The Physics of Quantum Information

[1]  G. S. Vernam,et al.  Cipher Printing Telegraph Systems For Secret Wire and Radio Telegraphic Communications , 1926, Transactions of the American Institute of Electrical Engineers.

[2]  W. Heisenberg Über den anschaulichen Inhalt der quantentheoretischen Kinematik und Mechanik , 1927 .

[3]  N. Bohr The Quantum Postulate and the Recent Development of Atomic Theory , 1928, Nature.

[4]  Niels Bohr Das Quantenpostulat und die neuere Entwicklung der Atomistik , 1928 .

[5]  H. P. Robertson The Uncertainty Principle , 1929 .

[6]  L. Szilard über die Entropieverminderung in einem thermodynamischen System bei Eingriffen intelligenter Wesen , 1929 .

[7]  Albert Einstein,et al.  Can Quantum-Mechanical Description of Physical Reality Be Considered Complete? , 1935 .

[8]  C. E. SHANNON,et al.  A mathematical theory of communication , 1948, MOCO.

[9]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[10]  J. von Neumann,et al.  Probabilistic Logic and the Synthesis of Reliable Organisms from Unreliable Components , 1956 .

[11]  I. Hirschman,et al.  A Note on Entropy , 1957 .

[12]  Jack K. Wolf,et al.  Noiseless coding of correlated information sources , 1973, IEEE Trans. Inf. Theory.

[13]  A. Holevo Statistical decision theory for quantum systems , 1973 .

[14]  Alexander Semenovich Holevo Statistical problems in quantum physics , 1973 .

[15]  I. Bialynicki-Birula,et al.  Uncertainty relations for information entropy in wave mechanics , 1975 .

[16]  W. Beckner Inequalities in Fourier analysis , 1975 .

[17]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[18]  Larry Carter,et al.  Universal classes of hash functions (Extended Abstract) , 1977, STOC '77.

[19]  Larry Carter,et al.  Universal Classes of Hash Functions , 1979, J. Comput. Syst. Sci..

[20]  Charles H. Bennett,et al.  The thermodynamics of computation—a review , 1982 .

[21]  D. Deutsch Uncertainty in Quantum Measurements , 1983 .

[22]  Wojciech H. Zurek,et al.  Reversibility and stability of information processing systems , 1984 .

[23]  Péter Gács,et al.  Reliable computation with cellular automata , 1983, J. Comput. Syst. Sci..

[24]  Rolf Landauer,et al.  Computation and physics: Wheeler's meaning circuit? , 1986 .

[25]  Kraus Complementary observables and uncertainty relations. , 1987, Physical review. D, Particles and fields.

[26]  Maassen,et al.  Generalized entropic uncertainty relations. , 1988, Physical review letters.

[27]  Rolf Landauer,et al.  Dissipation and noise immunity in computation and communication , 1988, Nature.

[28]  R. Landauer Information is physical , 1991 .

[29]  Charles H. Bennett,et al.  Quantum cryptography without Bell's theorem. , 1992, Physical review letters.

[30]  Charles H. Bennett,et al.  Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.

[31]  Charles H. Bennett,et al.  Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels. , 1993, Physical review letters.

[32]  William K. Wootters,et al.  A ‘Pretty Good’ Measurement for Distinguishing Quantum States , 1994 .

[33]  Shor,et al.  Scheme for reducing decoherence in quantum computer memory. , 1995, Physical review. A, Atomic, molecular, and optical physics.

[34]  Andrew Chi-Chih Yao,et al.  Security of quantum protocols against coherent measurements , 1995, STOC '95.

[35]  Hall,et al.  Information Exclusion Principle for Complementary Observables. , 1995, Physical review letters.

[36]  R. Landauer The physical nature of information , 1996 .

[37]  Shor,et al.  Good quantum error-correcting codes exist. , 1995, Physical review. A, Atomic, molecular, and optical physics.

[38]  Schumacher,et al.  Quantum data processing and error correction. , 1996, Physical review. A, Atomic, molecular, and optical physics.

[39]  Niels Bohr,et al.  Discussion with Einstein on Epistemological Problems in Atomic Physics , 1996 .

[40]  Charles H. Bennett,et al.  Mixed-state entanglement and quantum error correction. , 1996, Physical review. A, Atomic, molecular, and optical physics.

[41]  Schumacher,et al.  Sending entanglement through noisy quantum channels. , 1996, Physical review. A, Atomic, molecular, and optical physics.

[42]  Steane,et al.  Error Correcting Codes in Quantum Theory. , 1996, Physical review letters.

[43]  A. Kitaev Quantum computations: algorithms and error correction , 1997 .

[44]  E. Knill,et al.  Theory of quantum error-correcting codes , 1997 .

[45]  Dorit Aharonov,et al.  Fault-tolerant quantum computation with constant error , 1997, STOC '97.

[46]  S. Lloyd Capacity of the noisy quantum channel , 1996, quant-ph/9604015.

[47]  D. Bruß Optimal Eavesdropping in Quantum Cryptography with Six States , 1998, quant-ph/9805019.

[48]  M. Nielsen,et al.  Information transmission through a noisy quantum channel , 1997, quant-ph/9702049.

[49]  Alexander S. Holevo,et al.  The Capacity of the Quantum Channel with General Signal States , 1996, IEEE Trans. Inf. Theory.

[50]  P. Shor,et al.  QUANTUM-CHANNEL CAPACITY OF VERY NOISY CHANNELS , 1997, quant-ph/9706061.

[51]  Lo,et al.  Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.

[52]  Andreas J. Winter,et al.  Coding theorem and strong converse for quantum channels , 1999, IEEE Trans. Inf. Theory.

[53]  Ueli Maurer,et al.  Information-Theoretic Key Agreement: From Weak to Strong Secrecy for Free , 2000, EUROCRYPT.

[54]  P. Oscar Boykin,et al.  A Proof of the Security of Quantum Key Distribution , 1999, STOC '00.

[55]  R. Landauer,et al.  Irreversibility and heat generation in the computing process , 1961, IBM J. Res. Dev..

[56]  David P. DiVincenzo,et al.  Quantum information and computation , 2000, Nature.

[57]  P. Oscar Boykin,et al.  A Proof of the Security of Quantum Key Distribution , 1999, Symposium on the Theory of Computing.

[58]  Dominic Mayers,et al.  Unconditional security in quantum cryptography , 1998, JACM.

[59]  Hoi-Kwong Lo,et al.  Proof of unconditional security of six-state quantum key distribution scheme , 2001, Quantum Inf. Comput..

[60]  Luca Trevisan,et al.  Extractors and pseudorandom generators , 2001, JACM.

[61]  Hans Aschauer,et al.  Security proof of quantum cryptography based entirely on entanglement purification , 2001, quant-ph/0111066.

[62]  Anders Karlsson,et al.  Security of quantum key distribution using d-level systems. , 2001, Physical review letters.