This page lists the bibliography entries of the book Quantum Cryptography and Secret-Key Distillation. Most of the entries contain hyperlinks so that the reader can easily find an article, report or book on the web. When possible, links to free-access e-prints are also given, in addition to the official published articles.
Go to: [20] • [40] • [60] • [80] • [100] • [120] • [140] • [160] • [180]
Bibliography
- and , Compression with side information using turbo codes, Proc. IEEE Data Compression Conf. (DCC) (2002) • See also: http://ivms.stanford.edu/~amaaron/publications/aaron_02dcc_sideinfo.pdf
- , , , , , , , and , Experimental open-air quantum key distribution with a single-photon source, New J. Phys. 6, 92 (2004) • See also: arXiv e-print quant-ph/0402110 (2004)
- and , Source coding and graph entropies, IEEE Trans. Inform. Theory 42, 1329–1339 (1996) • See also: http://kodiak.ucsd.edu/alon/papers/oneave.ps.gz
- , Algorithms for programmers (working title), http://www.jjj.de/fxt/ (2004)
- , , and , Optimal decoding of linear codes for minimizing symbol error rate, IEEE Trans. Inform. Theory IT-20, 284–287 (1974)
- , Analog speech security systems, Advances in Cryptology – Eurocrypt '82, Lecture Notes in Computer Science, 130–146 (1982) • See also: http://www.springerlink.com/link.asp?id=v08c639pf6km0d9c
- , and , Keying hash functions for message authentication, Advances in Cryptology – Crypto '96, Lecture Notes in Computer Science, 1–15 (1996) • See also: http://www-cse.ucsd.edu/~mihir/papers/hmac.html
- , , , and , The universal composable security of quantum key distribution, Proc. Second Theory of Cryptography Conf. (TCC), 386–406 (2005) • See also: arXiv e-print quant-ph/0409078 (2004)
- , , and , Quantum key distribution with continuous variables, J. Mod. Opt. 48, 1903–1920 (2001)
- and , Public-key distribution and coin tossing, Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, India, 175–179 (1984) • See also: http://www.research.ibm.com/people/b/bennetc/bennettc198469790513.pdf
- , and , Privacy amplification by public discussion, SIAM J. Comput. 17, 210–229 (1988)
- , and , Quantum cryptography, Sci. Am. 267, 50–57 (1992)
- , , , and , Experimental quantum cryptography, J. Cryptol. 5, 3–28 (1992) • See also: http://www.cs.mcgill.ca/~crepeau/GZIP/BBBSS92.ps.gz
- , Quantum cryptography using any two non-orthogonal states, Phys. Rev. Lett. 68, 3121–3124 (1992) • See also: http://www.research.ibm.com/people/b/bennetc/qc2nos.pdf
- , , and , Generalized privacy amplification, IEEE Trans. Inform. Theory 41, 1915–1923 (1995) • See also: http://www.crypto.ethz.ch/pubs/BBCM95.html
- , , , , and , Purification of noisy entanglement and faithful teleportation via noisy channels, Phys. Rev. Lett. 76, 722–725 (1996) • See also: arXiv e-print quant-ph/9511027 (1995)
- , and , Near Shannon limit error-correction coding and decoding: turbo-codes, Proc. Int. Conf. Communications, 1064–1070 (1993)
- , and , Enhanced autocompensating quantum cryptography system, Appl. Opt. LP 41, 1640–1648 (2002) • See also: arXiv e-print quant-ph/0104089 (2001)
- , , , , and , Single photon quantum cryptography, Phys. Rev. Lett. 89, 187901 (2002) • See also: arXiv e-print quant-ph/0206136 (2002)
- and , Differential cryptanalysis of DES-like cryptosystems, Advances in Cryptology – Crypto '90, Lecture Notes in Computer Science, 2–21 (1990) • See also: http://www.cs.technion.ac.il/~biham/publications.html
- and , Differential cryptanalysis of DES-like cryptosystems, J. Cryptol. 4, 3–72 (1991) • See also: http://www.cs.technion.ac.il/~biham/publications.html
