Quantum cryptography: State-of-art, challenges and future perspectives
暂无分享,去创建一个
N. N. Sharma | P. Banerjee | R. Mittal | V. Teja | P. Banerjee | N.N. Sharma | R.K. Mittal | V. Teja
[1] David P. DiVincenzo,et al. Quantum information and computation , 2000, Nature.
[2] Andrea Fiore,et al. Nanostructured current-confined single quantum dot light-emitting diode at 1300 nm. , 2006, Nano letters.
[3] Debbie W. Leung,et al. Quantum data hiding , 2002, IEEE Trans. Inf. Theory.
[4] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[5] Yoshihisa Yamamoto,et al. Single photons for quantum information systems , 2005 .
[6] A. Galindo,et al. Information and computation: Classical and quantum aspects , 2001, quant-ph/0112105.
[7] A. Winter,et al. Randomizing Quantum States: Constructions and Applications , 2003, quant-ph/0307104.
[8] Renato Renner,et al. Security of quantum key distribution , 2005, Ausgezeichnete Informatikdissertationen.
[9] R. Cleve,et al. Quantum fingerprinting. , 2001, Physical review letters.
[10] Shor,et al. Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.
[11] Adam D. Smith,et al. Authentication of quantum messages , 2001, The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings..
[12] Daniel Gottesman. Uncloneable encryption , 2003, Quantum Inf. Comput..
[13] G. Ribordy. Practical quantum key distribution systems based on faint laser pulses , 2006, 2006 Digest of the LEOS Summer Topical Meetings.
[14] Chip Elliott,et al. Quantum cryptography in practice , 2003, SIGCOMM '03.
[15] Gilles Brassard,et al. Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.
[16] Simon J. Devitt,et al. Robustness of Shor's algorithm , 2006, Quantum Inf. Comput..
[17] Samuel J. Lomonaco,et al. A Quick Glance at Quantum Cryptography , 1998, Cryptologia.
[18] G. R. Blakley. One time Pads are Key Safegaurding Schemes, not Cryptosystems. Fast Key Safeguarding Schemes (Threshold Schemes) Exist. , 1980, 1980 IEEE Symposium on Security and Privacy.
[19] Rupert Ursin,et al. Entangled state quantum key distribution and teleportation , 2006 .
[20] D. R. Kuhn. A Hybrid Authentication Protocol Using Quantum Entanglement and Symmetric Cryptography , 2003, quant-ph/0301150.