Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Cryptographie quantique")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 651

  • Page / 27

Export

Selection :

  • and

Experimental quantum secret sharing and third-man quantum cryptographyCHEN, Yu-Ao; ZHANG, An-Ning; ZHI ZHAO et al.Physical review letters. 2005, Vol 95, Num 20, pp 200502.1-200502.4, issn 0031-9007Article

Realizing long-term quantum cryptography : QUANTUM OPTICAL INFORMATION TECHNOLOGIESMIRZAL, Abdul; PETRUCCIONE, Francesco.Journal of the Optical Society of America. B, Optical physics (Print). 2010, Vol 27, Num 6, issn 0740-3224, A185-A188Article

Decoy state quantum key distributionLO, Hoi-Kwong; XIONGFENG MA; KAI CHEN et al.Physical review letters. 2005, Vol 94, Num 23, pp 230504.1-230504.4, issn 0031-9007Article

Symmetric extendibility for a class of qudit statesRANADE, Kedar S.Journal of physics. A, Mathematical and theoretical (Print). 2009, Vol 42, Num 42, issn 1751-8113, 425302.1-425302.11Article

Quantum Computation and Quantum CryptographyMOSCA, Michele; TAPP, Alain.Algorithmica. 2002, Vol 34, Num 4, pp 309-559, issn 0178-4617Serial Issue

High-fidelity entangled-photon link for Quantum Key Distribution testbedDI GIUSEPPE, Giovanni; SERGIENKO, Alexander V; SALEH, Bahaa E. A et al.SPIE proceedings series. 2003, pp 39-50, isbn 0-8194-4965-2, 12 p.Conference Paper

Path-length control in a interferometric QKD linkELLIOTT, Brig B; PIKALO, Oleksiy; SCHLAFER, John et al.SPIE proceedings series. 2003, pp 26-38, isbn 0-8194-4965-2, 13 p.Conference Paper

La cryptographie quantique = The quantum cryptographyFLEURY, Matthieu.Technologies internationales (Strasbourg). 2001, Num 77, pp 33-36, issn 1165-8568Article

Quantum blind signature based on Two-State Vector FormalismSU QI; HUANG ZHENG; WEN QIAOYAN et al.Optics communications. 2010, Vol 283, Num 21, pp 4408-4410, issn 0030-4018, 3 p.Article

Practical limitation for continuous-variable quantum cryptography using coherent statesNAMIKI, Ryo; HIRANO, Takuya.Physical review letters. 2004, Vol 92, Num 11, pp 117901.1-117901.4, issn 0031-9007Article

Quantum no-key protocol with inherent identificationLI YANG; LEI HU.Proceedings of SPIE, the International Society for Optical Engineering. 2006, pp 63050J.1-63050J.6, issn 0277-786X, isbn 0-8194-6384-1, 1VolConference Paper

Lower and upper bounds on the secret-key rate for quantum key distribution protocols using one-way classical communicationKRAUS, B; GISIN, N; RENNER, R et al.Physical review letters. 2005, Vol 95, Num 8, issn 0031-9007, 080501-1-080501-4Article

Secure key from bound entanglementHORODECKI, Karol; HORODECKI, Michał; HORODECKI, Paweł et al.Physical review letters. 2005, Vol 94, Num 16, pp 160502.1-160502.4, issn 0031-9007Article

Optimized unitary transformation for BB84 entangling probeBRANDT, Howard E.SPIE proceedings series. 2004, pp 48-64, isbn 0-8194-5359-5, 17 p.Conference Paper

Information-theoretic limits to quantum cryptographyBARNETT, S. M; PHOENIX, S. J. D.Physical review. A. 1993, Vol 48, Num 1, pp R5-R8, issn 1050-2947, AArticle

Quantum cryptography without switchingWEEDBROOK, Christian; LANCE, Andrew M; BOWEN, Warwick P et al.Physical review letters. 2004, Vol 93, Num 17, pp 170504.1-170504.4, issn 0031-9007Article

Implementation of BB84 protocol by QPSK modulation using dual-electrode Mach-Zehnder modulatorAGNOLINI, Sébastien; GALLION, Philippe.IEEE International conference on industria technologyl. 2004, isbn 0-7803-8662-0, 3Vol, Vol1, 250-253Conference Paper

Introduction of quantum cryptography and its development : Quantum information technologyNAMBU, Yoshihiro; KOSAKA, Hideo.NEC research & development. 2003, Vol 44, Num 3, pp 285-289, issn 0547-051X, 5 p.Article

Status of a multiplexed single photon on-demand sourceMIGDALL, A. L; CASTELLETTO, S; WARE, M et al.SPIE proceedings series. 2003, pp 294-302, isbn 0-8194-4965-2, 9 p.Conference Paper

Technologies for Quantum CommunicationsRARITY, J. G; GISIN, Nicolas; BULLER, Gerald et al.Journal of modern optics (Print). 2001, Vol 48, Num 13, issn 0950-0340, 169 p.Serial Issue

les lois nouvelles de l'information quantique = Quantum information new lawsDELAHAYE, J.-P.Pour la science. 1998, Num 250, pp 66-72, issn 0153-4092Article

Cryptography and System State Estimation Using Polarization StatesKAK, Subhash; VERMA, Pramode; MACDONALD, Greg et al.Proceedings of SPIE, the International Society for Optical Engineering. 2011, Vol 8121, issn 0277-786X, isbn 978-0-8194-8731-5, 81210M.1-81210M.9Conference Paper

Beating the photon-number-splitting attack in practical quantum cryptographyWANG, Xiang-Bin.Physical review letters. 2005, Vol 94, Num 23, pp 230503.1-230503.4, issn 0031-9007Article

Quantum key distribution with vacua or dim pulses as decoy statesLO, Hoi-Kwong.IEEE International Symposium on Information Theory. 2004, isbn 0-7803-8280-3, 1Vol, p. 137Conference Paper

On deniability in quantum key exchangeBEAVER, Donald.Lecture notes in computer science. 2002, pp 352-367, issn 0302-9743, isbn 3-540-43553-0Conference Paper

  • Page / 27