Quantum cryptography

Results: 548



#Item
281Theoretical computer science / Quantum measurement / Quantum cryptography / Coherent states / Quantum entanglement / Bell state / Photon / Quantum channel / Gaussian function / Physics / Quantum mechanics / Quantum information science

3-5 Manipulation and Measurement of Quantum Signals via Non-Gaussian Operation KITAGAWA Akira, TAKEOKA Masahiro, SASAKI Masahide, Anthony Chefles, and Norbert Lütkenhaus On the current communication scheme, Gaussian coh

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2013-11-21 19:56:43
282Cryptography / Polarization / Electromagnetic radiation / Quantum key distribution / Circular polarization / Photon / Degree of polarization / Laser / Optical fiber / Physics / Quantum information science / Quantum cryptography

4-6 Experimental Results of Polarization Characteristics Measurements through Satellite-to-Ground Propagation Paths toward Satellite Quantum Key Distribution TOYOSHIMA Morio, TAKENAKA Hideki, SHOJI Yozo, TAKAYAMA Yoshihi

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2013-11-21 21:13:13
283Photonics / Optical fiber / Quantum network / Quantum cryptography / Emerging technologies / ICFO / Quantum key distribution / Quantum information science / Physics / Optics

1 Research Activities on Photonic and Quantum Communications in NICT SASAKI Masahide and KAWANISHI Tetsuya Communications technology has changed greatly since the invention of lasers and optical fibers. Today, informatio

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2013-11-21 19:54:06
284Theoretical computer science / Applied mathematics / Error detection and correction / Quantum key distribution / Computer arithmetic / Cryptographic hash function / Hash function / Hamming / MD5 / Cryptography / Quantum information science / Quantum cryptography

3-7 Error Detection and Authentication in Quantum Key Distribution YAMAMURA Akihiro and ISHIZUKA Hirokazu Detecting errors in a raw key and authenticating a private key are crucial for quantum key distribution schemes. O

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2013-11-21 18:58:38
285Quantum cryptography / Quantum information science / Quantum key distribution / Quantum computer / Photon / Quantum information / Public-key cryptography / Cryptosystem / Optical fiber / Physics / Cryptography / Theoretical computer science

3-2 Secure Communication with Quantum Cryptography HASEGAWA Toshio, NISHIOKA Tsuyoshi, ISHIZUKA Hirokazu, NAMBU Yoshihiro, TOMITA Akihisa, and TAJIMA Akio Quantum cryptography, which has the advantage of being able to de

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2006-11-20 07:55:22
286Applied mathematics / Quantum computer / Joint Quantum Institute / Quantum technology / Qubit / Quantum cryptography / Quantum programming / Quantum key distribution / Quantum information science / Theoretical computer science / Physics

QUANTUM INFORMATION AT NIST BY THE NUMBERS 4 Nobel Prizes

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2015-02-03 12:43:39
287Quantum measurement / Quantum information science / Quantum cryptography / Quantum optics / Photon / Quantum decoherence / Qubit / Quantum computer / Laser / Physics / Optics / Bosons

Light, meet matter: Single-photon quantum memory in diamond optical phonons at room temperature

Add to Reading List

Source URL: phys.org

Language: English - Date: 2015-04-13 09:36:44
288Applied mathematics / Quantum cryptography / Cryptography / Emerging technologies / Quantum computer / Quantum information / Quantum mechanics / Qubit / Quantum / Theoretical computer science / Physics / Quantum information science

February[removed]Physics and: digital security An Institute of Physics briefing note When so much sensitive information

Add to Reading List

Source URL: www.iop.org

Language: English - Date: 2015-04-07 09:33:12
289Quantum cryptography / Crime prevention / National security / CRYPTREC / Quantum key distribution / Public-key cryptography / Information security / Side channel attack / Computer security / Cryptography / Security / Quantum information science

4 Security Fundamentals Technology 4-1 R  esearch Activity on Security Fundamentals Technology TANAKA Hidema

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2013-11-21 21:07:26
290Theoretical computer science / Cryptography / Lattice points / Quantum information science / Analytic geometry / Lattice / Quantum algorithm / Quantum computer / Lenstra–Lenstra–Lovász lattice basis reduction algorithm / Mathematics / Applied mathematics / Abstract algebra

SOLILOQUY: A CAUTIONARY TALE Peter Campbell, Michael Groves and Dan Shepherd CESG, Cheltenham, UK 1. Introduction The Soliloquy primitive, first proposed by the third author in 2007, is

Add to Reading List

Source URL: docbox.etsi.org

Language: English - Date: 2014-10-13 10:57:18
UPDATE