QUANTUM CRYPTOGRAPHY AND COMPARISON OF QUANTUM KEY DISTRIBUTION PROTOCOLS
Yıl 2008,
Cilt: 8 Sayı: 1, 503 - 510, 02.01.2012
Ergün Gümüş
G.Zeynep Aydın
,
M.Ali Aydın
Öz
QUANTUM CRYPTOGRAPHY AND COMPARISON OF QUANTUM KEY DISTRIBUTION PROTOCOLS
Kaynakça
- Vittorio, S., 2002, “Quantum Cryptography: Privacy Through Uncertainty” http://www.csa.com/discoveryguides/crypt/overv iew.php
- ld Quantique White Paper, 2005, “Understanding Quantum Cryptography” http://www.idquantique.com/products/files/vectis -understanding.pdf
- Ford, J., 1996, “Quantum Cryptography Tutorial” http ://www.cs.dartmouth. edu/~j ford/crypto. html #1
- Bennett, C.H., Brassard, G., 1984, “Quantum Cryptography: Public Key Distribution and Coin Tossing”
- Bennett, C.H., 1992,“Quantum Cryptography: Uncertainty in the Service of Privacy”
- Papanikolaou, N., 2004, “Techniques For Design And Validation Of Quantum Protocols”
- Goldwater, S., 1996, “Quantum Cryptography and Privacy Amplification” http://www.ai.sri.com/~goldwate/quantum.html
- Gisin, N., Ribordy, G., Tittel, W., Zbinden, H., 2004 , “Quantum cryptography”
- Fuchs, C. A., Gisin, N., Griffiths, R. B., Niu, C. S., Peres, A. , 1997, “Optimal Eavesdropping In Quantum Cryptography. I. Information bound and optimal strategy”
Yıl 2008,
Cilt: 8 Sayı: 1, 503 - 510, 02.01.2012
Ergün Gümüş
G.Zeynep Aydın
,
M.Ali Aydın
Kaynakça
- Vittorio, S., 2002, “Quantum Cryptography: Privacy Through Uncertainty” http://www.csa.com/discoveryguides/crypt/overv iew.php
- ld Quantique White Paper, 2005, “Understanding Quantum Cryptography” http://www.idquantique.com/products/files/vectis -understanding.pdf
- Ford, J., 1996, “Quantum Cryptography Tutorial” http ://www.cs.dartmouth. edu/~j ford/crypto. html #1
- Bennett, C.H., Brassard, G., 1984, “Quantum Cryptography: Public Key Distribution and Coin Tossing”
- Bennett, C.H., 1992,“Quantum Cryptography: Uncertainty in the Service of Privacy”
- Papanikolaou, N., 2004, “Techniques For Design And Validation Of Quantum Protocols”
- Goldwater, S., 1996, “Quantum Cryptography and Privacy Amplification” http://www.ai.sri.com/~goldwate/quantum.html
- Gisin, N., Ribordy, G., Tittel, W., Zbinden, H., 2004 , “Quantum cryptography”
- Fuchs, C. A., Gisin, N., Griffiths, R. B., Niu, C. S., Peres, A. , 1997, “Optimal Eavesdropping In Quantum Cryptography. I. Information bound and optimal strategy”