Quantum key distribution: security, feasibility and robustness
From MaRDI portal
Publication:3437587
zbMATH Open1115.81018MaRDI QIDQ3437587FDOQ3437587
Authors: Xiang-Bin Wang
Publication date: 9 May 2007
Recommendations
Cited In (14)
- Practical aspects of terahertz wireless quantum key distribution in indoor environments
- Attack strategies on QKD protocols
- Insider-proof encryption with applications for quantum key distribution
- Asymmetric ``4+2 protocol for quantum key distribution with finite resources
- Secure networking quantum key distribution schemes with Greenberger–Horne–Zeilinger states
- QUANTUM KEY DISTRIBUTION WITH CLASSICAL ALICE
- Quantum key distribution with classical Bob
- SECURITY OF QUANTUM KEY DISTRIBUTION WITH STRONG PHASE-REFERENCE PULSE
- Stability assessment of QKD procedures in commercial quantum cryptography systems versus quality of dark channel
- Security of practical BB84 quantum key distribution
- QUANTUM KEY-DISTRIBUTION PROTOCOL FOR N-BIT SECRET MESSAGE COMMUNICATION
- A proof of the security of quantum key distribution (extended abstract)
- Trojan horse attack free fault-tolerant quantum key distribution protocols
- Security of Device-Independent Quantum Key Distribution Protocols
This page was built for publication: Quantum key distribution: security, feasibility and robustness
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3437587)