Found: 130
Select item for more details and to access through your institution.
Hong–Ou–Mandel Interference in Quantum Optics, Monogamy of Entanglement, Nonorthogonality, and Untrusted Nodes.
- Published in:
- JETP Letters, 2024, v. 120, n. 1, p. 20, doi. 10.1134/S0021364024601994
- By:
- Publication type:
- Article
Implementation of a Quantum Generator of Random Numbers: Extraction of Provably Random Bit Sequences from Correlated Markov Chains.
- Published in:
- JETP Letters, 2024, v. 119, n. 7, p. 538, doi. 10.1134/S0021364024600575
- By:
- Publication type:
- Article
Measurement-Device-Independent Quantum Key Distribution.
- Published in:
- JETP Letters, 2023, v. 118, n. 1, p. 74, doi. 10.1134/S002136402360177X
- By:
- Publication type:
- Article
Transfer of Secret Keys in a Quantum Network with Trusted Intermediate Nodes and with Block Cipher Encryption.
- Published in:
- JETP Letters, 2023, v. 117, n. 6, p. 476, doi. 10.1134/S0021364023600374
- By:
- Publication type:
- Article
Quantum Algorithm for the Invariant Estimate of the Closeness of Classical Ciphers to the One-Time Pad.
- Published in:
- JETP Letters, 2023, v. 117, n. 1, p. 75, doi. 10.1134/S0021364022602846
- By:
- Publication type:
- Article
Quantum Key Distribution with Untrusted Detectors Accessible to an Eavesdropper.
- Published in:
- JETP Letters, 2022, v. 116, n. 2, p. 128, doi. 10.1134/S0021364022601142
- By:
- Publication type:
- Article
On a New Attack on Quantum Key Distribution: Joint Unambiguous Measurements of Probe States and the PNS Attack on Information States.
- Published in:
- JETP Letters, 2020, v. 112, n. 6, p. 383, doi. 10.1134/S0021364020180095
- By:
- Publication type:
- Article
On a New Attack on Quantum Key Distribution: Joint Unambiguous Measurements of Probe States and the PNS Attack on Information States.
- Published in:
- JETP Letters, 2020, v. 112, n. 6, p. 383, doi. 10.1134/S0021364020180095
- By:
- Publication type:
- Article
On Eavesdropping in Quantum Cryptography through Side Channels of Information Leakage.
- Published in:
- JETP Letters, 2020, v. 111, n. 11, p. 653, doi. 10.1134/S0021364020110065
- By:
- Publication type:
- Article
Rest mass of shears and cracks.
- Published in:
- Russian Physics Journal, 2006, v. 49, n. 1, p. 74, doi. 10.1007/s00000-006-0071-7
- By:
- Publication type:
- Article
Plastic rotation of a structural element as a whole.
- Published in:
- Russian Physics Journal, 2006, v. 49, n. 1, p. 86, doi. 10.1007/s00000-006-0072-6
- By:
- Publication type:
- Article
Side Channels of Information Leakage in Quantum Cryptography: Nonstrictly Single-Photon States, Different Quantum Efficiencies of Detectors, and Finite Transmitted Sequences.
- Published in:
- Journal of Experimental & Theoretical Physics, 2021, v. 133, n. 3, p. 272, doi. 10.1134/S1063776121080136
- By:
- Publication type:
- Article
A Simple Heuristic Derivation of Shannon's Formula for a Communication Channel with Continuous Variables in the Quantum Case.
- Published in:
- Journal of Experimental & Theoretical Physics, 2021, v. 132, n. 3, p. 362, doi. 10.1134/S1063776121030110
- By:
- Publication type:
- Article
Robustness of Quantum Cryptography Systems with Phase–Time Coding against Active Probing Attacks.
- Published in:
- Journal of Experimental & Theoretical Physics, 2020, v. 131, n. 6, p. 877, doi. 10.1134/S1063776120110138
- By:
- Publication type:
- Article
A Simple Quantum Statistical Interpretation of the Key Secrecy Criterion in Quantum Cryptography.
- Published in:
- Journal of Experimental & Theoretical Physics, 2020, v. 131, n. 3, p. 394, doi. 10.1134/S1063776120080117
- By:
- Publication type:
- Article
Trojan Horse Attacks, Decoy State Method, and Side Channels of Information Leakage in Quantum Cryptography.
- Published in:
- Journal of Experimental & Theoretical Physics, 2020, v. 130, n. 6, p. 809, doi. 10.1134/S1063776120050064
- By:
- Publication type:
- Article
The Fundamental Limit of the Random Sequence Generation Rate in Quantum Generators with a Continuous Variable.
