A two-stage amplifier of laser eavesdropping model based on waveguide fiber taper
In order to improve ability of amplification about optical arrival angle in laser eavesdropping system, and enhance receiving field of view (FOV) of laser eavesdropping system, this paper presents a new multi-stage amplifier laser eavesdropping model ...
Mei-ting Wang, Yan Zhu, Yi-ning Mu
doaj +1 more source
A novel quantum key distribution scheme with orthogonal product states [PDF]
The general conditions for the orthogonal product states of the multi-state systems to be used in quantum key distribution (QKD) are proposed, and a novel QKD scheme with orthogonal product states in the 3x3 Hilbert space is presented.
A. Ekert +15 more
core +2 more sources
Optimal eavesdropping in cryptography with three-dimensional quantum states
We study optimal eavesdropping in quantum cryptography with three-dimensional systems, and show that this scheme is more secure than protocols using two-dimensional states. We generalize the according eavesdropping transformation to arbitrary dimensions,
C. Fuchs +12 more
core +1 more source
Johnson(-like)-Noise-Kirchhoff-Loop Based Secure Classical Communicator Characteristics, for Ranges of Two to Two Thousand Kilometers, via Model-Line [PDF]
A pair of Kirchhoff-Loop-Johnson(-like)-Noise communicators, which is able to work over variable ranges, was designed and built. Tests have been carried out on a model-line performance characteristics were obtained for ranges beyond the ranges of any ...
Bennett +14 more
core +2 more sources
Modeling and Analysis of Eavesdropping Attack in 802.11ad mmWave Wireless Networks
Next generation wireless communication networks utilizing 60 GHz millimeter wave (mmWave) frequency bands are expected to achieve multi-gigabit throughput with the use of highly directional phased-array antennas.
Sarankumar Balakrishnan +3 more
doaj +1 more source
Proactive Eavesdropping via Jamming over HARQ-Based Communications
This paper studies the wireless surveillance of a hybrid automatic repeat request (HARQ) based suspicious communication link over Rayleigh fading channels.
Duan, Lingjie +3 more
core +1 more source
Quantum Key Distribution between N partners: optimal eavesdropping and Bell's inequalities [PDF]
Quantum secret-sharing protocols involving N partners (NQSS) are key distribution protocols in which Alice encodes her key into $N-1$ qubits, in such a way that all the other partners must cooperate in order to retrieve the key.
A. Ekert +24 more
core +3 more sources
MIMO Terahertz Quantum Key Distribution Under Restricted Eavesdropping
Quantum key distribution (QKD) can provide unconditional security to next-generation communication networks guaranteed by the laws of quantum physics.
Neel Kanth Kundu +4 more
doaj +1 more source
Due to the broadcast nature of wireless medium, wireless communication is extremely vulnerable to eavesdropping attack. Physical-layer security is emerging as a new paradigm to prevent the eavesdropper from interception by exploiting the physical ...
Shen, Weiming +2 more
core +1 more source
Quantum Cryptography using larger alphabets [PDF]
Like all of quantum information theory, quantum cryptography is traditionally based on two level quantum systems. In this letter, a new protocol for quantum key distribution based on higher dimensional systems is presented.
A. Karlsson +22 more
core +2 more sources