- and , Differential cryptanalysis of the full 16-round DES, Advances in Cryptology – Crypto '92, Lecture Notes in Computer Science, 487–496 (1992) • See also: http://www.cs.technion.ac.il/~biham/publications.html
- , , , and , A proof of the security of quantum key distribution, Proc. of the 32nd Annual ACM Symp. on Theory of Computing, 715–724 (1999) • See also: arXiv e-print quant-ph/9912053 (1999)
- , , , and , UMAC: fast and secure message authentication, Advances in Cryptology – Crypto '99, Lecture Notes in Computer Science, 216–233 (1999) • See also: http://fastcrypto.org/umac/
- , and , Efficient reconciliation of correlated continuous random variables using LDPC codes, arXiv e-print cs.IT/0509041 (2005)
- , , , , , , and , Experiments on long-wavelength (1550 nm) ‘plug and play’ quantum cryptography systems, Opt. Express 4, 383–387 (1999)
- and , Secret-key reconciliation by public discussion, Advances in Cryptology – Eurocrypt '93, Lecture Notes in Computer Science, 410–423 (1993) • See also: http://www.cs.mcgill.ca/~crepeau/PS/BS93.ps
- , and , A fast algorithm for testing reducibility of trinomials mod 2 and some new primitive trinomials of degree 3021377, Math. Comp. 72, 1443–1452 (2003)
- , and , Search for primitive trinomials (mod 2), http://web.comlab.ox.ac.uk/oucl/work/richard.brent/trinom.html (2004) • See also: http://wwwmaths.anu.edu.au/~brent/trinom.html (2007)
- , , and , Phase covariant quantum cloning, Phys. Rev. A 62, 012302 (2000) • See also: arXiv e-print quant-ph/9909046 (1999)
- , , , , and , Fast, efficient error reconciliation for quantum cryptography, Phys. Rev. A 67, 052303 (2003) • See also: arXiv e-print quant-ph/0203096 (2002)
- , Entropy Measures and Unconditional Security in Cryptography, Ph.D. thesis, ETH Zürich (1997)
- , Multilevel codes and multistage decoding, IEEE Trans. Inform. Theory 37, 222–229 (1989)
- and , Good quantum error-correcting codes exist, Phys. Rev. A 54, 1098–1105 (1996) • See also: arXiv e-print quant-ph/9512032 (1995)
- , Quantization With an Information-Theoretic Distortion Measure, Technical Report 491, Université Libre de Bruxelles (2002)
- and , Construction of a shared secret key using continuous variables, Proc. IEEE Inform. Th. Workshop (ITW) (2003) • See also: on this site
- , and , On minimum entropy graph colorings, Proc. IEEE International Symposium on Information Theory (ISIT) (2004) • See also: on this site
- and , Universal classes of hash functions, J. Comput. Syst. Sci. 18, 143–154 (1979)
- , and , Cloning of continuous quantum variables, Phys. Rev. Lett. 85, 1754–1757 (2000) • See also: arXiv e-print quant-ph/9909037 (1999)
- , and , Quantum distribution of Gaussian keys using squeezed states, Phys. Rev. A 63, 052311 (2001) • See also: arXiv e-print quant-ph/0008058 (2000); on this site
- , , and , Extremal quantum cloning machines, Phys. Rev. A 72, 042336 (2005) • See also: arXiv e-print quant-ph/0507130 (2005)
- , and , A generic security proof for quantum key distribution, arXiv e-print quant-ph/0402131 (2004) • See also: http://www.crypto.ethz.ch/pubs/ChReEk04.html
- ComScire – Quantum World Corp., Design Principles and Testing of the QNG Model J1000KU™, http://www.comscire.com/Products/J1000KU/ (2005)
- , , and , Introduction to Algorithms, second edition, Cambridge, MA, MIT Press (2001)
- and , Cryptanalysis of block ciphers with overdefined systems of equations, Advances in Cryptology – Asiacrypt 2002, Lecture Notes in Computer Science, 267–287 (2002) • See also: iacr e-print 2002/044 (2002)
