Results 1 to 10 of about 49,087 (283)

Quantum cryptography [PDF]

open access: greenReviews of Modern Physics, 2002
Quantum cryptography could well be the first application of quantum mechanics at the individual quanta level. The very fast progress in both theory and experiments over the recent years are reviewed, with emphasis on open questions and technological ...
Nicolas Gisin   +3 more
core   +11 more sources

Quantum Cryptography [PDF]

open access: yesContemporary Physics, 1995
Quantum cryptography is a new method for secret communications offering the ultimate security assurance of the inviolability of a Law of Nature.
Bell J. S.   +30 more
core   +2 more sources

Counterfactual Quantum Cryptography [PDF]

open access: yesPhysical Review Letters, 2008
Quantum cryptography allows one to distribute a secret key between two remote parties using the fundamental principles of quantum mechanics. The well-known established paradigm for the quantum key distribution relies on the actual transmission of signal ...
C. H. Bennett   +5 more
core   +4 more sources

Tomographic Quantum Cryptography [PDF]

open access: yesPhysical Review A, 2003
We present a protocol for quantum cryptography in which the data obtained for mismatched bases are used in full for the purpose of quantum state tomography.
A. Beige   +28 more
core   +4 more sources

Autocompensating quantum cryptography [PDF]

open access: goldNew Journal of Physics, 2002
18 pages, 6 figures, 1 table.
Donald S. Bethune, W. P. Risk
openalex   +3 more sources

Single Photon Quantum Cryptography [PDF]

open access: green, 2002
We report the full implementation of a quantum cryptography protocol using a stream of single photon pulses generated by a stable and efficient source operating at room temperature.
A. Beveratos   +5 more
openalex   +5 more sources

Advances in quantum cryptography [PDF]

open access: yesAdvances in Optics and Photonics, 2020
Quantum cryptography is arguably the fastest growing area in quantum information science. Novel theoretical protocols are designed on a regular basis, security proofs are constantly improving, and experiments are gradually moving from proof-of-principle lab demonstrations to in-field implementations and technological prototypes.
S. Pirandola   +17 more
openaire   +13 more sources

Terahertz Quantum Cryptography [PDF]

open access: yesIEEE Journal on Selected Areas in Communications, 2020
REVTeX. 14 pages. 5 figures.
Carlo Ottaviani   +6 more
openaire   +6 more sources

ON QUANTUM CRYPTOGRAPHY [PDF]

open access: yesЖУРНАЛ ЗА БЕЗБЈЕДНОСТ И КРИМИНАЛИСТИКУ, 2019
In the late twentieth century, human race entered the era ofinformation technology (IT). The IT industry, which deals with the production,processing, storage and transmission of information, has become an integralpart of the global economic system, a completely independent and significantsector of the economy.
Jaćimovski, Stevo   +2 more
openaire   +3 more sources

Post-Quantum Cryptography [PDF]

open access: yesNature, 2011
Cryptography is essential for the security of online communication, cars and implanted medical devices. However, many commonly used cryptosystems will be completely broken once large quantum computers exist. Post-quantum cryptography is cryptography under the assumption that the attacker has a large quantum computer; post-quantum cryptosystems strive ...
Daniel J. Bernstein   +2 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy