Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Advances in quantum cryptography
Quantum cryptography is arguably the fastest growing area in quantum information science.
Novel theoretical protocols are designed on a regular basis, security proofs are constantly …
Novel theoretical protocols are designed on a regular basis, security proofs are constantly …
Security in quantum cryptography
Quantum cryptography exploits principles of quantum physics for the secure processing of
information. A prominent example is secure communication, ie, the task of transmitting …
information. A prominent example is secure communication, ie, the task of transmitting …
Phase-matching quantum key distribution
Quantum key distribution allows remote parties to generate information-theoretic secure
keys. The bottleneck throttling its real-life applications lies in the limited communication …
keys. The bottleneck throttling its real-life applications lies in the limited communication …
Secure quantum key distribution
Secure communication is crucial in the Internet Age, and quantum mechanics stands poised
to revolutionize cryptography as we know it today. In this Review, we introduce the …
to revolutionize cryptography as we know it today. In this Review, we introduce the …
Quantum random number generation
Quantum physics can be exploited to generate true random numbers, which have important
roles in many applications, especially in cryptography. Genuine randomness from the …
roles in many applications, especially in cryptography. Genuine randomness from the …
Security of quantum key distribution
Quantum Information Theory is an area of physics which studies both fundamental and
applied issues in quantum mechanics from an information-theoretical viewpoint. The …
applied issues in quantum mechanics from an information-theoretical viewpoint. The …
Implementation of continuous-variable quantum key distribution with composable and one-sided-device-independent security against coherent attacks
T Gehring, V Händchen, J Duhme, F Furrer… - Nature …, 2015 - nature.com
Secret communication over public channels is one of the central pillars of a modern
information society. Using quantum key distribution this is achieved without relying on the …
information society. Using quantum key distribution this is achieved without relying on the …
Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems
Quantum-key-distribution (QKD) systems can send quantum signals over more than 100 km
standard optical fiber and are widely believed to be secure. Here, we show experimentally a …
standard optical fiber and are widely believed to be secure. Here, we show experimentally a …
Security of device-independent quantum key distribution protocols: a review
Device-independent quantum key distribution (DI-QKD) is often seen as the ultimate key
exchange protocol in terms of security, as it can be performed securely with uncharacterised …
exchange protocol in terms of security, as it can be performed securely with uncharacterised …
Quantum and relativistic protocols for secure multi-party computation
After a general introduction, the thesis is divided into four parts. In the first, we discuss the
task of coin tossing, principally in order to highlight the effect different physical theories have …
task of coin tossing, principally in order to highlight the effect different physical theories have …