Search

Your search keyword '"BB84"' showing total 46 results

Search Constraints

Start Over You searched for: Descriptor "BB84" Remove constraint Descriptor: "BB84" Publisher iop publishing Remove constraint Publisher: iop publishing
46 results on '"BB84"'

Search Results

1. Semi device independence of the BB84 protocol

2. Explicit attacks on passive side channels of the light source in the BB84 decoy state protocol

3. Passive BB84 decoy-state protocol with a flawed source

4. Practical decoy-state BB84 quantum key distribution with quantum memory*

5. The Comparison of Secure Key Rate of BB84 Protocol Using Single Photon Detectors and Optical Homodyne Detectors

6. Efficient Implementation for PRINCE Algorithm in FPGA Based on the BB84 Protocol

7. Intercept-resend attack on passive side channel of the light source in BB84 decoy-state protocol

8. Security Analysis and Optimization of BB84 QKD System Post-Processing

9. A polarization quantum key distribution scheme based on phase matching

10. Dynamic (2, 3) Threshold Quantum Secret Sharing of Secure Direct Communication*

12. Counterfactual Quantum Deterministic Key Distribution

13. A Composed Protocol of Quantum Identity Authentication Plus Quantum Key Distribution Based on Squeezed States

14. Fluctuation Analysis of Decoy State QKD with Finite Data-Set Size

15. Efficient quantum secure communication with a publicly known key

16. Quantum cryptography: individual eavesdropping with the knowledge of the error-correcting protocol

17. Quantum Key Distribution against Trojan Horse Attacks

18. Quantum Privacy Amplification for a Sequence of Single Qubits

19. A quantum encryption scheme usingd-level systems

20. High Efficient Quantum Key Distribution by Random Using Classified Signal Coherent States

21. Gaps between equations and experiments in quantum cryptography

22. On a simple attack, limiting the range transmission of secret keys in a system of quantum cryptography based on coding in a sub-carrier frequency

23. A New Quantum Secure Direct Communication Protocol Using Decoherence-Free Subspace

24. Quantum Cryptography Using Coherent State

25. Deterministic Secure Communication Without Using Entanglement

27. Faint laser pulses versus a single-photon source in free space quantum cryptography

28. A Novel Basis Splitting Eavesdropping Scheme in Quantum Cryptography Based on the BB84 Protocol

29. Focus on Quantum Cryptography

30. A full quantum network scheme

31. Security of biased BB84 quantum key distribution with finite resource

32. A Security Proof of Measurement Device Independent Quantum Key Distribution: From the View of Information Theory

33. An experimental comparison of BB84 and SARG04 quantum key distribution protocols

34. Efficient quantum key distribution scheme with pre-announcing the basis

35. Quantum key distribution with several intercept–resend attacks via a depolarizing channel

36. Three-dimensional quantum key distribution in the presence of several eavesdroppers

37. A practical two-way system of quantum key distribution with untrusted source

38. Magnon-Photon interactions for Quantum Key Distribution

39. Efficient Phase-Encoding Quantum Key Generation with Narrow-Band Single Photons

40. An E-payment system based on quantum group signature

41. Efficient quantum key distribution via single-photon two-qubit states

42. Secure networking quantum key distribution schemes with Greenberger–Horne–Zeilinger states

43. High error-rate quantum key distribution for long-distance communication

44. Detector decoy quantum key distribution

45. Quantum communication using single photons from a semiconductor quantum dot emitting at a telecommunication wavelength

46. Efficient one-out-of-two quantum oblivious transfer based on four-coherent-state postselection protocol

Catalog

Books, media, physical & digital resources