experimental Quantum Cryptography , 1990, EUROCRYPT.
[26] MayersDominic. Unconditional security in quantum cryptography , 2001 .
[27] Jozef Gruska,et al. Quantum Computing , 2008, Wiley Encyclopedia of Computer Science and Engineering.
[28] T. Mor. Reducing Quantum Errors and Improving Large Scale Quantum Cryptography , 1996 .
[29] E. B. Davies,et al. Information and quantum measurement , 1978, IEEE Trans. Inf. Theory.
[30] Wolfgang Tittel,et al. Practical Aspects of Quantum Cryptographic Key Distribution , 2000, Journal of Cryptology.
[31] Barry C. Sanders,et al. Quantum cryptography via parametric downconversion , 2002 .
[32] P. Oscar Boykin,et al. A Proof of the Security of Quantum Key Distribution , 1999, Symposium on the Theory of Computing.
[33] Shor,et al. Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.
[34] Jeroen van de Graaf,et al. Cryptographic Distinguishability Measures for Quantum-Mechanical States , 1997, IEEE Trans. Inf. Theory.
[35] N. Gisin,et al. OPTIMAL EAVESDROPPING IN QUANTUM CRYPTOGRAPHY. I. INFORMATION BOUND AND OPTIMAL STRATEGY , 1997 .
[36] L. Ballentine,et al. Quantum Theory: Concepts and Methods , 1994 .
[37] Aaas News,et al. Book Reviews , 1893, Buffalo Medical and Surgical Journal.
[38] P. Billingsley,et al. Probability and Measure , 1980 .
[39] Deutsch,et al. Quantum Privacy Amplification and the Security of Quantum Cryptography over Noisy Channels. , 1996, Physical review letters.
[40] Dominic Mayers,et al. Quantum Key Distribution and String Oblivious Transfer in Noisy Channels , 1996, CRYPTO.
[41] Robert G. Gallager,et al. Low-density parity-check codes , 1962, IRE Trans. Inf. Theory.