Results 11 to 20 of about 52,668 (271)
Quantum Cryptography [PDF]
Contemporary Physics, 1995 Quantum cryptography is a new method for secret communications offering the
ultimate security assurance of the inviolability of a Law of Nature.Bell J. S., Brassard G., Busch P., Clauser J. F., Conan Doyle A., D. M. Alde, Deutsch D., G. G. Luther, G. L. Morgan, Hayes B., Hodges A., Hughes R. I. G., Kahn D., Knuth D. E., Lamphere R. J., M. Schauer, P. Dyer, Richard J. Hughes, Schneier B., Schroeder M. R., Shannon C. E., Shor P. W., Simmons G. J., Vernam G. S., von Neumann J., von Neumann J., Walker N. G., Welsh D., Williams R. C., Wright P., Wrixon F. B. +30 morecore +3 more sourcesQuantum Cryptography [PDF]
Reviews of Modern Physics, 2001 Quantum cryptography could well be the first application of quantum mechanics
at the individual quanta level. The very fast progress in both theory and
experiments over the recent years are reviewed, with emphasis on open questions
and technological ...Aspect, A., Bechmann-Pasquinucci, H., Bechmann-Pasquinucci, H., Bechmann-Pasquinucci, H., Bell, J. S., Bennett, C. H., Bennett, C. H., Bennett, C. H., Bennett, C. H., Bennett, C. H., Bennett, C. H., Bennett, C. H., Bennett, C. H., Berry, M. V., Bethune, D., Biham, E., Biham, E., Bourennane, M., Bourennane, M., Bourennane, M., Brassard, G., Brendel, J., Brendel, J., Briegel, H.-J., Brouri, R., Brown, R. G. W., Brown, R. G. W., Brown, R. G. W., Brunel, C., Bruss, D., Bruss, D., Bréguet, J., Bréguet, J., Buttler, W. T., Buttler, W. T., Bužek, V., Canning, J., Cirac, J. I., Clarke, R. B. M., Clauser, J. F., Clauser, J. F., Cova, S., Cova, S., Csiszár, I., De Martini, F., Desurvire, E., Deutsch, D., Deutsch, D., Deutsch, D., Dieks, D., Diffie, W., Dur, W., Dur, W., Dusek, M., Einstein, A., Ekert, A. K., Ekert, A. K., Ekert, A. K., Ekert, A. K., Elamari, A., Felix, S., Fleury, L., Franson, J. D., Franson, J. D., Franson, J. D., Freedmann, S. J., Fry, E. S., Fuchs, C. A., Fuchs, C. A., Gisin, B., Gisin, N., Gisin, N., Gisin, N., Gisin, N., Gisin, N., Goldenberg, L., Gorman, P. M., Grégoire Ribordy, Gérard, J.-M., Gérard, J.-M., Haecker, W., Hall, M. J. W., Hariharan, P., Hillery, M., Hiskett, P. A., Hong, C. K., Hong, C. K., Horodecki, M., Hughes, R., Hughes, R., Hugo Zbinden, Huttner, B., Huttner, B., Huttner, B., Imamoglu, A., Ingerson, T. E., Ivanovic, I. D., Jacobs, B., Jennewein, T., Jennewein, T., Karlsson, A., Kempe, J., Kim, J., Kimble, H. J., Kitson, S. C., Kurtsiefer, C., Kurtsiefer, C., Kwiat, P. G., Kwiat, P. G., Lacaita, A., Lacaita, A., Larchuk, T. S., Levine, B. F., Li, M. J., Lo, H.-K., Lo, H.-K., Lütkenhaus, N., Lütkenhaus, N., Marand, C., Martinelli, M., Martinelli, M., Maurer, U. M., Maurer, U. M., Mayers, D., Mazurenko, Y., Michler, P., Milonni, P. W., Molotkov, S. N., Muller, A., Muller, A., Muller, A., Muller, A., Mérolla, J-M., Naik, D., Nicolas Gisin, Niu, C. S., Nogues, G., Owens, P. C. M., Peres, A., Peres, A., Phoenix, S. J. D., Rarity, J. G., Rarity, J. G., Ribordy, G., Ribordy, G., Ribordy, G., Rivest, R. L., Santori, C., Shannon, C. E., Shih, Y. H., Shor, P. W., Simon, C., Simon, C., Spinelli, A., Stefanov, A., Steinberg, A. M., Steinberg, A. M., Stucki, D., Sun, P. C., Tanzilli, S., Tapster, P. R., Thomas, G. A., Tittel, W., Tittel, W., Tittel, W., Tittel, W., Tomita, A., Townsend, P., Townsend, P., Townsend, P., Townsend, P., Townsend, P., Townsend, P., Townsend, P., Townsend, P. D., Vernam, G., Vinegoni, C., Vinegoni, C., Weihs, G., Wiesner, S., Wolfgang Tittel, Wootters, W. K., Yuen, H. P., Zappa, F., Zbinden, H., Zeilinger, A., Żukowski, M., Żukowski, M. +187 morecore +9 more sourcesTomographic Quantum Cryptography [PDF]