- Published in:
- Journal of Experimental & Theoretical Physics, 2020, v. 130, n. 3, p. 370, doi. 10.1134/S1063776120020065
- By:
- Publication type:
- Article
A Simple Method of Protection against a Detector Mismatch Attack in Quantum Cryptography: The BB84 Protocol.
- Published in:
- Journal of Experimental & Theoretical Physics, 2020, v. 130, n. 2, p. 161, doi. 10.1134/S1063776120010136
- By:
- Publication type:
- Article
Erratum to: Are There Enough Decoy States to Ensure Key Secrecy in Quantum Cryptography?
- Published in:
- 2019
- By:
- Publication type:
- Correction Notice
Decoy States and Low-Density Parity-Check Error-Correcting Codes in Quantum Cryptography with Phase–Time Coding.
- Published in:
- Journal of Experimental & Theoretical Physics, 2019, v. 129, n. 2, p. 168, doi. 10.1134/S1063776119070124
- By:
- Publication type:
- Article
Quantum Key Distribution with Nonbinary Phase–Time Encoding That Admits an Exact Proof of Secrecy.
- Published in:
- Journal of Experimental & Theoretical Physics, 2019, v. 128, n. 5, p. 700, doi. 10.1134/S1063776119040101
- By:
- Publication type:
- Article
Are There Enough Decoy States to Ensure Key Secrecy in Quantum Cryptography?
- Published in:
- Journal of Experimental & Theoretical Physics, 2019, v. 128, n. 4, p. 544, doi. 10.1134/S1063776119030105
- By:
- Publication type:
- Article
Energy Conservation in Distributed Interference as a Guarantee for Detecting a Detector Blinding Attack in Quantum Cryptography.
- Published in:
- Journal of Experimental & Theoretical Physics, 2019, v. 128, n. 1, p. 45, doi. 10.1134/S1063776119010151
- By:
- Publication type:
- Article
Concatenation of Keys in Quantum Cryptography: How Quantum Entanglement "Penetrates to" Classical Devices.
- Published in:
- Journal of Experimental & Theoretical Physics, 2018, v. 127, n. 4, p. 627, doi. 10.1134/S1063776118090066
- By:
- Publication type:
- Article
A Quantum Random Number Generator Based on the 100-Mbit/s Poisson Photocount Statistics.
- Published in:
- Journal of Experimental & Theoretical Physics, 2018, v. 126, n. 6, p. 728, doi. 10.1134/S1063776118060018
- By:
- Publication type:
- Article
Quantum Key Distribution As a Scheme with Bernoulli Tests.
- Published in:
- Journal of Experimental & Theoretical Physics, 2018, v. 126, n. 6, p. 741, doi. 10.1134/S1063776118060110
- By:
- Publication type:
- Article
Distinguishability of quantum states and shannon complexity in quantum cryptography.
- Published in:
- Journal of Experimental & Theoretical Physics, 2017, v. 125, n. 1, p. 50, doi. 10.1134/S1063776117060085
- By:
- Publication type:
- Article
Mesoscopic quantum cryptography.
- Published in:
- Journal of Experimental & Theoretical Physics, 2017, v. 124, n. 3, p. 406, doi. 10.1134/S1063776117020054
- By:
- Publication type:
- Article
One-time pad, complexity of verification of keys, and practical security of quantum cryptography.
- Published in:
- Journal of Experimental & Theoretical Physics, 2016, v. 123, n. 5, p. 784, doi. 10.1134/S1063776116110169
- By:
- Publication type:
- Article
On a beam splitter attack and soft filtering of coherent states in differential phase shift quantum cryptography.
- Published in:
- Journal of Experimental & Theoretical Physics, 2014, v. 118, n. 1, p. 1, doi. 10.1134/S1063776114010099
- By:
- Publication type:
- Article
On a two-pass scheme without a faraday mirror for free-space relativistic quantum cryptography.
- Published in:
- Journal of Experimental & Theoretical Physics, 2013, v. 116, n. 5, p. 711, doi. 10.1134/S1063776113040146
- By:
- Publication type:
- Article
Entropy uncertainty relations and stability of phase-temporal quantum cryptography with finite-length transmitted strings.
- Published in:
- Journal of Experimental & Theoretical Physics, 2012, v. 115, n. 6, p. 969, doi. 10.1134/S1063776112130080
- By:
- Publication type:
- Article
On the vulnerability of basic quantum key distribution protocols and three protocols stable to attack with 'blinding' of avalanche photodetectors.
