Search

Your search keyword '"QUANTUM cryptography"' showing total 21 results

Search Constraints

Start Over You searched for: Descriptor "QUANTUM cryptography" Remove constraint Descriptor: "QUANTUM cryptography" Journal new journal of physics Remove constraint Journal: new journal of physics
21 results on '"QUANTUM cryptography"'

Search Results

1. Robustness of entanglement-based discrete- and continuous-variable quantum key distribution against channel noise.

2. Hybrid no-signaling-quantum correlations.

3. Entanglement transfer, accumulation and retrieval via quantum-walk-based qubit–qudit dynamics.

4. Investigation of underwater quantum channels in a 30 meter flume tank using structured photons.

5. Channel activation of CHSH nonlocality.

6. Multi-partite entanglement can speed up quantum key distribution in networks.

7. Device-dependent and device-independent quantum key distribution without a shared reference frame.

8. Using complete measurement statistics for optimal device-independent randomness evaluation.

9. Quantum key distribution using quantum dot single-photon emitting diodes in the red and near infrared spectral range.

10. Application of an improved version of McDiarmid inequality in finite-key-length decoy-state quantum key distribution.

11. The bulk conversion depth of the NV-center in diamond: computing a charged defect in a neutral slab.

12. Generation of arbitrary all-photonic graph states from quantum emitters.

13. Eigenvalue measurement of topologically protected edge states in split-step quantum walks.

14. Composable security in relativistic quantum cryptography.

15. Implementation vulnerabilities in general quantum cryptography.

16. Finite-key security analysis for multilevel quantum key distribution.

17. Intensity modulation and direct detection quantum key distribution based on quantum noise.

18. Robustness and device independence of verifiable blind quantum computing.

19. Spontaneous four-wave mixing in liquid-core fibers: towards fibered Raman-free correlated photon sources.

20. High-dimensional quantum cryptography with twisted light.

21. Trojan-horse attacks threaten the security of practical quantum cryptography.

Catalog

Books, media, physical & digital resources