- and , Elements of Information Theory, New York, Wiley & Sons (1991)
- , , , and , A Compendium of NP Optimization Problems, http://www.nada.kth.se/~viggo/problemlist/compendium.html (2005)
- and , Broadcast channels with confidential messages, IEEE Trans. Inform. Theory 24, 339–348 (1978)
- and , Circuit implementation of synchronized chaos with applications to communications, Phys. Rev. Lett. 71, 65–68 (1993)
- , and , Systematic and statistical errors in homodyne measurements of the density matrix, Quantum Semiclass. Opt. 9, 929–939 (1997) • See also: arXiv e-print quant-ph/9701010 (1997)
- , and , Quantum tomography, Adv. Imag. Elect. Phys. 128, 205–308 (2003) • See also: arXiv e-print quant-ph/0302028 (2003)
- and , The Design of Rijndael, Berlin, Springer-Verlag (2002)
- and , Relating quantum privacy and quantum coherence: an operational approach, Phys. Rev. Lett. 93, 080501 (2004) • See also: arXiv e-print quant-ph/0307053 (2003)
- and , New directions in cryptography, IEEE Trans. Inform. Theory 22, 644–654 (1976) • See also: http://www-ee.stanford.edu/~hellman/publications/24.pdf
- and , An Introduction to the Bootstrap, London, CRC Press LLC (1998)
- , and , Can quantum-mechanical description of physical reality be considered complete?, Phys. Rev. 47, 777–780 (1935) • See also: http://www.drchinese.com/David/EPR.pdf
- , Building the quantum network, New J. Phys. 4, 46 (2002)
- , and , Quantum cryptography in practice, 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, 227–238 (2003) • See also: arXiv e-print quant-ph/0307049 (2003)
- , , and , Protecting secret keys with personal entropy, Future Gener. Comp. Syst. 16, 311–318 (2000) • See also: http://www.schneier.com/paper-personal-entropy.html
- Federal Information Processing Standard (FIPS), Data Encryption Standard, Publication 46, Washington D.C., National Bureau of Standards, U.S. Department of Commerce (1977)
- , , , and , Optimal eavesdropping in quantum cryptography. I Information bound and optimal strategy, Phys. Rev. A 56, 1163–1172 (1997) • See also: arXiv e-print quant-ph/9701039 (1997)
- and , Application of existing perfect code to secret key reconciliation, Conf. Proc. Int. Symp. Commun. Inform. Tech., 397–400 (2001)
- , Low density parity check codes, IRE Trans. Inf. Theory IT-8, 21–28 (1962) • See also: http://www.inference.phy.cam.ac.uk/mackay/gallager/papers/
- , , and , Quantum cryptography, Rev. Mod. Phys. 74, 145–195 (2002) • See also: arXiv e-print quant-ph/0101098 (2001)
- , , , and , Trojan horse attacks on quantum key distribution systems, arXiv e-print quant-ph/0507063 (2005)
- , and , Quantum key distribution over 122 km of standard telecom fiber, Appl. Phys. Lett. 84, 3762–3864 (2004) • See also: arXiv e-print quant-ph/0412171 (2004)
- and , Probabilistic encryption, J. Comp. Syst. Sci. 28, 270–299 (1984)
- and , Secure quantum key distribution using squeezed states, Phys. Rev. A 63, 022309 (2001) • See also: arXiv e-print quant-ph/0008046 (2000)
- and , Proof of security of quantum key distribution with two-way classical communications, IEEE Trans. Inform. Theory 49, 457–475 (2003) • See also: arXiv e-print quant-ph/0105121 (2001)
- , , and , Security of quantum key distribution with imperfect devices, Quantum Inf. Comput. 4, 325–360 (2004) • See also: arXiv e-print quant-ph/0212066 (2002)
- , Pulse Code Communication, United States Patent 2,632,058 (March 17, 1953)
- and , Quantization, IEEE Trans. Inform. Theory 44, 2325–2383 (1998)
- , Quantum Mechanics—An Introduction, third edition, Berlin, Springer-Verlag (1994)
