Quantum Key Distribution: A Resource Letter
暂无分享,去创建一个
[1] Hoi-Kwong Lo,et al. Proof of security of quantum key distribution with two-way classical communications , 2001, IEEE Trans. Inf. Theory.
[2] H. Bechmann-Pasquinucci,et al. Incoherent and coherent eavesdropping in the six-state protocol of quantum cryptography , 1998, quant-ph/9807041.
[3] Won-Young Hwang. Quantum key distribution with high loss: toward global secure communication. , 2003, Physical review letters.
[4] Andrew Chi-Chih Yao,et al. Quantum cryptography with imperfect apparatus , 1998, Proceedings 39th Annual Symposium on Foundations of Computer Science (Cat. No.98CB36280).
[5] V. Scarani,et al. Device-independent security of quantum cryptography against collective attacks. , 2007, Physical review letters.
[6] J. Rarity,et al. Enhanced single photon fringe visibility in a 10 km-long prototype quantum cryptography channel , 1993 .
[7] N. Lütkenhaus. Security against individual attacks for realistic quantum key distribution , 2000 .
[8] John Preskill,et al. Security of quantum key distribution with imperfect devices , 2002, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..
[9] H. Chau,et al. Efficient Quantum Key Distribution , 1998, quant-ph/9803007.
[10] Stephen Wiesner,et al. Conjugate coding , 1983, SIGA.
[11] Shor,et al. Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.
[12] Adrian Kent,et al. No signaling and quantum key distribution. , 2004, Physical review letters.
[13] Gilles Brassard,et al. Experimental Quantum Cryptography , 1990, EUROCRYPT.
[14] A. Acín,et al. Secure device-independent quantum key distribution with causally independent measurement devices. , 2010, Nature communications.
[15] Michael O. Rabin,et al. How To Exchange Secrets with Oblivious Transfer , 2005, IACR Cryptol. ePrint Arch..
[16] N. Gisin,et al. Quantum cryptography , 1998 .
[17] Renato Renner,et al. Security of quantum key distribution , 2005, Ausgezeichnete Informatikdissertationen.
[18] N. Gisin,et al. Quantum Cryptography with Polarized Photons in Optical Fibres: Experiment and Practical Limits , 1994 .
[19] Yeshaiahu Fainman,et al. Security of quantum cryptography against individual attacks , 1998 .
[20] Jörn Müller-Quade,et al. Composability in quantum cryptography , 2009, ArXiv.
[21] Ekert,et al. Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.
[22] B Baek,et al. Long Distance Quantum Key Distribution in Optical Fiber , 2008, OFC/NFOEC 2008 - 2008 Conference on Optical Fiber Communication/National Fiber Optic Engineers Conference.
[23] Sae Woo Nam,et al. Quantum key distribution over a 40-dB channel loss using superconducting single-photon detectors , 2007, 0706.0397.
[24] Richard J. Hughes,et al. Quantum key distribution over a 48 km optical fibre network , 1999, quant-ph/9904038.
[25] D. Bruß,et al. Optimal eavesdropping in cryptography with three-dimensional quantum states. , 2001, Physical review letters.
[26] Gilles Brassard,et al. Experimental quantum cryptography: the dawn of a new era for quantum cryptography: the experimental prototype is working] , 1989, SIGACT News.
[27] Debbie W. Leung,et al. The Universal Composable Security of Quantum Key Distribution , 2004, TCC.
[28] Lo,et al. Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.
[29] Yi Zhao,et al. Experimental quantum key distribution with decoy states. , 2006, Physical review letters.
[30] Gilles Brassard,et al. Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.
[31] W. Dur,et al. Quantum repeaters for communication , 1998 .
[32] V. Scarani,et al. The security of practical quantum key distribution , 2008, 0802.4155.
[33] Anders Karlsson,et al. Security of quantum key distribution using d-level systems. , 2001, Physical review letters.
[34] Jian-Wei Pan,et al. Experimental demonstration of a BDCZ quantum repeater node , 2008, Nature.
[35] Douglas Stebila,et al. The Case for Quantum Key Distribution , 2009, QuantumComm.
[36] Weinfurter,et al. Quantum cryptography with entangled photons , 1999, Physical review letters.
[37] H. Inamori,et al. Unconditional security of practical quantum key distribution , 2007 .
[38] H. Weinfurter,et al. Distributing entanglement and single photons through an intra-city, free-space quantum channel , 2005, EQEC '05. European Quantum Electronics Conference, 2005..
[39] N. Gisin,et al. Long-distance entanglement-based quantum key distribution , 2000, quant-ph/0008039.
[40] Yeshaiahu Fainman,et al. Security of quantum cryptography against individual attacks , 1998, Other Conferences.
[41] Nicolas Gisin,et al. Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations. , 2004, Physical review letters.
[42] Sanders,et al. Limitations on practical quantum cryptography , 2000, Physical review letters.
[43] Thierry Paul,et al. Quantum computation and quantum information , 2007, Mathematical Structures in Computer Science.
[44] Hiroki Takesue,et al. Differential-phase-shift quantum key distribution , 2009, 2006 Digest of the LEOS Summer Topical Meetings.
[45] N. Lutkenhaus. Security against individual attacks for realistic quantum key distribution , 1999, quant-ph/9910093.
[46] J. Preskill. Fault-tolerant quantum computation , 1997, quant-ph/9712048.
[47] Goldenberg,et al. Quantum cryptography based on orthogonal states. , 1995, Physical review letters.
[48] N. Gisin,et al. Experimental Demonstration of Quantum Cryptography Using Polarized Photons in Optical Fibre over More than 1 km , 1993 .
[49] Dominic Mayers,et al. Unconditional security in quantum cryptography , 1998, JACM.
[50] C. G. Peterson,et al. Long-distance quantum key distribution in optical fibre , 2006, quant-ph/0607177.
[51] Charles H. Bennett,et al. Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.
[52] Z. Yuan,et al. Quantum key distribution over 122 km of standard telecom fiber , 2004, quant-ph/0412171.
[53] V. Scarani,et al. Towards practical and fast Quantum Cryptography , 2004, quant-ph/0411022.
[54] Gilles Brassard,et al. Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..