Boolean functions for cryptography and coding theory

C Carlet - 2021 - books.google.com
Boolean functions are essential to systems for secure and reliable communication. This
comprehensive survey of Boolean functions for cryptography and coding covers the whole …

Quantum cryptography

N Gisin, G Ribordy, W Tittel, H Zbinden - Reviews of modern physics, 2002 - APS
Quantum cryptography Page 1 Quantum cryptography Nicolas Gisin, Grégoire Ribordy,
Wolfgang Tittel, and Hugo Zbinden Group of Applied Physics, University of Geneva, 1211 …

Adversarial discriminative domain adaptation

E Tzeng, J Hoffman, K Saenko… - Proceedings of the …, 2017 - openaccess.thecvf.com
Adversarial learning methods are a promising approach to training robust deep networks,
and can generate complex samples across diverse domains. They can also improve …

Overcoming the rate–distance limit of quantum key distribution without quantum repeaters

M Lucamarini, ZL Yuan, JF Dynes, AJ Shields - Nature, 2018 - nature.com
Quantum key distribution (QKD), allows two distant parties to share encryption keys with
security based on physical laws. Experimentally, QKD has been implemented via optical …

Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey

JM Hamamreh, HM Furqan… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Physical layer security (PLS) has emerged as a new concept and powerful alternative that
can complement and may even replace encryption-based approaches, which entail many …

Quantum cryptography using any two nonorthogonal states

CH Bennett - Physical review letters, 1992 - APS
Quantum techniques for key distribution—the classically impossible task of distributing
secret information over an insecure channel whose transmissions are subject to inspection …

The security of practical quantum key distribution

V Scarani, H Bechmann-Pasquinucci, NJ Cerf… - Reviews of modern …, 2009 - APS
Quantum key distribution (QKD) is the first quantum information task to reach the level of
mature technology, already fit for commercialization. It aims at the creation of a secret key …

[BOOK][B] Information theory: coding theorems for discrete memoryless systems

I Csiszár, J Körner - 2011 - books.google.com
Csiszár and Körner's book is widely regarded as a classic in the field of information theory,
providing deep insights and expert treatment of the key theoretical issues. It includes in …

Experimental quantum cryptography

CH Bennett, F Bessette, G Brassard, L Salvail… - Journal of …, 1992 - Springer
We describe results from an apparatus and protocol designed to implement quantum key
distribution, by which two users, who share no secret information initially:(1) exchange a …

[HTML][HTML] Invited review article: Single-photon sources and detectors

MD Eisaman, J Fan, A Migdall… - Review of scientific …, 2011 - pubs.aip.org
We review the current status of single-photon-source and single-photon-detector
technologies operating at wavelengths from the ultraviolet to the infrared. We discuss …