Results 11 to 20 of about 47,878 (305)
Quantum Cryptography [PDF]
Reviews of Modern Physics, 2001 Quantum cryptography could well be the first application of quantum mechanics
at the individual quanta level. The very fast progress in both theory and
experiments over the recent years are reviewed, with emphasis on open questions
and technological ...Aspect, A., Bechmann-Pasquinucci, H., Bechmann-Pasquinucci, H., Bechmann-Pasquinucci, H., Bell, J. S., Bennett, C. H., Bennett, C. H., Bennett, C. H., Bennett, C. H., Bennett, C. H., Bennett, C. H., Bennett, C. H., Bennett, C. H., Berry, M. V., Bethune, D., Biham, E., Biham, E., Bourennane, M., Bourennane, M., Bourennane, M., Brassard, G., Brendel, J., Brendel, J., Briegel, H.-J., Brouri, R., Brown, R. G. W., Brown, R. G. W., Brown, R. G. W., Brunel, C., Bruss, D., Bruss, D., Bréguet, J., Bréguet, J., Buttler, W. T., Buttler, W. T., Bužek, V., Canning, J., Cirac, J. I., Clarke, R. B. M., Clauser, J. F., Clauser, J. F., Cova, S., Cova, S., Csiszár, I., De Martini, F., Desurvire, E., Deutsch, D., Deutsch, D., Deutsch, D., Dieks, D., Diffie, W., Dur, W., Dur, W., Dusek, M., Einstein, A., Ekert, A. K., Ekert, A. K., Ekert, A. K., Ekert, A. K., Elamari, A., Felix, S., Fleury, L., Franson, J. D., Franson, J. D., Franson, J. D., Freedmann, S. J., Fry, E. S., Fuchs, C. A., Fuchs, C. A., Gisin, B., Gisin, N., Gisin, N., Gisin, N., Gisin, N., Gisin, N., Goldenberg, L., Gorman, P. M., Grégoire Ribordy, Gérard, J.-M., Gérard, J.-M., Haecker, W., Hall, M. J. W., Hariharan, P., Hillery, M., Hiskett, P. A., Hong, C. K., Hong, C. K., Horodecki, M., Hughes, R., Hughes, R., Hugo Zbinden, Huttner, B., Huttner, B., Huttner, B., Imamoglu, A., Ingerson, T. E., Ivanovic, I. D., Jacobs, B., Jennewein, T., Jennewein, T., Karlsson, A., Kempe, J., Kim, J., Kimble, H. J., Kitson, S. C., Kurtsiefer, C., Kurtsiefer, C., Kwiat, P. G., Kwiat, P. G., Lacaita, A., Lacaita, A., Larchuk, T. S., Levine, B. F., Li, M. J., Lo, H.-K., Lo, H.-K., Lütkenhaus, N., Lütkenhaus, N., Marand, C., Martinelli, M., Martinelli, M., Maurer, U. M., Maurer, U. M., Mayers, D., Mazurenko, Y., Michler, P., Milonni, P. W., Molotkov, S. N., Muller, A., Muller, A., Muller, A., Muller, A., Mérolla, J-M., Naik, D., Nicolas Gisin, Niu, C. S., Nogues, G., Owens, P. C. M., Peres, A., Peres, A., Phoenix, S. J. D., Rarity, J. G., Rarity, J. G., Ribordy, G., Ribordy, G., Ribordy, G., Rivest, R. L., Santori, C., Shannon, C. E., Shih, Y. H., Shor, P. W., Simon, C., Simon, C., Spinelli, A., Stefanov, A., Steinberg, A. M., Steinberg, A. M., Stucki, D., Sun, P. C., Tanzilli, S., Tapster, P. R., Thomas, G. A., Tittel, W., Tittel, W., Tittel, W., Tittel, W., Tomita, A., Townsend, P., Townsend, P., Townsend, P., Townsend, P., Townsend, P., Townsend, P., Townsend, P., Townsend, P. D., Vernam, G., Vinegoni, C., Vinegoni, C., Weihs, G., Wiesner, S., Wolfgang Tittel, Wootters, W. K., Yuen, H. P., Zappa, F., Zbinden, H., Zeilinger, A., Żukowski, M., Żukowski, M. +187 morecore +11 more sourcesSingle photon quantum cryptography [PDF]
Physical Review Letters, 2002 We report the full implementation of a quantum cryptography protocol using a
stream of single photon pulses generated by a stable and efficient source