Physical Review A, 2003 We present a protocol for quantum cryptography in which the data obtained for
mismatched bases are used in full for the purpose of quantum state tomography.A. Beige, A. Chefles, A.K. Ekert, A.S. Holevo, B.-G. Englert, C. Kurtsiefer, D. BruBruß, D. Deutsch, D. Kaszlikowski, D.S. Naik, E. Waks, H. Weyl, I. Csiszár, I.D. Ivanović, J. Schwinger, J.I. Cirac, L. Vaidman, M. Horodecki, N. Gisin, N. Gisin, N.J. Cerf, O. Schulz, P.K. Aravind, S.M. Barnett, T. Jennewein, U.M. Maurer, W. Tittel, W.K. Wootters, Y. Aharonov +28 morecore +3 more sourcesCounterfactual Quantum Cryptography [PDF]
Physical Review Letters, 2008 Quantum cryptography allows one to distribute a secret key between two remote
parties using the fundamental principles of quantum mechanics. The well-known
established paradigm for the quantum key distribution relies on the actual
transmission of signal ...C. H. Bennett, D. Gottesman, D. Mayers, R. Jozsa, R. Penrose, Tae-Gon Noh +5 morecore +3 more sourcesSingle photon quantum cryptography [PDF]
Physical Review Letters, 2002 We report the full implementation of a quantum cryptography protocol using a
stream of single photon pulses generated by a stable and efficient source
operating at room temperature.A. Beveratos, Alexios Beveratos, André Villing, C. H. Bennett, C. H. Bennett, F. Treussart, Jean-Philippe Poizat, Philippe Grangier, R. Brouri, Rosa Brouri, Thierry Gacoin +10 morecore +6 more sourcesQuantum Cryptography [PDF]
, 2021 AbstractThe Internet can be thought of as a channel of information being sent from you to everyone else connected to the Internet. If you wanted to transmit your sensitive information (such as bank account numbers or military secrets) over the Internet, then you have to ensure that only the persons you intend to read your information have access to ...Pawel Sniatala, S.S. Iyengar, Sanjeev Kaushik Ramani +2 more +9 more sourcesSemi-quantum cryptography [PDF]
Quantum Information Processing, 2020 Semi-quantum communication, a model introduced in 2007 by M. Boyer, D. Kenigsberg, and T. Mor (PRL 99 140501), involves the use of fully-quantum users and semi-quantum, or "classical" users. These restricted users are only allowed to interact with the quantum channel in a limited manner. Originally introduced to study the key-distribution problem, semi-Iqbal, Hasan, Krawec, Walter O.openaire +3 more sourcesPost-Quantum Cryptography [PDF]
Nature, 2011 Cryptography is essential for the security of online communication, cars and implanted medical devices. However, many commonly used cryptosystems will be completely broken once large quantum computers exist. Post-quantum cryptography is cryptography under the assumption that the attacker has a large quantum computer; post-quantum cryptosystems strive ...Bernstein, Daniel J., Lange, Tanjaopenaire +3 more sources