- and , Continuous variable quantum cryptography using coherent states, Phys. Rev. Lett. 88, 057902 (2002) • See also: arXiv e-print quant-ph/0109084 (2001)
- and , Reverse reconciliation protocols for quantum cryptography with continuous variables, arXiv e-print quant-ph/0204127 (2002)
- , Communication et Cryptographie Quantiques avec des Variables Continues, Ph.D. thesis, Université Paris XI (2002)
- , , , , and , Quantum key distribution using Gaussian-modulated coherent states, Nature 421, 238–241 (2003) • See also: arXiv e-print quant-ph/0312016 (2003); on this site
- , , , and , Virtual entanglement and reconciliation protocols for quantum cryptography with continuous variable, Quantum Inf. Comput. 3, 535–552 (2003) • See also: arXiv e-print quant-ph/0306141 (2003)
- and , Continuous-variable quantum cryptography is secure against non-Gaussian attacks, Phys. Rev. Lett. 92, 047905 (2004) • See also: arXiv e-print quant-ph/0311006 (2003)
- , Collective attacks and unconditional security in continuous variable quantum key distribution, Phys. Rev. Lett. 94, 020504 (2005) • See also: arXiv e-print quant-ph/0407148 (2004)
- , An identity-based key-exchange protocol, Advances in Cryptology – Eurocrypt '89, Lecture Notes in Computer Science, 29–37 (1989)
- , Quantum cryptography with squeezed states, Phys. Rev. A 61, 022309 (2000) • See also: arXiv e-print quant-ph/9909006 (1999)
- , The capacity of the quantum channel with general signal states, IEEE Trans. Inform. Theory 44, 269–273 (1998) • See also: arXiv e-print quant-ph/9611023 (1996)
- Horst Görtz Institute for IT-Security and Institute for Applied Information Processing and Communications, Fourth Conference on the Advanced Encryption Standard (AES), (2004)
- , A method for the construction of minimum redundancy codes, Proc. IRE, 1098–1101 (1952) • See also: http://compression.ru/download/articles/huff/huffman_1952_minimum-redundancy-codes.pdf
- , , , , , and , Practical quantum cryptography for secure free-space communications, arXiv e-print quant-ph/9905009 (1999)
- , , and , Practical free-space quantum key distribution over 10 km in daylight and at night, New J. Phys 4, 43 (2002) • See also: arXiv e-print quant-ph/0206092 (2002)
- , Quantum key distribution with high loss: toward global secure communication, Phys. Rev. Lett. 91, 057901 (2003) • See also: arXiv e-print quant-ph/0211153 (2002)
- , and , Security of quantum key distribution with coherent states and homodyne detection, Phys. Rev. Lett. 93, 170502 (2004) • See also: arXiv e-print quant-ph/0312018 (2003); on this site
- id Quantique, Quantis™, http://www.idquantique.com/ (2005)
- id Quantique, Vectis™, http://www.idquantique.com/ (2005)
- , The Codebreakers, Scribner (1996)
- , Scrambling and randomization, Advances in Cryptology – Crypto '81, Lecture Notes in Computer Science, 59–63 (1981)
- , , and , Side channel cryptanalysis of product ciphers, J. Comput. Secur. 8, 141–158 (2000) • See also: http://www.schneier.com/paper-side-channel.html
- , La cryptographie militaire, Journal des sciences militaires IX, 5–38 (1883) • See also: http://petitcolas.net/fabien/kerckhoffs/
- , The Art of Computer Programming, vol. 2, third edition, Reading, MA, Addison-Wesley (1997)
- , and , Differential power analysis, Advances in Cryptology – Crypto '99, Lecture Notes in Computer Science, 388–397 (1999) • See also: http://www.cryptography.com/resources/whitepapers/DPA.pdf
- , and , Privacy amplification secure against an adversary with selectable knowledge, Proc. IEEE International Symposium on Information Theory (ISIT) (2004) • See also: http://www.crypto.ethz.ch/pubs/KoMaRe04.html