operating at room temperature.A. Beveratos, Alexios Beveratos, André Villing, C. H. Bennett, C. H. Bennett, F. Treussart, Jean-Philippe Poizat, Philippe Grangier, R. Brouri, Rosa Brouri, Thierry Gacoin +10 morecore +8 more sourcesQuantum Cryptography [PDF]
Contemporary Physics, 1995 Quantum cryptography is a new method for secret communications offering the
ultimate security assurance of the inviolability of a Law of Nature.Bell J. S., Brassard G., Busch P., Clauser J. F., Conan Doyle A., D. M. Alde, Deutsch D., G. G. Luther, G. L. Morgan, Hayes B., Hodges A., Hughes R. I. G., Kahn D., Knuth D. E., Lamphere R. J., M. Schauer, P. Dyer, Richard J. Hughes, Schneier B., Schroeder M. R., Shannon C. E., Shor P. W., Simmons G. J., Vernam G. S., von Neumann J., von Neumann J., Walker N. G., Welsh D., Williams R. C., Wright P., Wrixon F. B. +30 morecore +2 more sourcesQuantum Cryptography in Practice [PDF]
Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications - SIGCOMM '03, 2003 BBN, Harvard, and Boston University are building the DARPA Quantum Network,
the world's first network that delivers end-to-end network security via
high-speed Quantum Key Distribution, and testing that Network against
sophisticated eavesdropping attacks. Elliott, Chip, Pearson, David, Troxel, Gregory +2 morecore +4 more sourcesCounterfactual Quantum Cryptography [PDF]
Physical Review Letters, 2008 Quantum cryptography allows one to distribute a secret key between two remote
parties using the fundamental principles of quantum mechanics. The well-known
established paradigm for the quantum key distribution relies on the actual
transmission of signal ...C. H. Bennett, D. Gottesman, D. Mayers, R. Jozsa, R. Penrose, Tae-Gon Noh +5 morecore +4 more sourcesQuantum cryptography: key distribution and beyond
Quanta, 2018 Uniquely among the sciences, quantum cryptography has driven both
foundational research as well as practical real-life applications. We review
the progress of quantum cryptography in the last decade, covering quantum key
distribution and other ...H., Akshata Shenoy, Pathak, Anirban, Srikanth, R. +2 morecore +3 more sourcesTomographic Quantum Cryptography [PDF]
Physical Review A, 2003 We present a protocol for quantum cryptography in which the data obtained for
mismatched bases are used in full for the purpose of quantum state tomography.A. Beige, A. Chefles, A.K. Ekert, A.S. Holevo, B.-G. Englert, C. Kurtsiefer, D. BruBruß, D. Deutsch, D. Kaszlikowski, D.S. Naik, E. Waks, H. Weyl, I. Csiszár, I.D. Ivanović, J. Schwinger, J.I. Cirac, L. Vaidman, M. Horodecki, N. Gisin, N. Gisin, N.J. Cerf, O. Schulz, P.K. Aravind, S.M. Barnett, T. Jennewein, U.M. Maurer, W. Tittel, W.K. Wootters, Y. Aharonov +28 morecore +4 more sourcesQuantum Cryptography Without Switching [PDF]
Physical Review Letters, 2004 We propose a new coherent state quantum key distribution protocol that eliminates the need to randomly switch between measurement bases. This protocol provides significantly higher secret key rates with increased bandwidths than previous schemes that only make single quadrature measurements.Weedbrook, C., Lance, A. M., Bowen, W. P., Symul, T., Ralph, T. C., Lam, P. K. +5 moreopenaire +6 more sources