Results 1 to 10 of about 49,516 (148)

Quantum Cryptography [PDF]

open access: yesContemporary Physics, 1995
Quantum cryptography is a new method for secret communications offering the ultimate security assurance of the inviolability of a Law of Nature.
Bell J. S.   +30 more
core   +3 more sources

Quantum Cryptography [PDF]

open access: yesReviews of Modern Physics, 2001
Quantum cryptography could well be the first application of quantum mechanics at the individual quanta level. The very fast progress in both theory and experiments over the recent years are reviewed, with emphasis on open questions and technological ...
Aspect, A.   +187 more
core   +9 more sources

Counterfactual Quantum Cryptography [PDF]

open access: yesPhysical Review Letters, 2008
Quantum cryptography allows one to distribute a secret key between two remote parties using the fundamental principles of quantum mechanics. The well-known established paradigm for the quantum key distribution relies on the actual transmission of signal ...
C. H. Bennett   +5 more
core   +3 more sources

Tomographic Quantum Cryptography [PDF]

open access: yesPhysical Review A, 2003
We present a protocol for quantum cryptography in which the data obtained for mismatched bases are used in full for the purpose of quantum state tomography.
A. Beige   +28 more
core   +3 more sources

Single photon quantum cryptography [PDF]

open access: yesPhysical Review Letters, 2002
We report the full implementation of a quantum cryptography protocol using a stream of single photon pulses generated by a stable and efficient source operating at room temperature.
A. Beveratos   +10 more
core   +6 more sources

Quantum Cryptography: Key Distribution and Beyond

open access: yesQuanta, 2018
Uniquely among the sciences, quantum cryptography has driven both foundational research as well as practical real-life applications. We review the progress of quantum cryptography in the last decade, covering quantum key distribution and other ...
Akshata Shenoy-Hejamadi   +2 more
doaj   +3 more sources

Graphical Methods in Device-Independent Quantum Cryptography [PDF]

open access: yesQuantum, 2019
We introduce a framework for graphical security proofs in device-independent quantum cryptography using the methods of categorical quantum mechanics. We are optimistic that this approach will make some of the highly complex proofs in quantum cryptography
Spencer Breiner   +2 more
doaj   +4 more sources

Quantum Cryptography [PDF]

open access: yes, 2021
AbstractThe Internet can be thought of as a channel of information being sent from you to everyone else connected to the Internet. If you wanted to transmit your sensitive information (such as bank account numbers or military secrets) over the Internet, then you have to ensure that only the persons you intend to read your information have access to ...
Pawel Sniatala   +2 more
  +9 more sources

Weak Randomness Analysis of Measurement-Device-Independent Quantum Key Distribution with Finite Resources

open access: yesPhotonics, 2022
The ideal quantum key distribution (QKD) protocol requires perfect random numbers for bit encoding and basis selecting. Perfect randomness is of great significance to the practical QKD system. However, due to the imperfection of practical quantum devices,
Xiao-Lei Jiang   +6 more
doaj   +1 more source

Quantum cryptography

open access: yesJournal of the Society of Mechanical Engineers, 2006
Elementary review article on quantum cryptography.
Dusek, Miloslav   +2 more
  +6 more sources

Home - About - Disclaimer - Privacy