- , and , On the power of quantum memory, IEEE Trans. Inform. Theory 51, 2391–2401 (2005) • See also: arXiv e-print quant-ph/0305154 (2003); http://www.crypto.ethz.ch/pubs/KoMaRe03.html
- and , Zero-error information theory, IEEE Trans. Inform. Theory 44, 2207–2229 (1998) • See also: http://kodiak.ucsd.edu/alon/papers/zer_err_it.ps
- , , and , Minimum redundancy zerro-error source coding with side information, Proc. IEEE International Symposium on Information Theory (ISIT) (2001) • See also: http://www.ee.ucr.edu/~ertem/Publications/isit2001_2.pdf
- , and , On zero-error coding of correlated sources, Proc. IEEE International Symposium on Information Theory (ISIT), 62 (2002) • See also: http://www.ee.ucr.edu/~ertem/Publications/isit2002_2.pdf
- , , and , On zero-error source coding with decoder side information, IEEE Trans. Inform. Theory 49, 99–111 (2003) • See also: http://www.ee.ucr.edu/~ertem/Publications/it2003_01_1.pdf
- , LFSR-based hashing and authentication, Advances in Cryptology – Crypto '94, Lecture Notes in Computer Science, 129–139 (1994)
- , , , , , and , A step towards global key distribution, Nature 419, 450 (2002) • See also: http://scotty.quantum.physik.uni-muenchen.de/publ/419450a_r.pdf
- , An introduction to arithmetic coding, IBM J. Res. Dev. 28, 135–149 (1984)
- , and , Compression of binary sources with side information at the decoder using LDPC codes, IEEE Commun. Lett. 6, 440–442 (2002) • See also: http://msw3.stanford.edu/~ivmsjc/varodayan/jc_feb9.pdf
- and , Unconditional security of quantum key distribution over arbitrarily long distances, Science 283, 2050–2056 (1999) • See also: arXiv e-print quant-ph/9803006 (1998)
- , Method for decoupling error correction from privacy amplification, New J. Phys 5, 36 (2003) • See also: arXiv e-print quant-ph/0201030 (2002)
- , and , Decoy state quantum key distribution, Phys. Rev. Lett. 94, 230504 (2005) • See also: arXiv e-print quant-ph/0411004 (2004)
- , , and , Controlling excess noise in fiber-optics continuous-variable quantum key distribution, Phys. Rev. A 72, 050303(R) (2005) • See also: arXiv e-print quant-ph/0511104 (2005)
- , and , Continuous variable quantum key distribution using polarization encoding and post selection, Appl. Phys. B 79, 273–277 (2004) • See also: arXiv e-print quant-ph/0403064 (2004)
- MagiQ Technologies, QPN™, http://www.magiqtech.com/ (2005)
- , and , The computational complexity of universal hash functions, Theor. Comput. Sci. 107, 121–133 (1993) • See also: http://www.math.tau.ac.il/~mansour/papers/93tcs.ps
- , Linear cryptanalysis method for DES cipher, Advances in Cryptology – Eurocrypt '93, Lecture Notes in Computer Science, 386–397 (1993) • See also: http://homes.esat.kuleuven.be/~abiryuko/Cryptan/matsui_des.PDF
- , The first experimental cryptanalysis of the data encryption standard, Advances in Cryptology – Crypto '94, Lecture Notes in Computer Science, 1–11 (1994)
- , Secret key agreement by public discussion from common information, IEEE Trans. Inform. Theory 39, 733–742 (1993) • See also: http://www.crypto.ethz.ch/pubs/Maurer93a.html
- , Information-theoretically secure secret-key agreement by NOT authenticated public discussion, Advances in Cryptology – Eurocrypt '97, Lecture Notes in Computer Science, 209–225 (1997) • See also: http://www.crypto.ethz.ch/pubs/Maurer97.html
- and , The intrinsic conditional mutual information and perfect secrecy, Proc. IEEE International Symposium on Information Theory (ISIT), 88 (1997) • See also: http://www.crypto.ethz.ch/pubs/MauWol97c.html