- Published in:
- Journal of Experimental & Theoretical Physics, 2012, v. 114, n. 5, p. 707, doi. 10.1134/S106377611203017X
- By:
- Publication type:
- Article
Quantum key distribution with a reference quantum state.
- Published in:
- Journal of Experimental & Theoretical Physics, 2011, v. 113, n. 5, p. 743, doi. 10.1134/S1063776111130176
- By:
- Publication type:
- Article
Quantum circuit for optimal eavesdropping in quantum key distribution using phase-time coding.
- Published in:
- Journal of Experimental & Theoretical Physics, 2010, v. 111, n. 1, p. 27, doi. 10.1134/S1063776110070046
- By:
- Publication type:
- Article
On the passive probing of fiber optic quantum communication channels.
- Published in:
- Journal of Experimental & Theoretical Physics, 2010, v. 110, n. 4, p. 561, doi. 10.1134/S1063776110040023
- By:
- Publication type:
- Article
Security of a two-parameter quantum cryptography system using time-shifted states against photon-number splitting attacks.
- Published in:
- Journal of Experimental & Theoretical Physics, 2009, v. 109, n. 4, p. 557, doi. 10.1134/S1063776109100033
- By:
- Publication type:
- Article
On the photon arrival-time-energy uncertainty relation.
- Published in:
- Journal of Experimental & Theoretical Physics, 2009, v. 108, n. 1, p. 27, doi. 10.1134/S106377610901004X
- By:
- Publication type:
- Article
Cryptographic robustness of practical quantum cryptography: BB84 key distribution protocol.
- Published in:
- Journal of Experimental & Theoretical Physics, 2008, v. 107, n. 1, p. 28, doi. 10.1134/S1063776108070030
- By:
- Publication type:
- Article
Cryptographic robustness of a quantum cryptography system using phase-time coding.
- Published in:
- Journal of Experimental & Theoretical Physics, 2008, v. 106, n. 1, p. 1, doi. 10.1134/S1063776108010019
- By:
- Publication type:
- Article
Public classical communication in quantum cryptography: Error correction, integrity, and authentication.
- Published in:
- Journal of Experimental & Theoretical Physics, 2007, v. 104, n. 5, p. 675, doi. 10.1134/S1063776107050019
- By:
- Publication type:
- Article
Some conservative estimates in quantum cryptography.
- Published in:
- Journal of Experimental & Theoretical Physics, 2006, v. 103, n. 2, p. 198, doi. 10.1134/S1063776106080036
- By:
- Publication type:
- Article
Practical Error-Correction Procedures in Quantum Cryptography.
- Published in:
- Journal of Experimental & Theoretical Physics, 2005, v. 101, n. 2, p. 230, doi. 10.1134/1.2047789
- By:
- Publication type:
- Article
On the Transmission Rate of Classical Information through Quantum Communication Channels.
- Published in:
- Journal of Experimental & Theoretical Physics, 2004, v. 98, n. 2, p. 374, doi. 10.1134/1.1675907
- By:
- Publication type:
- Article
A New Approach to Unconditional Security in Relativistic Quantum Cryptography.
- Published in:
- Journal of Experimental & Theoretical Physics, 2003, v. 97, n. 5, p. 1053, doi. 10.1134/1.1633961
- By:
- Publication type:
- Article
Relativistic Constraints on the Distinguishability of Orthogonal Quantum States.
- Published in:
- Journal of Experimental & Theoretical Physics, 2002, v. 94, n. 6, p. 1080, doi. 10.1134/1.1493158
- By:
- Publication type:
- Article
Relativistic Quantum Protocols: Bit Commitment and Coin Tossing.
- Published in:
- Journal of Experimental & Theoretical Physics, 2001, v. 93, n. 4, p. 876, doi. 10.1134/1.1420458
- By:
- Publication type:
- Article
A Simple Proof of Unconditional Security of Relativistic Quantum Cryptography.
- Published in:
- Journal of Experimental & Theoretical Physics, 2001, v. 92, n. 5, p. 871, doi. 10.1134/1.1378181
- By:
- Publication type:
- Article
Relativistic Quantum Bit Commitment in Real-Time.
- Published in:
- Journal of Experimental & Theoretical Physics, 2000, v. 90, n. 4, p. 714, doi. 10.1134/1.559156
- By:
- Publication type:
- Article
Teleportation of a continuous variable.
- Published in:
- Journal of Experimental & Theoretical Physics, 1999, v. 89, n. 3, p. 413, doi. 10.1134/1.558998
- By:
- Publication type:
- Article