Results 181 to 190 of about 460,882 (215)
Long-distance continuous-variable quantum key distribution over 100-km fiber with local local oscillator. [PDF]
Hajomer AAE+5 more
europepmc +1 more source
Robustness of the BB84 quantum key distribution protocol against general coherent attacks [PDF]
Georgios M. Nikolopoulos, G. Alber
openalex
Efficient Integration of Rate-Adaptive Reconciliation with Syndrome-Based Error Estimation and Subblock Confirmation for Quantum Key Distribution. [PDF]
Treeviriyanupab P, Zhang CM.
europepmc +1 more source
Enhancing Performance of Continuous-Variable Quantum Key Distribution (CV-QKD) and Gaussian Modulation of Coherent States (GMCS) in Free-Space Channels under Individual Attacks with Phase-Sensitive Amplifier (PSA) and Homodyne Detection (HD). [PDF]
Alshaer N, Ismail T, Mahmoud H.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
2021
Quantum key distribution (QKD) provides a means of secure communication between two parties. QKD exploits the principle that you cannot eavesdrop on a quantum communication channel without producing a detectable disturbance.
openaire +3 more sources
Quantum key distribution (QKD) provides a means of secure communication between two parties. QKD exploits the principle that you cannot eavesdrop on a quantum communication channel without producing a detectable disturbance.
openaire +3 more sources
Floodlight Quantum Key Distribution
Conference on Lasers and Electro-Optics, 2016Floodlight quantum key distribution (FL-QKD) is capable of Gbit/s secret-key rates over metropolitan area distances without multiplexing. This talk summarizes the FL-QKD protocol, its potential secret-key rates, and its proof-of-principle experimental demonstration.
Franco N. C. Wong+4 more
openaire +3 more sources
Quantum Key Distribution [PDF]
In this chapter a complete QKD protocol is presented, starting from the transmission via the quantum channel up to the communication over the public channel. The protocol described here is the BB84 protocol, named after Bennett and Brassard [5]. There are other protocols like the B92 protocol [3], the six-state protocol [8], the SARG protocol [19] and ...
openaire +1 more source
2018
Conventional implementations of cryptography are only computationally secure. The security of quantum cryptography (QC), on the other hand, is based on the inherent uncertainty in quantum phenomena at the physical layer of a communication system.
Mayssaa El Rifai+2 more
openaire +2 more sources
Conventional implementations of cryptography are only computationally secure. The security of quantum cryptography (QC), on the other hand, is based on the inherent uncertainty in quantum phenomena at the physical layer of a communication system.
Mayssaa El Rifai+2 more
openaire +2 more sources