Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Criptografia cuántica")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 160

  • Page / 7
Export

Selection :

  • and

High-fidelity entangled-photon link for Quantum Key Distribution testbedDI GIUSEPPE, Giovanni; SERGIENKO, Alexander V; SALEH, Bahaa E. A et al.SPIE proceedings series. 2003, pp 39-50, isbn 0-8194-4965-2, 12 p.Conference Paper

Optimized unitary transformation for BB84 entangling probeBRANDT, Howard E.SPIE proceedings series. 2004, pp 48-64, isbn 0-8194-5359-5, 17 p.Conference Paper

Has quantum cryptography been proven secure?NAKASSIS, Tassos; BIENFANG, J. C; JOHNSON, P et al.Proceedings of SPIE, the International Society for Optical Engineering. 2006, pp 62440I.1-62440I.9, issn 0277-786X, isbn 0-8194-6300-0, 1VolConference Paper

Privacy in a quantum worldBENNETT, C. H; SHOR, P. W.Science (Washington, D.C.). 1999, Vol 284, Num 5415, pp 747-748, issn 0036-8075Article

Implementation of BB84 protocol by QPSK modulation using dual-electrode Mach-Zehnder modulatorAGNOLINI, Sébastien; GALLION, Philippe.IEEE International conference on industria technologyl. 2004, isbn 0-7803-8662-0, 3Vol, Vol1, 250-253Conference Paper

Authenticathed quantum key distribution without classical communicationNAGY, Naya; AKL, Selim G.Parallel processing letters. 2007, Vol 17, Num 3, pp 323-335, issn 0129-6264, 13 p.Conference Paper

Effects of fiber dispersion on the time-frequency quantum cryptography protocolKUMAVOR, Patrick; YELIN, Susanne; WANE, Bine et al.Lasers and Electro-optics Society. 2004, isbn 0-7803-8557-8, 2Vol, Vol2, 493-494Conference Paper

Informed guessing of an eavesdropper's Rényi entropyMYERS, John M; TAI TSUN WU.SPIE proceedings series. 2003, pp 11-18, isbn 0-8194-4965-2, 8 p.Conference Paper

On quantum algorithms for noncommutative Hidden subgroupsETTINGER, M; HØYER, P.Lecture notes in computer science. 1999, pp 478-487, issn 0302-9743, isbn 3-540-65691-XConference Paper

Separating quantum and classical learningSERVEDIO, Rocco A.Lecture notes in computer science. 2001, pp 1065-1080, issn 0302-9743, isbn 3-540-42287-0Conference Paper

The additivity problem and constrained quantum channelsHOLEVO, A. S.Proceedings of SPIE, the International Society for Optical Engineering. 2005, pp 196-201, issn 0277-786X, isbn 0-8194-5827-9, 1Vol, 6 p.Conference Paper

Reliability of calderbank-shor-steane codes and security of quantum key distributionHAMADA, Mitsuru.IEEE International Symposium on Information Theory. 2004, isbn 0-7803-8280-3, 1Vol, p. 138Conference Paper

Quantum cryptography and quantum memoryTAI TSUN WU.SPIE proceedings series. 2004, pp 81-92, isbn 0-8194-5359-5, 12 p.Conference Paper

Linking classical and quantum key agreement : Is there bound information ?GISIN, N; WOLF, S.Lecture notes in computer science. 2000, pp 482-500, issn 0302-9743, isbn 3-540-67907-3Conference Paper

A quantum cipher with near optimal key-recyclingDAMGARD, Ivan; PEDERSEN, Thomas Brochmann; SALVAIL, Louis et al.Lecture notes in computer science. 2005, pp 494-510, issn 0302-9743, isbn 3-540-28114-2, 1Vol, 17 p.Conference Paper

On feedback and the classical capacity of a noisy quantum channelBOWEN, Garry; NAGARAJAN, Rajagopal.IEEE International Symposium on Information Theory. 2004, isbn 0-7803-8280-3, 1Vol, p. 325Conference Paper

Quantum cryptography, eavesdropping, and unsharp spin measurementROY, S; KAR, G.Lecture notes in computer science. 1999, pp 214-217, issn 0302-9743, isbn 3-540-65514-XConference Paper

A Quantum Key Distribution ProtocolLALA, P. K.Security & management. International conferenceWorldComp'2010. 2010, pp 225-228, isbn 1-60132-159-7 1-60132-162-7 1-60132-163-5, 4 p.Conference Paper

Quantum cryptography : A surveyBRUSS, Dagmar; ERDELYI, Gabor; MEYER, Tim et al.ACM computing surveys. 2007, Vol 39, Num 2, pp 1-27, issn 0360-0300, 27 p.Article

Randomized quantum key distributionSHER, Muhammad; MUSHARRAF, Muhammad; MAGEDANZ, Thomas et al.Journal of optical communications. 2006, Vol 27, Num 5, pp 278-281, issn 0173-4911, 4 p.Article

Parallel coin-tossing and constant-round secure two-party computationLINDELL, Yehuda.Journal of cryptology. 2003, Vol 16, Num 3, pp 143-184, issn 0933-2790, 42 p.Article

Quantum cryptography using different probability on random key basisNATASIRI, Warinda; SOORAKSA, Pitikhate.International conference on information and communication technologies. 2003, pp 240-243, isbn 974-615-089-8, 1Vol, 4 p.Conference Paper

Security of a sessional blind signature based on quantum cryptographWANG, Tian-Yin; CAI, Xiao-Qiu; ZHANG, Rui-Ling et al.Quantum information processing (Print). 2014, Vol 13, Num 8, pp 1677-1685, issn 1570-0755, 9 p.Article

A multiparty error-correcting method for quantum secret sharingCHEN, Rui-Ke; ZHANG, Ying-Ying; SHI, Jian-Hong et al.Quantum information processing (Print). 2014, Vol 13, Num 1, pp 21-31, issn 1570-0755, 11 p.Article

Post-quantum key exchange protocolsXIANGDONG LI; LIN LEUNG; KWAN, Andis Chi-Tung et al.Proceedings of SPIE, the International Society for Optical Engineering. 2006, pp 62440N.1-62440N.11, issn 0277-786X, isbn 0-8194-6300-0, 1VolConference Paper

  • Page / 7