QUANTUM CRYPTOGRAPHY AND COMPARISON OF QUANTUM KEY DISTRIBUTION PROTOCOLS

QUANTUM CRYPTOGRAPHY AND COMPARISON OF QUANTUM KEY DISTRIBUTION PROTOCOLS

QUANTUM CRYPTOGRAPHY AND COMPARISON OF QUANTUM KEY DISTRIBUTION PROTOCOLS

___

  • Vittorio, S., 2002, “Quantum Cryptography: Privacy Through Uncertainty” http://www.csa.com/discoveryguides/crypt/overv iew.php
  • ld Quantique White Paper, 2005, “Understanding Quantum Cryptography” http://www.idquantique.com/products/files/vectis -understanding.pdf
  • Ford, J., 1996, “Quantum Cryptography Tutorial” http ://www.cs.dartmouth. edu/~j ford/crypto. html #1
  • Bennett, C.H., Brassard, G., 1984, “Quantum Cryptography: Public Key Distribution and Coin Tossing”
  • Bennett, C.H., 1992,“Quantum Cryptography: Uncertainty in the Service of Privacy”
  • Papanikolaou, N., 2004, “Techniques For Design And Validation Of Quantum Protocols”
  • Goldwater, S., 1996, “Quantum Cryptography and Privacy Amplification” http://www.ai.sri.com/~goldwate/quantum.html
  • Gisin, N., Ribordy, G., Tittel, W., Zbinden, H., 2004 , “Quantum cryptography”
  • Fuchs, C. A., Gisin, N., Griffiths, R. B., Niu, C. S., Peres, A. , 1997, “Optimal Eavesdropping In Quantum Cryptography. I. Information bound and optimal strategy”