Geometrical analysis of physically allowed quantum cloning transformations for quantum cryptography
From MaRDI portal
Recommendations
Cites work
- scientific article; zbMATH DE number 1054310 (Why is no real title available?)
- scientific article; zbMATH DE number 2079414 (Why is no real title available?)
- scientific article; zbMATH DE number 1424293 (Why is no real title available?)
- A history of graph entropy measures
- A transitivity analysis of bipartite rankings in pairwise multi-class classification
- APPROXIMATING SMALLEST ENCLOSING BALLS WITH APPLICATIONS TO MACHINE LEARNING
- Algorithmic superactivation of asymptotic quantum capacity of zero-capacity quantum channels
- BELL'S INEQUALITIES DETECT EFFICIENT ENTANGLEMENT
- Coherent eavesdropping strategies for the four state quantum cryptography protocol.
- Curved Voronoi diagrams
- Distillation of secret key and entanglement from quantum states
- Existence of states on quantum structures
- Fundamentals of Wireless Communication
- General formulas for capacity of classical-quantum channels
- Geometries of quantum states
- Markov property in quantum logic: A reflection
- On Bregman Voronoi diagrams
- On minimum Fisher information distributions with restricted support and fixed variance
- On the smallest enclosing information disk
- Optimal, reliable estimation of quantum states
- Optimality of the Delaunay triangulation in \(\mathbb{R}^ d\)
- Properties of a hierarchical network based on the star graph
- Quantum information theory and quantum statistics.
- Quantum information theory. An introduction.
- Qubit channels which require four inputs to achieve capacity: implications for additivity conjectures
- Results on residual Rényi entropy of order statistics and record values
- Rényi entropy rate for Gaussian processes
- Sequential attacks against differential-phase-shift quantum key distribution with weak coherent states
- Sided and Symmetrized Bregman Centroids
- Superactivation of quantum channels is limited by the quantum relative entropy function
- The Pólya information divergence
- The correlation conversion property of quantum channels
- Upper bounds on the performance of differential-phase-shift quantum key distribution
- Zero-error attacks and detection statistics in the coherent one-way protocol for quantum cryptography
Cited in
(11)- Gaussian quadrature inference for multicarrier continuous-variable quantum key distribution
- Statistical quadrature evolution by inference for multicarrier continuous-variable quantum key distribution
- A hybrid algorithm for the minimum bounding sphere problem
- Multicarrier continuous-variable quantum key distribution
- Subcarrier domain of multicarrier continuous-variable quantum key distribution
- A geometrical description of the universal \(1\rightarrow2\) asymmetric quantum cloning region
- A verifiable multi-party quantum key distribution protocol based on repetitive codes
- scientific article; zbMATH DE number 7651177 (Why is no real title available?)
- Post-processing optimization for continuous-variable quantum key distribution
- Entanglement accessibility measures for the quantum Internet
- Singular value decomposition assisted multicarrier continuous-variable quantum key distribution
This page was built for publication: Geometrical analysis of physically allowed quantum cloning transformations for quantum cryptography
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q508673)