Results 31 to 40 of about 3,806,576 (332)
Composable security proof for continuous-variable quantum key distribution with coherent states [PDF]
We give the first composable security proof for continuous-variable quantum key distribution with coherent states against collective attacks. Crucially, in the limit of large blocks the secret key rate converges to the usual value computed from the ...
Leverrier, Anthony
core +7 more sources
The article deals with the essence of the security of the States included in the Collective Security Treaty Organization. The author gives the definition to the system of collective security in the CSTO.
Gontar Sergey Mikhailovich
doaj +1 more source
Fault tolerant quantum key distribution protocol with collective random unitary noise [PDF]
We propose an easy implementable prepare-and-measure protocol for robust quantum key distribution with photon polarization. The protocol is fault tolerant against collective random unitary channel noise.
C. H. Bennett +2 more
core +1 more source
A Long Shadow of World War II: Development of the National Security Concept in the United States
In recent years, the history of World War II has transformed into a battlefield in its own right in the ‘war of memory’. Besides the clear fact that the current attempts to revise the results of this war reflect the contemporary international tensions, yet
V. A. Veselov
doaj +1 more source
Sharing the Burden of Collective Security in the European Union. Research Note [PDF]
This article compares European Union (EU) burden-sharing in security governance distinguishing between assurance, prevention, protection, and compellence policies.
Arce M. +12 more
core +1 more source
Continuous-variable quantum cryptography with discrete alphabets: Composable security under collective Gaussian attacks [PDF]
We consider continuous-variable quantum key distribution with discrete-alphabet encodings. In particular, we study protocols where information is encoded in the phase of displaced coherent (or thermal) states, even though the results can be directly ...
Panagiotis Papanastasiou, S. Pirandola
semanticscholar +1 more source
Collective attacks and unconditional security in continuous variable quantum key distribution
We present here an information theoretic study of Gaussian collective attacks on the continuous variable key distribution protocols based on Gaussian modulation of coherent states.
Grosshans, Frederic
core +1 more source
We derive a bound for the security of QKD with finite resources under one-way post-processing, based on a definition of security that is composable and has an operational meaning.
C. H. Bennett +7 more
core +1 more source
Comparing the influence of and relationship of Central Asia with the major regional bodies, the SCO is an advantageous organization for the economic development of Central Asia, since it is an opportune podium for doing business, especially with China ...
M. Haas
semanticscholar +1 more source
BALTIC BLACK SEA UNION MODELING: FACTORS AND PERSPECTIVES
An important feature of the current stage of world development is the increase in turbulence and tension, the increase in threats and the actualization of security issues.
Antonina Djakona, Kaspars Kikste
doaj +1 more source

