next up previous
Next: About this document ... Up: secanal Previous: Putting things together

Bibliography

1
Ribordy, G., Gautier, J.-D., Gisin, N., Guinnard, O., Zbinden, H., 1998 Electronics Letters 34, 2116-2117.

2
Bennett, C.- H., Bessette, F., Brassard, G., Salvail, L. and Smolin, L., 1992, Journal of Cryptology, 5, no. 1, 3-28.

3
Brassard, G., Lütkenhaus, N., Mor T. and Sanders, B. S., 2000, security aspects of practical quantum cryptography, in the proceedings of EUROCRYPT'00, Lecture Notes in Computer Science, 1817, Springer-Verlag, 289-299, also available at Los Alamos preprint archive quant-ph/9911054.

4
Zbinden H., Gisin, N., Huttner, B., Muller, A. and Tittel, W., 1997, Electronics Letters 33, 586-588.

5
Bennett, C.- H, 1992, Phys. Rev. Letter, 68, 3121.

6
Brassard G. and Salvail, L., 1993, Secret-Key Reconciliation by Public Discussion, proceedings of EUROCRYPT'94, Lecture Notes in Computer Science, 765, Springer-Verlag, 410-423.

7
Bennett, C.-H., Brassard, G., Robert, J.-M. 1988, SIAM Journal on Computing, 17, no. 2, 210-229.

8
Fuchs, C.A.,van de Graaf, J., 1997, Los Alamos preprint archive quant-ph/9712042.

9
Krawczyk, H., 1994, LFSR-based hashing and authentication, proceedings of CRYPTO'94, Lecture Notes in Computer Science, 839, Springer-Verlag, 129-139.

10
Dušek, M., Jahma, M., Lütkenhaus, N., 1999, Los Alamos preprint archive quant-ph/9910106 v2.

11
Bennett C.-H, Brassard, G., Crépeau, C., Maurer, U., 1995, IEEE Trans. Information Theory, 41, 1915-1923.

12
Lütkenhaus N., 2000, Phys. Rev. A, 61, 052304.



Louis Salvail 2001-06-15