Search

Your search keyword '"Quantum cryptography"' showing total 93 results

Search Constraints

Start Over You searched for: Descriptor "Quantum cryptography" Remove constraint Descriptor: "Quantum cryptography" Journal new journal of physics Remove constraint Journal: new journal of physics
93 results on '"Quantum cryptography"'

Search Results

1. Robustness of entanglement-based discrete- and continuous-variable quantum key distribution against channel noise.

2. Mode pairing quantum key distribution with light source monitoring

3. Hybrid no-signaling-quantum correlations.

4. Discrete-modulation continuous-variable quantum key distribution with a high key rate

5. Device-independent oblivious transfer from the bounded-quantum-storage-model and computational assumptions

6. Quantum private function evaluation

7. Quantum walks-based simple authenticated quantum cryptography protocols for secure wireless sensor networks

8. Entanglement transfer, accumulation and retrieval via quantum-walk-based qubit–qudit dynamics.

9. Investigation of underwater quantum channels in a 30 meter flume tank using structured photons.

10. Channel activation of CHSH nonlocality.

11. Quantum security and theory of decoherence

12. Phase-matching quantum key distribution with advantage distillation

13. Security of quantum key distribution with source and detection imperfections

14. Zero-error attack against coherent-one-way quantum key distribution

15. Device-independent quantum key distribution from computational assumptions

16. Multi-label learning for improving discretely-modulated continuous-variable quantum key distribution

17. Simple method for asymmetric twin-field quantum key distribution

18. Multi-partite entanglement can speed up quantum key distribution in networks.

19. Beating the repeaterless bound with adaptive measurement-device-independent quantum key distribution

20. Composable security in relativistic quantum cryptography

21. Quantum interference of multi-photon at beam splitter with application in measurement-device-independent quantum key distribution

22. Device-independent randomness generation from several Bell estimators

23. Implementation vulnerabilities in general quantum cryptography

24. Entanglement generation secure against general attacks

25. Device-dependent and device-independent quantum key distribution without a shared reference frame.

26. Multi-partite squash operation and its application to device-independent quantum key distribution

27. Device-independent bit commitment based on the CHSH inequality

28. Self-testing protocols based on the chained Bell inequalities

29. Device-independent two-party cryptography secure against sequential attacks

30. Using complete measurement statistics for optimal device-independent randomness evaluation.

31. Quantum key distribution using quantum dot single-photon emitting diodes in the red and near infrared spectral range.

32. Photon-efficient quantum key distribution using time–energy entanglement with high-dimensional encoding

33. Trojan-horse attacks threaten the security of practical quantum cryptography

34. Practical issues of twin-field quantum key distribution

35. Application of an improved version of McDiarmid inequality in finite-key-length decoy-state quantum key distribution.

36. The bulk conversion depth of the NV-center in diamond: computing a charged defect in a neutral slab.

37. Generation of arbitrary all-photonic graph states from quantum emitters.

38. Eigenvalue measurement of topologically protected edge states in split-step quantum walks.

39. Focus on device independent quantum information

40. Quantum key distribution without sending a quantum signal

41. High-dimensional quantum cryptography with twisted light

42. Focus on Single Photons on Demand

43. Focus on Quantum Cryptography

44. Finite-key security analysis for multilevel quantum key distribution.

45. Intensity modulation and direct detection quantum key distribution based on quantum noise.

46. Robustness and device independence of verifiable blind quantum computing.

47. Spontaneous four-wave mixing in liquid-core fibers: towards fibered Raman-free correlated photon sources.

48. High-dimensional quantum cryptography with twisted light.

49. Optical networking for quantum key distribution and quantum communications

50. Decoy-state quantum key distribution with both source errors and statistical fluctuations

Catalog

Books, media, physical & digital resources