Results 1 to 10 of about 49,516 (148)
Quantum Cryptography [PDF]
Contemporary Physics, 1995 Quantum cryptography is a new method for secret communications offering the
ultimate security assurance of the inviolability of a Law of Nature.Bell J. S., Brassard G., Busch P., Clauser J. F., Conan Doyle A., D. M. Alde, Deutsch D., G. G. Luther, G. L. Morgan, Hayes B., Hodges A., Hughes R. I. G., Kahn D., Knuth D. E., Lamphere R. J., M. Schauer, P. Dyer, Richard J. Hughes, Schneier B., Schroeder M. R., Shannon C. E., Shor P. W., Simmons G. J., Vernam G. S., von Neumann J., von Neumann J., Walker N. G., Welsh D., Williams R. C., Wright P., Wrixon F. B. +30 morecore +3 more sourcesQuantum Cryptography [PDF]
Reviews of Modern Physics, 2001 Quantum cryptography could well be the first application of quantum mechanics
at the individual quanta level. The very fast progress in both theory and
experiments over the recent years are reviewed, with emphasis on open questions
and technological ...Aspect, A., Bechmann-Pasquinucci, H., Bechmann-Pasquinucci, H., Bechmann-Pasquinucci, H., Bell, J. S., Bennett, C. H., Bennett, C. H., Bennett, C. H., Bennett, C. H., Bennett, C. H., Bennett, C. H., Bennett, C. H., Bennett, C. H., Berry, M. V., Bethune, D., Biham, E., Biham, E., Bourennane, M., Bourennane, M., Bourennane, M., Brassard, G., Brendel, J., Brendel, J., Briegel, H.-J., Brouri, R., Brown, R. G. W., Brown, R. G. W., Brown, R. G. W., Brunel, C., Bruss, D., Bruss, D., Bréguet, J., Bréguet, J., Buttler, W. T., Buttler, W. T., Bužek, V., Canning, J., Cirac, J. I., Clarke, R. B. M., Clauser, J. F., Clauser, J. F., Cova, S., Cova, S., Csiszár, I., De Martini, F., Desurvire, E., Deutsch, D., Deutsch, D., Deutsch, D., Dieks, D., Diffie, W., Dur, W., Dur, W., Dusek, M., Einstein, A., Ekert, A. K., Ekert, A. K., Ekert, A. K., Ekert, A. K., Elamari, A., Felix, S., Fleury, L., Franson, J. D., Franson, J. D., Franson, J. D., Freedmann, S. J., Fry, E. S., Fuchs, C. A., Fuchs, C. A., Gisin, B., Gisin, N., Gisin, N., Gisin, N., Gisin, N., Gisin, N., Goldenberg, L., Gorman, P. M., Grégoire Ribordy, Gérard, J.-M., Gérard, J.-M., Haecker, W., Hall, M. J. W., Hariharan, P., Hillery, M., Hiskett, P. A., Hong, C. K., Hong, C. K., Horodecki, M., Hughes, R., Hughes, R., Hugo Zbinden, Huttner, B., Huttner, B., Huttner, B., Imamoglu, A., Ingerson, T. E., Ivanovic, I. D., Jacobs, B., Jennewein, T., Jennewein, T., Karlsson, A., Kempe, J., Kim, J., Kimble, H. J., Kitson, S. C., Kurtsiefer, C., Kurtsiefer, C., Kwiat, P. G., Kwiat, P. G., Lacaita, A., Lacaita, A., Larchuk, T. S., Levine, B. F., Li, M. J., Lo, H.-K., Lo, H.-K., Lütkenhaus, N., Lütkenhaus, N., Marand, C., Martinelli, M., Martinelli, M., Maurer, U. M., Maurer, U. M., Mayers, D., Mazurenko, Y., Michler, P., Milonni, P. W., Molotkov, S. N., Muller, A., Muller, A., Muller, A., Muller, A., Mérolla, J-M., Naik, D., Nicolas Gisin, Niu, C. S., Nogues, G., Owens, P. C. M., Peres, A., Peres, A., Phoenix, S. J. D., Rarity, J. G., Rarity, J. G., Ribordy, G., Ribordy, G., Ribordy, G., Rivest, R. L., Santori, C., Shannon, C. E., Shih, Y. H., Shor, P. W., Simon, C., Simon, C., Spinelli, A., Stefanov, A., Steinberg, A. M., Steinberg, A. M., Stucki, D., Sun, P. C., Tanzilli, S., Tapster, P. R., Thomas, G. A., Tittel, W., Tittel, W., Tittel, W., Tittel, W., Tomita, A., Townsend, P., Townsend, P., Townsend, P., Townsend, P., Townsend, P., Townsend, P., Townsend, P., Townsend, P. D., Vernam, G., Vinegoni, C., Vinegoni, C., Weihs, G., Wiesner, S., Wolfgang Tittel, Wootters, W. K., Yuen, H. P., Zappa, F., Zbinden, H., Zeilinger, A., Żukowski, M., Żukowski, M. +187 morecore +9 more sourcesCounterfactual Quantum Cryptography [PDF]
Physical Review Letters, 2008 Quantum cryptography allows one to distribute a secret key between two remote
parties using the fundamental principles of quantum mechanics. The well-known
established paradigm for the quantum key distribution relies on the actual
transmission of signal ...C. H. Bennett, D. Gottesman, D. Mayers, R. Jozsa, R. Penrose, Tae-Gon Noh +5 morecore +3 more sourcesTomographic Quantum Cryptography [PDF]
Physical Review A, 2003 We present a protocol for quantum cryptography in which the data obtained for
mismatched bases are used in full for the purpose of quantum state tomography.A. Beige, A. Chefles, A.K. Ekert, A.S. Holevo, B.-G. Englert, C. Kurtsiefer, D. BruBruß, D. Deutsch, D. Kaszlikowski, D.S. Naik, E. Waks, H. Weyl, I. Csiszár, I.D. Ivanović, J. Schwinger, J.I. Cirac, L. Vaidman, M. Horodecki, N. Gisin, N. Gisin, N.J. Cerf, O. Schulz, P.K. Aravind, S.M. Barnett, T. Jennewein, U.M. Maurer, W. Tittel, W.K. Wootters, Y. Aharonov +28 morecore +3 more sourcesSingle photon quantum cryptography [PDF]
Physical Review Letters, 2002 We report the full implementation of a quantum cryptography protocol using a
stream of single photon pulses generated by a stable and efficient source
operating at room temperature.A. Beveratos, Alexios Beveratos, André Villing, C. H. Bennett, C. H. Bennett, F. Treussart, Jean-Philippe Poizat, Philippe Grangier, R. Brouri, Rosa Brouri, Thierry Gacoin +10 morecore +6 more sourcesQuantum Cryptography: Key Distribution and Beyond
Quanta, 2018
Uniquely among the sciences, quantum cryptography has driven both foundational research as well as practical real-life applications. We review the progress of quantum cryptography in the last decade, covering quantum key distribution and other ...Akshata Shenoy-Hejamadi, Anirban Pathak, Srikanth Radhakrishna +2 moredoaj +3 more sourcesQuantum Cryptography [PDF]
, 2021 AbstractThe Internet can be thought of as a channel of information being sent from you to everyone else connected to the Internet. If you wanted to transmit your sensitive information (such as bank account numbers or military secrets) over the Internet, then you have to ensure that only the persons you intend to read your information have access to ...Pawel Sniatala, S.S. Iyengar, Sanjeev Kaushik Ramani +2 more +9 more sources