Information Technology Reference
In-Depth Information
137. E. Knill, R. Laflamme, and W. Zurek. Threshold accuracy for quantum computation.
1996. (Online preprint quant-ph/9610011)
138. E. Knill, R. Laflamme, and W. H. Zurek. Resilient quantum computation: error
models and thresholds. 1997. (Online preprint quant-ph/9702058)
139. C. H. Bennett, G. Brassard, S. Breidbart, and S. Wiesner. Quantum cryptography, or
unforgeable subway tokens In: D. Chaum, R. L. Rivest and A. T. Sherman (eds.),
Advances in Cryptology: Proceedings of Crypto, 82: pp 267-275, 1982. New York:
Plenum Press, 1983.
140. C. H. Bennett and G. Brassard. Quantum cryptography: public key distribution
and coin tossing. In: Proceedings of the IEEE International Conference on Compu-
ters, Systems, and Signal Processing, Bangalore, India. New York: IEEE, 1984,
pp 175179.
141. C. H. Bennett, G. Brassard, and A. Ekert. Quantum cryptography. Scientific
American, Oct 1992 pp 50-57.
142. G. Brassard. Cryptology column—quantum cryptography: a bibliography. Sigact
News, 24(3): pp 16-20, 1993.
143. C. H. Bennett and G. Brassard. An update on quantum cryptography. In: G. R.
Blakley, D. Chaum, editors. Advances in Cryptology: Proceedings of CRYPTO 84,
Volume 196 of Lecture Notes in Computer Science, Aug 1984, pp 475-480. New York:
Springer-Verlag, 1995.
144. G. Brassard. Cryptology column: quantum computing: the end of classical crypto-
graphy? SIGACTN: SIGACT News (ACM Special Interest Group on Automata and
Computability Theory), 25: 1994.
145. N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden. Quantum cryptography. Review of
Modern Physics, 74: p 145, 2002.
146. Y. Ozhigov. Protection of information in quantum qatabases, 1997. (Online preprint
quant-ph/9712016)
147. J. Hruby. Q-deformed quantum cryptography. In: A. De Santis, editor. Advances in
Cryptology: EUROCRYPT 94, Volume 950 of Lecture Notes in Computer Science.
Springer-Verlag, 1995, pp 468-472.
148. C. H. Bennett, F. Bessette, G. Brassard, L. Salvail, and J. Smolin. Experimental
quantum cryptography. Journal of Cryptology, 5(1): pp 3-28, 1992.
149. R. J. Hughes, G. G. Luther, G. L. Morgan, C. G. Peterson, and C. Simmons.
Quantum cryptography over underground optical fibers. In: Neal Koblitz, editor.
Advances in Cryptology: CRYPTO '96, Volume 1109 of Lecture Notes in Computer
Science. Berlux: Springer-Verlag, pp 329-342, Aug 1996.
150. C. H. Bennett, G. Brassard, C. Crpeau, and M. H. Skubiszewska. Practical quantum
oblivious transfer. In: J. Feigenbaum, editor. Advances in Cryptology: CRYPTO '91,
Volume 576 of Lecture Notes in Computer Science. New York: Springer-Verlag,
pp 351-366, Aug 1992.
151. D. Mayers. On the security of the quantum oblivious transfer and key distribution
protocols. In: Don Coppersmith, editor. Advances in Cryptology: CRYPTO '95,
Volume 963 of Lecture Notes in Computer Science. New York: Springer-Verlag,
pp 124-135, Aug 1995.
152. D. Mayers. Quantum key distribution and string oblivious transfer in noisy channels.
In: Neal Koblitz, editor. Advances in Cryptology: CRYPTO '96, Volume 1109 of
 
Search WWH ::




Custom Search