- and , Unconditionally secure key agreement and the intrinsic conditional information, IEEE Trans. Inform. Theory 45, 499–514 (1999) • See also: http://www.crypto.ethz.ch/pubs/MauWol99a.html
- , Authentication theory and hypothesis testing, IEEE Trans. Inform. Theory 46, 1350–1356 (2000) • See also: http://www.crypto.ethz.ch/pubs/Maurer00a
- and , Information-theoretic key agreement: from weak to strong secrecy for free, Advances in Cryptology – Eurocrypt 2000, Lecture Notes in Computer Science, 351–368 (2000) • See also: http://www.iacr.org/archive/eurocrypt2000/1807/18070356-new.pdf
- and , Secret-key agreement over unauthenticated public channels—part I: definitions and a completeness Result, IEEE Trans. Inform. Theory 49, 822–831 (2003) • See also: http://www.crypto.ethz.ch/pubs/MauWol03a.html
- and , Secret-key agreement over unauthenticated public channels—part II: the simulatability condition, IEEE Trans. Inform. Theory 49, 832–838 (2003) • See also: http://www.crypto.ethz.ch/pubs/MauWol03b.html
- and , Secret-key agreement over unauthenticated public channels—part III: privacy amplification, IEEE Trans. Inform. Theory 49, 839–851 (2003) • See also: http://www.crypto.ethz.ch/pubs/MauWol03c.html
- , Unconditional security in quantum cryptography, J. ACM 48, 351–406 (2001) • See also: arXiv e-print quant-ph/9802025 (1998)
- , and , Handbook of Applied Cryptography, London, CRC Press LLC (1997) • See also: http://www.cacr.math.uwaterloo.ca/hac/
- , and , Quantum cryptography over 23 km in installed under-lake telecom fibre, Europhys. Lett. 33, 335 (1996)
- , Secret key agreement from correlated source outputs using LDPC matrices, Proc. IEEE International Symposium on Information Theory (ISIT) (2004)
- , and , Low-density parity-check matrices for coding of correlated sources, IEEE Trans. Inform. Theory 51, 3645–3654 (2005)
- and , Essential algebraic structure within the AES, Advances in Cryptology – Crypto 2002, Lecture Notes in Computer Science, 1–16 (2002) • See also: http://www.isg.rhul.ac.uk/~sean/crypto.pdf
- National Institute of Standards and Technology (NIST), Advanced Encryption Standard, http://www.nist.gov/aes (2000)
- and , Security bounds for continuous variables quantum key distribution, Phys. Rev. Lett. 94, 020505 (2005) • See also: arXiv e-print quant-ph/0407149 (2004)
- , Statistical confidentiality tests for a quantum transmission using continuous variables, Eur. Phys. J. D 18, 219–228 (2002)
- , Extension des Protocoles de Réconciliation en Cryptographie Quantique, Masters thesis, Université Libre de Bruxelles (2002)
- , and , Side-information coding with turbo codes and its application to quantum key distribution, Proc. International Symposium on Information Theory and its Applications (ISITA) (2004) • See also: arXiv e-print cs.IT/0406001 (2004); on this site
- , and , One-dimensional and multi-dimensional reconciliation using turbo codes for quantum key distribution, Proc. 26th Symp. on Inform. Theory in the Benelux (2005)
- and , Quantum Computation and Quantum Information, Cambridge, Cambridge University Press (2000)
- and , Randomness is linear in space, J. Comput. Syst. Sci. 52, 43–52 (1996) • See also: http://www.cs.huji.ac.il/~noam/extract.ps
- , and , Why quantum cryptography?, arXiv e-print quant-ph/0406147 (2004)
- , Iterating von Neumann's procedure for extracting random bits, Annals of Statistics 20, 590–597 (1992)
- , Lecture Notes for Physics 229: Quantum Information and Computation, http://theory.caltech.edu/~preskill/ph229/ (1998)
