[HTML][HTML] Full-field implementation of a perfect eavesdropper on a quantum cryptography system

I Gerhardt, Q Liu, A Lamas-Linares, J Skaar… - Nature …, 2011 - nature.com
Quantum key distribution (QKD) allows two remote parties to grow a shared secret key. Its
security is founded on the principles of quantum mechanics, but in reality it significantly …

[引用][C] Full-field implementation of a perfect eavesdropper on a quantum cryptography system

I Gerhardt, Q Liu, A Lamas-Linares, J Skaar… - Nature …, 2011 - cir.nii.ac.jp
Full-field implementation of a perfect eavesdropper on a quantum cryptography system | CiNii
Research CiNii 国立情報学研究所 学術情報ナビゲータ[サイニィ] 詳細へ移動 検索フォームへ移動 …

Full-field implementation of a perfect eavesdropper on a quantum cryptography system

I Gerhardt, Q Liu, A Lamas-Linares… - Nature …, 2011 - econpapers.repec.org
Quantum key distribution (QKD) allows two remote parties to grow a shared secret key. Its
security is founded on the principles of quantum mechanics, but in reality it significantly …

Full-field implementation of a perfect eavesdropper on a quantum cryptography system

I Gerhardt, Q Liu, A Lamas-Linares, J Skaar… - arXiv preprint arXiv …, 2010 - arxiv.org
Quantum key distribution (QKD) allows two remote parties to grow a shared secret key. Its
security is founded on the principles of quantum mechanics, but in reality it significantly …

Full-field implementation of a perfect eavesdropper on a quantum cryptography system

I Gerhardt, Q Liu, A Lamas-Linares… - Nature …, 2011 - pubmed.ncbi.nlm.nih.gov
Quantum key distribution (QKD) allows two remote parties to grow a shared secret key. Its
security is founded on the principles of quantum mechanics, but in reality it significantly …

[PDF][PDF] Full-field implementation of a perfect eavesdropper on a quantum cryptography system

I Gerhardt, Q Liu, A Lamas-Linares… - nATuRE …, 2011 - scholar.archive.org
Results The faked-state attack. We have chosen a 'faked-state attack'(Fig. 1a) 23. Eve uses a
replica of the legitimate receiver unit (Bob′) to intercept and measure all quantum states …

Full-field implementation of a perfect eavesdropper on a quantum cryptography system

I Gerhardt, Q Liu, A Lamas-Linares… - Nature …, 2011 - ui.adsabs.harvard.edu
Quantum key distribution (QKD) allows two remote parties to grow a shared secret key. Its
security is founded on the principles of quantum mechanics, but in reality it significantly …

[PDF][PDF] Full-field implementation of a perfect eavesdropper on a quantum cryptography system

I Gerhardt, Q Liu, A Lamas-Linares, J Skaar… - arXiv preprint arXiv …, 2010 - Citeseer
Quantum key distribution (QKD) allows two remote parties to grow a shared secret key. Its
security is founded on the principles of quantum mechanics, but in reality it significantly …

Full-field implementation of a perfect eavesdropper on a quantum cryptography system

I Gerhardt, Q Liu, A Lamas-Linares, J Skaar… - Nature …, 2011 - ideas.repec.org
Quantum key distribution (QKD) allows two remote parties to grow a shared secret key. Its
security is founded on the principles of quantum mechanics, but in reality it significantly …

Full-field implementation of a perfect eavesdropper on a quantum cryptography system

I Gerhardt, Q Liu, AA Lamas-Linares, J Skaar… - 2011 - scholarbank.nus.edu.sg
Quantum key distribution (QKD) allows two remote parties to grow a shared secret key. Its
security is founded on the principles of quantum mechanics, but in reality it significantly …