Quantum cryptography without public announcement of bases

[1]  Yeshaiahu Fainman,et al.  Security of quantum cryptography against individual attacks , 1998, Other Conferences.

[2]  N. Gisin,et al.  OPTIMAL EAVESDROPPING IN QUANTUM CRYPTOGRAPHY. I. INFORMATION BOUND AND OPTIMAL STRATEGY , 1997 .

[3]  Nicolas Gisin,et al.  Quantum cloning, eavesdropping and Bell's inequality , 1997 .

[4]  J. Cirac,et al.  Coherent eavesdropping strategies for the four state quantum cryptography protocol , 1997, quant-ph/9702002.

[5]  E. Biham,et al.  Security of Quantum Cryptography against Collective Attacks , 1996, quant-ph/9605007.

[6]  Gisin,et al.  Unambiguous quantum measurement of nonorthogonal states. , 1996, Physical review. A, Atomic, molecular, and optical physics.

[7]  E. Biham,et al.  Bounds on Information and the Security of Quantum Cryptography , 1996, quant-ph/9605010.

[8]  Deutsch,et al.  Quantum Privacy Amplification and the Security of Quantum Cryptography over Noisy Channels. , 1996, Physical review letters.

[9]  M. Ardehali Quantum cryptography based on wheeler's delayed choice experiment , 1995, quant-ph/9508008.

[10]  Artur Ekert,et al.  Information Gain in Quantum Eavesdropping , 1994 .

[11]  Vladimir B. Braginsky,et al.  Quantum Measurement , 1992 .

[12]  Artur Ekert Beating the code breakers , 1992, Nature.

[13]  Charles H. Bennett,et al.  Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.

[14]  Charles H. Bennett,et al.  Quantum cryptography without Bell's theorem. , 1992, Physical review letters.

[15]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[16]  Gilles Brassard,et al.  Privacy Amplification by Public Discussion , 1988, SIAM J. Comput..

[17]  Franco Selleri,et al.  Quantum mechanics versus local realism : the Einstein-Podolsky-Rosen paradox , 1988 .

[18]  Stephen Wiesner,et al.  Conjugate coding , 1983, SIGA.

[19]  B. D'espagnat Conceptual Foundations Of Quantum Mechanics , 1971 .