- Protego, R200-USB™ TRNG Product Specification, http://www.protego.se/sg200_d.htm (2005)
- , Continuous variable quantum cryptography, Phys. Rev. A 61, 010303 (2000) • See also: arXiv e-print quant-ph/9907073 (1999)
- , and , Extracting all the randomness and reducing the error in Trevisan's extractors, Proc. Symp. Theory of Computing, 149–158 (1999) • See also: http://www.eecs.harvard.edu/~salil/papers/trev-abs.html
- , Quantum cryptography with a predetermined key, using continuous-variable Einstein–Podolsky–Rosen correlations, Phys. Rev. A 62, 062308 (2000) • See also: arXiv e-print quant-ph/9909030 (1999)
- and , New bounds in secret-key agreement: the gap between formation and secrecy extraction, Advances in Cryptology – Eurocrypt 2003, Lecture Notes in Computer Science, 562–577 (2003) • See also: http://www.crypto.ethz.ch/pubs/RenWol03.html
- , On measures of entropy and information, Proc. 4th Berkeley Symp. on Math. Statistics and Prob., 547–561 (1961)
- , , , and , Fast and user-friendly quantum key distribution, J. Mod. Opt. 47, 517–531 (2000) • See also: arXiv e-print quant-ph/9905056 (1999)
- , and , A method for obtaining digital signatures and public-key cryptosystems, Commun. ACM 21, 120–126 (1978) • See also: http://theory.lcs.mit.edu/~rivest/rsapaper.pdf
- , and , Single photons on demand, Europhys. News 36, 56–58 (2005)
- , The ADAPTIVE Communication Environment (ACE™), http://www.cs.wustl.edu/~schmidt/ACE.html (2005)
- , Applied Cryptography, second edition, New York, John Wiley & Sons (1995)
- and , Schnelle Multiplikation großer Zahlen, Computing 7, 281–292 (1971)
- , Schnelle Multiplikation von Polynomen über Körpern der Charakteristik 2, Acta Inform. 7, 395–398 (1977)
- , Quantum coding, Phys. Rev. A 51, 2738–2747 (1995)
- and , Sending classical information via noisy quantum channels, Phys. Rev. A 56, 131–138 (1997)
- and , Quantum Optics, Cambridge, Cambridge University Press (1997)
- , Analogue of the Vernam System for Continuous Time Series, Memorandum MM 43-110-44, Bell Laboratories (1943)
- , A mathematical theory of communication, Bell Syst. Tech. J. 27, 623–656 (1948) • See also: http://cm.bell-labs.com/cm/ms/what/shannonday/paper.html
- , Communication theory of secrecy systems, Bell Syst. Tech. J. 28, 656–715 (1949) • See also: http://netlab.cs.ucla.edu/wiki/files/shannon1949.pdf
- , Algorithms for quantum computation: discrete logarithms and factoring, Proceedings of the 35th Symposium on Foundations of Computer Science, 124–134 (1994) • See also: arXiv e-print quant-ph/9508027 (1995)
- and , Simple proof of security of the BB84 quantum key distribution protocol, Phys. Rev. Lett. 85, 441–444 (2000) • See also: arXiv e-print quant-ph/0003004 (2000)
- , and , Quantum key distribution with bright entangled beams, Phys. Rev. Lett. 88, 167902 (2002) • See also: arXiv e-print quant-ph/0109009 (2001)
- , , and , Continuous variable quantum cryptography – beating the 3 dB loss limit, Phys. Rev. Lett. 89, 167901 (2002) • See also: arXiv e-print quant-ph/0204064 (2002)
- , The Code Book, New York, Doubleday (1999)
- and , Noiseless coding of correlated information sources, IEEE Trans. Inform. Theory 19, 471–480 (1973) • See also: http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=1055037
- , Multiple particle interference and quantum error correction, Proc. R. Soc. London A 452, 2551–2577 (1996) • See also: arXiv e-print quant-ph/9601029 (1996)
