Pages that link to "Item:Q1871823"
From MaRDI portal
The following pages link to Security of practical BB84 quantum key distribution (Q1871823):
Displaying 24 items.
- Quantum scheme for an optimal attack on quantum key distribution protocol BB84 (Q663968) (← links)
- Efficient quantum key distribution scheme and a proof of its unconditional security (Q814839) (← links)
- A proof of the security of quantum key distribution (Q862412) (← links)
- Quantum key distribution: from principles to practicalities (Q1567569) (← links)
- Advanced unambiguous state discrimination attack and countermeasure strategy in a practical B92 QKD system (Q1653917) (← links)
- Security of the Bennett-Brassard quantum key distribution protocol against collective attacks (Q1662481) (← links)
- Can the use of the Leggett-Garg inequality enhance security of the BB84 protocol? (Q1681869) (← links)
- Security of BB84 with weak randomness and imperfect qubit encoding (Q1746886) (← links)
- Security of practical time-reversed EPR quantum key distribution (Q1871822) (← links)
- Security of quantum key distribution against all collective attacks (Q1871825) (← links)
- Unconditional security of a \(K\)-state quantum key distribution protocol (Q1991005) (← links)
- Composable security against collective attacks of a modified BB84 QKD protocol with information only in one basis (Q2007718) (← links)
- Estimating security of the quantum key distribution from the guesswork (Q2107099) (← links)
- Ternary quantum key distribution protocol based on Hadamard gate (Q2113977) (← links)
- Asymmetric ``4+2'' protocol for quantum key distribution with finite resources (Q2443961) (← links)
- Simple analysis of security of the BB84 quantum key distribution protocol (Q2677238) (← links)
- A simple proof of the unconditional security of quantum key distribution (Q2766213) (← links)
- Graphical calculus for quantum key distribution (extended abstract) (Q2825376) (← links)
- From Bell’s Theorem to Secure Quantum Key Distribution (Q3107860) (← links)
- Security of quantum key distribution with imperfect devices (Q3522485) (← links)
- Proof of security of quantum key distribution with two-way classical communications (Q4679922) (← links)
- The security analysis of the BB84 protocol in the case of Calderbank–Shor–Steane code leakage (Q5074439) (← links)
- Distributed Relay Protocol for Probabilistic Information-Theoretic Security in a Randomly-Compromised Network (Q5502790) (← links)
- (Q5866530) (← links)