Perfect cryptographic security from partially independent channels
STOC '91 Proceedings of the twenty-third annual ACM symposium on Theory of computing
Thermodynamics and garbage collection
ACM SIGPLAN Notices
Secret-key reconciliation by public discussion
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Quantum computing: the end of classical cryptography?
ACM SIGACT News
Security of quantum protocols against coherent measurements
STOC '95 Proceedings of the twenty-seventh annual ACM symposium on Theory of computing
25 years of quantum cryptography
ACM SIGACT News
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
A proof of the security of quantum key distribution (extended abstract)
STOC '00 Proceedings of the thirty-second annual ACM symposium on Theory of computing
Unconditional security in quantum cryptography
Journal of the ACM (JACM)
Tight security proofs for the bounded-storage model
STOC '02 Proceedings of the thiry-fourth annual ACM symposium on Theory of computing
Practical byzantine fault tolerance and proactive recovery
ACM Transactions on Computer Systems (TOCS)
Key Secrecy in a Quantum Cryptography System Based on Error-Correcting Codes
Problems of Information Transmission
AAECC-13 Proceedings of the 13th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
Error Detection and Authentication in Quantum Key Distribution
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
Information-Theoretic Cryptography
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Quantum Public-Key Cryptosystems
CRYPTO '00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
Practical Quantum Oblivious Transfer
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Protocols for Secret Key Agreement by Public Discussion Based on Common Information
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
On the Security of the Quantum Oblivious Transfer and Key Distribution Protocols
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Quantum Key Distribution and String Oblivious Transfer in Noisy Channels
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
On Deniability in Quantum Key Exchange
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Informatics - 10 Years Back. 10 Years Ahead.
The Quantum Computing Challenge
Informatics - 10 Years Back. 10 Years Ahead.
Unconditional Security in Cryptography
Lectures on Data Security, Modern Cryptology in Theory and Practice, Summer School, Aarhus, Denmark, July 1998
The Search for the Holy Grail in Quantum Cryptography
Lectures on Data Security, Modern Cryptology in Theory and Practice, Summer School, Aarhus, Denmark, July 1998
Unconditionally Secure Key Agreement Protocol
Proceedings of the 8th IMA International Conference on Cryptography and Coding
Proceedings of the 9th conference on Theoretical aspects of rationality and knowledge
A Practical Protocol for Advantage Distillation and Information Reconciliation
Designs, Codes and Cryptography
Quantum cryptography in practice
Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications
The early days of experimental quantum cryptography
IBM Journal of Research and Development
IEEE Security and Privacy
Hardware-Software Interaction: Preliminary Observations
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 3 - Volume 04
Designs, Codes and Cryptography
Provably Secure Three-Party Authenticated Quantum Key Distribution Protocols
IEEE Transactions on Dependable and Secure Computing
On the (im)possibility of non-interactive correlation distillation
Theoretical Computer Science
Hiding information in orthogonal product quantum states
CEA'07 Proceedings of the 2007 annual Conference on International Conference on Computer Engineering and Applications
Application study on public key cryptography in mobile payment
ISP'06 Proceedings of the 5th WSEAS International Conference on Information Security and Privacy
Bayesian estimates in cryptography
ICCOM'05 Proceedings of the 9th WSEAS International Conference on Communications
Information protection based on nanosecond synchronization of time scales in meteor burst channel
Automation and Remote Control
An Agent-Oriented Quantum Key Distribution for Wi-Fi Network Security
KES '08 Proceedings of the 12th international conference on Knowledge-Based Intelligent Information and Engineering Systems, Part III
On the effectiveness of secret key extraction from wireless signal strength in real environments
Proceedings of the 15th annual international conference on Mobile computing and networking
Concurrence in the framework of coherent states
Quantum Information Processing
Smooth entropy and Rényi entropy
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Information-theoretically secure secret-key agreement by NOT authenticated public discussion
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Security aspects of practical quantum cryptography
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Perfectly concealing quantum bit commitment from any quantum one-way permutation
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Quantum coin-flipping-based authentication
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Information-theoretically secret key generation for fading wireless channels
IEEE Transactions on Information Forensics and Security
Enhancing the security of quantum communication by hiding the message in a superposition
Information Sciences: an International Journal
Crypto topics and applications II
Algorithms and theory of computation handbook
Quantum authentication protocol using entangled states
ACOS'06 Proceedings of the 5th WSEAS international conference on Applied computer science
Photonic entanglement for fundamental tests and quantum communication
Quantum Information & Computation
Information reconciliation for quantum key distribution
Quantum Information & Computation
A practical trojan horse for bell-inequality-based quantum cryptography
Quantum Information & Computation
Bell inequality for quNits with binary measurements
Quantum Information & Computation
New encoding schemes for quantum authentication
Quantum Information & Computation
Time-shift attack in practical quantum cryptosystems
Quantum Information & Computation
Quantum Information & Computation
Practical random number generation protocol for entanglement-based quantum key distribution
Quantum Information & Computation
Auto-adaptive interval selection algorithm for quantum key distribution
Quantum Information & Computation
Self testing quantum apparatus
Quantum Information & Computation
Quantum Information & Computation
Quantum key distribution via tripartite coherent states
Quantum Information Processing
A prototype of a free-space QKD scheme based on the B92 protocol
Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies
Trojan horse attack strategy on quantum private communication
ISPEC'06 Proceedings of the Second international conference on Information Security Practice and Experience
Language modeling and encryption on packet switched networks
EUROCRYPT'06 Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques
An empirical analysis of the cascade error reconciliation protocol for quantum key distribution
Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research
Practical quantum bit commitment protocol
Quantum Information Processing
Quantum Information Processing
Classification of the entangled states 2 × M × N
Quantum Information Processing
A combination of blind source separation and impulsive chaos synchronisation for encryption
International Journal of Autonomous and Adaptive Communications Systems
OR Forum---Quantum Mechanics and Human Decision Making
Operations Research
Quantum Information & Computation
Quantum simultaneous secret distribution with dense coding by using cluster states
Quantum Information Processing
Trojan horse attack free fault-tolerant quantum key distribution protocols
Quantum Information Processing
Hi-index | 0.00 |