Decoy state

Results: 29



#Item
21Quantum information science / Quantum key distribution / Jitter / Photon / Single-photon avalanche diode / Avalanche photodiode / Introduction to quantum mechanics / Vertical-cavity surface-emitting laser / Decoy state / Physics / Quantum cryptography / Cryptography

High-speed photon counting techniques for broadband quantum key distribution D. Rogers, J.C. Bienfang, A. Mink, B.J. Hershman, A. Nakassis, L. Ma, X. Tang, D.H. Su, Charles W. Clark, Carl J. Williams National Institute o

Add to Reading List

Source URL: w3.antd.nist.gov

Language: English - Date: 2009-03-06 13:05:00
22Conservation in the United States / Meleagrididae / Turkey hunting / National Wild Turkey Federation / Decoy / Domesticated turkey / Turkey / Hunting / Ornithology / Game birds

By David Rainer, Staff Writer Identify Your Target photos courtesy of NWTF

Add to Reading List

Source URL: www.dcnr.state.al.us

Language: English - Date: 2013-03-06 18:10:43
23Decoys / Lovelock Cave / Lovelock /  Nevada / Schoenoplectus acutus / Duck decoy / Lovelock / Nevada / Hunting / Ducks

Tule Duck Decoy Nevada’s State Artifact Lovelock Cave, first identified in 1911 by a pair of miners collecting bat guano to sell as fertilizer, contained a cache of 11 intact decoys stored inside two woven baskets. The

Add to Reading List

Source URL: dcnr.nv.gov

Language: English - Date: 2014-04-21 17:52:15
24Quantum information science / Cryptography / Quantum key distribution / Quantum optics / Laser / Photon / Decoy state / Physics / Quantum cryptography / Quantum mechanics

GS QKD[removed]V1[removed]Quantum Key Distribution (QKD); Components and Internal Interfaces

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2010-12-09 09:47:57
25Physics / Applied mathematics / Secure Communication based on Quantum Cryptography / Quantum key distribution / European Telecommunications Standards Institute / ETSI Satellite Digital Radio / Quantum mechanics / Decoy state / Quantum cryptography / Quantum information science / Cryptography

Quantum Key Distribution_2012_05.pub

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2012-09-18 12:09:01
26Applied mathematics / Decoy state / Quantum key distribution / ETSI Satellite Digital Radio / Information-theoretic security / Man-in-the-middle attack / European Telecommunications Standards Institute / Security parameter / Cryptographic protocol / Quantum cryptography / Cryptography / Quantum information science

GS QKD[removed]V1[removed]Quantum Key Distribution (QKD); Security Proofs

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2010-12-09 09:45:52
27Cryptography / Quantum information science / Quantum key distribution / Photon / BB84 / Bell test experiments / Alice and Bob / Decoy state / Physics / Quantum cryptography / Quantum mechanics

Perfect eavesdropping on a quantum cryptography system Ilja Gerhardt,1, 2 Qin Liu,1, 3 Ant´ıa Lamas-Linares,2 Johannes Skaar,3, 4 Christian Kurtsiefer,2, a) and Vadim Makarov3, b) 1) These authors contributed equally t

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2010-11-01 20:12:12
28Physics / Applied mathematics / Quantum key distribution / BB84 / Qubit / No-cloning theorem / SARG04 / Decoy state / Quantum information science / Quantum cryptography / Theoretical computer science

Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulses implementations Valerio Scarani1 , Antonio Ac´ın1 , Gr´egoire Ribordy2 and Nicolas Gisin1

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2008-02-01 00:52:07
29Theoretical computer science / Quantum information science / Cryptography / Quantum key distribution / Decoy state / BB84 / Photon / Physics / Quantum cryptography / Quantum mechanics

Decoy State Quantum Key Distribution Hoi-Kwong Lo, Xiongfeng Ma, and Kai Chen Center for Quantum Information and Quantum Control,

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2008-02-01 03:52:58
UPDATE