- , Universal hashing and authentication codes, Design. Code. Cryptogr. 4, 369–380 (1994) • See also: http://www.cacr.math.uwaterloo.ca/~dstinson/papers/hashingdcc.ps
- , Cryptography Theory and Practice, second edition, London, CRC Press LLC (2002)
- , , , and , Quantum key distribution over 67 km with a plug & play system, New J. Phys 4, 41 (2002) • See also: arXiv e-print quant-ph/0203118 (2002)
- , Extractors and pseudorandom generators, J. ACM 48, 860–879 (2001) • See also: http://www.cs.berkeley.edu/~luca/pubs/#extract
- , and , Reconciliation of a quantum-distributed Gaussian key, IEEE Trans. Inform. Theory 50, 394–400 (2004) • See also: arXiv e-print cs.CR/0107030 (2001); on this site
- , Information-Theoretic Aspects of Quantum Key Distribution, Ph.D. thesis, Université Libre de Bruxelles (2005)
- , and , Secure coherent-state quantum key distribution protocols with efficient reconciliation, Phys. Rev. A 71, 052304 (2005) • See also: arXiv e-print quant-ph/0410031 (2004); on this site
- , Cipher printing telegraph systems for secret wire and radio telegraphic communications, J. IEEE 55, 109–115 (1926)
- , and , Multilevel codes: theoretical concepts and practical design rules, IEEE Trans. Inform. Theory 45, 1361–1391 (1999)
- , , , , , and , Quantum cryptography with a photon turnstile, Nature 420, 762 (2002)
- , HotBits: Genuine Random Numbers, Generated by Radioactive Decay, http://www.fourmilab.ch/hotbits/ (2005)
- and , Quantum Optics, Berlin, Springer-Verlag (1994)
- , Beating the photon-number-splitting attack in practical quantum cryptography, Phys. Rev. Lett. 94, 230503 (2005) • See also: arXiv e-print quant-ph/0410075 (2004)
- and , New hash functions and their use in authentication and set equality, J. Comput. Syst. Sci. 22, 265–279 (1981)
- , Number Theoretic Transform, http://mathworld.wolfram.com/NumberTheoreticTransform.html (2005)
- , Gray Code, http://mathworld.wolfram.com/GrayCode.html (2005)
- , Dispositifs Impulsionnels pour la Communication Quantique à Variables Continues, Ph.D. thesis, Université Paris XI (2004)
- , Conjugate coding, Sigact News 15, 78–88 (1983)
- , The zero-error side information problem and chromatic numbers, IEEE Trans. Inform. Theory 22, 592–593 (1976)
- and , Iterative decoding for multilevel codes using reliability information, Proc. IEEE Globecom Conference, 1779–1784 (1992)
- , The wire-tap channel, Bell Syst. Tech. J. 54, 1355–1387 (1975)
- and , On instantaneous codes for zero-error coding of two correlated sources, Proc. IEEE International Symposium on Information Theory (ISIT) (2000)
- , , , , and , Interferometry with Faraday mirrors for quantum cryptography, Electron. Lett. 33, 586–588 (1997) • See also: arXiv e-print quant-ph/9703024 (1997)
- , , and , Quantum cryptography, Appl. Phys. B 67, 743–748 (1998)
- and , Optimal code design for lossless and near lossless source coding in multiple access networks, Proc. IEEE Data Compression Conf. (DCC), 263–272 (2001) • See also: http://resolver.caltech.edu/CaltechAUTHORS:ZHAdcc01
- , and , Side information source coding: low-complexity design and source independence, Proc. Asilomar Conference on Signals and Systems (2002) • See also: http://resolver.caltech.edu/CaltechAUTHORS:ZHAasilo02
- and , Low complexity code design for lossless and near-lossless side information source codes, Proc. IEEE Data Compression Conf. (DCC) (2003) • See also: http://resolver.caltech.edu/CaltechAUTHORS:ZHAdcc03
- and , Lossless and near-lossless source coding for multiple access networks, IEEE Trans. Inform. Theory 49, 112–128 (2003) • See also: http://resolver.caltech.edu/CaltechAUTHORS:ZHAieeetit03