A Survey and Comparison of Some of the Most Prominent QKD Protocols
暂无分享,去创建一个
Rainu Nandal | Kamaldeep Joshi | Ashish Nandal | Arvind Kumar Rathee | Rainu Nandal | Ashish Nandal | Kamaldeep Joshi
[1] Advances in Quantum Cryptography and Relays , 2006, 2006 European Conference on Optical Communications.
[2] Yoshihisa Yamamoto,et al. Differential phase shift quantum key distribution. , 2002 .
[3] Khaled Elleithy,et al. Initiated decoy states in quantum key distribution protocol by 3 ways channel , 2015, 2015 Long Island Systems, Applications and Technology.
[4] Abdulbast A. Abushgra,et al. QKDP's comparison based upon quantum cryptography rules , 2016, 2016 IEEE Long Island Systems, Applications and Technology Conference (LISAT).
[5] Charles H. Bennett,et al. Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.
[6] Nana Rachmana Syambas,et al. Quantum Key Distribution (QKD) Protocols: A Survey , 2018, 2018 4th International Conference on Wireless and Telematics (ICWT).
[7] H. Bechmann-Pasquinucci,et al. Incoherent and coherent eavesdropping in the six-state protocol of quantum cryptography , 1998, quant-ph/9807041.
[8] Gabriela Mogos,et al. Quantum Key Distribution Protocol with Four-State Systems – Software Implementation , 2015 .
[9] Fibirova Jana,et al. Profit-Sharing – A Tool for Improving Productivity, Profitability and Competitiveness of Firms? , 2013 .
[10] Jaya Krishna,et al. A survey on quantum cryptography and quantum key distribution protocols , 2019 .
[11] 1.3 THE PHYSICAL CONTENT OF QUANTUM KINEMATICS AND MECHANICS , 2018 .
[12] Richard J. Hughes,et al. Entangled-photon six-state quantum cryptography , 2002 .
[13] Pramode K. Verma,et al. A QKD protocol with a two-way quantum channel , 2011, 2011 Fifth IEEE International Conference on Advanced Telecommunication Systems and Networks (ANTS).
[14] Ekert,et al. Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.
[15] Douglas Stebila,et al. The Case for Quantum Key Distribution , 2009, QuantumComm.
[16] Ivan B. Djordjevic,et al. Hybrid QKD Protocol Outperforming Both DV- and CV-QKD Protocols , 2020, IEEE Photonics Journal.
[17] Charles H. Bennett,et al. Quantum cryptography without Bell's theorem. , 1992, Physical review letters.
[18] Albert Einstein,et al. Can Quantum-Mechanical Description of Physical Reality Be Considered Complete? , 1935 .
[19] Nicolas Gisin,et al. Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations. , 2004, Physical review letters.
[20] W. Wootters,et al. A single quantum cannot be cloned , 1982, Nature.
[21] K. Boström,et al. Deterministic secure direct communication using entanglement. , 2002, Physical review letters.
[22] Charles H. Bennett,et al. Experimental quantum cryptography , 1991, Journal of Cryptology.
[23] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[24] Gilles Brassard,et al. Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..
[25] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[26] Muhammad Mubashir Khan,et al. High error-rate quantum key distribution for long-distance communication , 2009, 0901.3909.
[27] A. K. Singh,et al. Quantum Key Distribution Protocols: A Review , 2014 .
[28] B. Vishnu Vardhan,et al. Quantum Cryptography and Quantum Key Distribution Protocols: A Survey , 2016, 2016 IEEE 6th International Conference on Advanced Computing (IACC).