Quantum cryptography
Quantum cryptography Page 1 Quantum cryptography Nicolas Gisin, Grégoire Ribordy,
Wolfgang Tittel, and Hugo Zbinden Group of Applied Physics, University of Geneva, 1211 …
Wolfgang Tittel, and Hugo Zbinden Group of Applied Physics, University of Geneva, 1211 …
Catalysis in quantum information theory
Catalysts open up new reaction pathways that can speed up chemical reactions while not
consuming the catalyst. A similar phenomenon has been discovered in quantum information …
consuming the catalyst. A similar phenomenon has been discovered in quantum information …
Experimental quantum teleportation
Quantum teleportation—the transmission and reconstruction over arbitrary distances of the
state of a quantum system—is demonstrated experimentally. During teleportation, an initial …
state of a quantum system—is demonstrated experimentally. During teleportation, an initial …
Unconditional quantum teleportation
Quantum teleportation of optical coherent states was demonstrated experimentally using
squeezed-state entanglement. The quantum nature of the achieved teleportation was …
squeezed-state entanglement. The quantum nature of the achieved teleportation was …
The physics of quantum information: basic concepts
The superposition principle plays the most central role in all considerations of quantum
information, and in most of the" gedanken" experiments and even the paradoxes of quantum …
information, and in most of the" gedanken" experiments and even the paradoxes of quantum …
Quantum nonlocality without entanglement
We exhibit an orthogonal set of product states of two three-state particles that nevertheless
cannot be reliably distinguished by a pair of separated observers ignorant of which of the …
cannot be reliably distinguished by a pair of separated observers ignorant of which of the …
Optimal eavesdrop** in quantum cryptography with six states
D Bruß - Physical Review Letters, 1998 - APS
A generalization of the quantum cryptographic protocol by Bennett and Brassard is
discussed, using three conjugate bases, ie, six states. By calculating the optimal mutual …
discussed, using three conjugate bases, ie, six states. By calculating the optimal mutual …
[BOOK][B] Quantum computing
J Gruska - 1999 - fi.muni.cz
Experimentally, secure quantum key distribution has been tested, using polarization or
phase of photons, for distance of 150 (200) km using standard optical fibres and for the …
phase of photons, for distance of 150 (200) km using standard optical fibres and for the …
Continuous variable quantum cryptography
TC Ralph - Physical Review A, 1999 - APS
USING STANDARD PRA S Page 1 Continuous variable quantum cryptography TC Ralph*
Department of Physics, Faculty of Science, The Australian National University, ACT 0200 …
Department of Physics, Faculty of Science, The Australian National University, ACT 0200 …
Quantum key distribution secured optical networks: A survey
Increasing incidents of cyber attacks and evolution of quantum computing poses challenges
to secure existing information and communication technologies infrastructure. In recent …
to secure existing information and communication technologies infrastructure. In recent …