Zobrazeno 1 - 10
of 236
pro vyhledávání: '"Peev M"'
Autor:
Martin, V., Brito, J. P., Ortiz, L., Mendez, R. B., Buruaga, J. S., Vicente, R. J., Sebastián-Lombraña, A., Rincon, D., Perez, F., Sanchez, C., Peev, M., Brunner, H. H., Fung, F., Poppe, A., Fröwis, F., Shields, A. J., Woodward, R. I., Griesser, H., Roehrich, S., De La Iglesia, F., Abellan, C., Hentschel, M., Rivas-Moscoso, J. M., Pastor, A., Folgueira, J., Lopez, D. R.
Current quantum key distribution (QKD) networks focus almost exclusively on transporting secret keys with the highest possible rate. Consequently, they are built as mostly fixed, ad hoc, logically, and physically isolated infrastructures designed to
Externí odkaz:
http://arxiv.org/abs/2311.12791
Autor:
van Deventer, O., Spethmann, N., Loeffler, M., Amoretti, M., Brink, R. van den, Bruno, N., Comi, P., Farrugia, N., Gramegna, M., Kassenberg, B., Kozlowski, W., Länger, T., Lindstrom, T., Martin, V., Neumann, N., Papadopoulos, H., Pascazio, S., Peev, M., Pitwon, R., Rol, M. A., Traina, P., Venderbosch, P., Wilhelm-Mauch, F. K., Jenet, A.
Publikováno v:
EPJ Quantum Technol. 9 (2022) 33
The Second Quantum Revolution facilitates the engineering of new classes of sensors, communication technologies, and computers with unprecedented capabilities. Supply chains for quantum technologies are emerging, some focussed on commercially availab
Externí odkaz:
http://arxiv.org/abs/2203.01622
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Sasaki, M., Fujiwara, M., Ishizuka, H., Klaus, W., Wakui, K., Takeoka, M., Tanaka, A., Yoshino, K., Nambu, Y., Takahashi, S., Tajima, A., Tomita, A., Domeki, T., Hasegawa, T., Sakai, Y., Kobayashi, H., Asai, T., Shimizu, K., Tokura, T., Tsurumaru, T., Matsui, M., Honjo, T., Tamaki, K., Takesue, H., Tokura, Y., Dynes, J. F., Dixon, A. R., Sharpe, A. W., Yuan, Z. L., Shields, A. J., Uchikoga, S., Legre, M., Robyr, S., Trinkler, P., Monat, L., Page, J. -B., Ribordy, G., Poppe, A., Allacher, A., Maurhart, O., Langer, T., Peev, M., Zeilinger, A.
Publikováno v:
Optics Express Vol. 19, Iss. 11, pp. 10387-10409 (2011)
A novel secure communication network with quantum key distribution in a metropolitan area is reported. Different QKD schemes are integrated to demonstrate secure TV conferencing over a distance of 45km, stable long-term operation, and application to
Externí odkaz:
http://arxiv.org/abs/1103.3566
Publikováno v:
Eur. Phys. J. D, 46, 395-406 (2008)
It is shown that an existing method to study ideal individual attacks on the BB84 QKD protocol using error discard can be adapted to reconciliation with error correction, and that an optimal attack can be explicitly found. Moreover, this attack fills
Externí odkaz:
http://arxiv.org/abs/0711.1728
Autor:
Pacher, C., Peev, M.
Publikováno v:
The European Physical Journal B, Volume 59, Issue 4 , pp 519-525 (2007)
Integral identities for particular Bloch functions in finite periodic systems are derived. All following statements are proven for a finite domain consisting of an integer number of unit cells. It is shown that matrix elements of particular Bloch fun
Externí odkaz:
http://arxiv.org/abs/cond-mat/0703734
Autor:
Peev, M., Nölle, M., Maurhardt, O., Lorünser, T., Suda, M., Poppe, A., Ursin, R., Fedrizzi, A., Zeilinger, A.
In this work we review the security vulnerability of Quantum Cryptography with respect to "man-in-the-middle attacks" and the standard authentication methods applied to counteract these attacks. We further propose a modified authentication algorithm
Externí odkaz:
http://arxiv.org/abs/quant-ph/0407131
Various phase shifters and absorbers can be put into the arms of a double loop neutron interferometer. The mean intensity levels of the forward and diffracted beams behind an empty four plate interferometer of this type have been calculated. It is sh
Externí odkaz:
http://arxiv.org/abs/quant-ph/0405091
Autor:
Poppe, A., Fedrizzi, A., Loruenser, T., Maurhardt, O., Ursin, R., Boehm, H. R., Peev, M., Suda, M., Kurtsiefer, C., Weinfurter, H., Jennewein, T., Zeilinger, A.
Publikováno v:
Opt. Express 12, 3865-3871 (2004)
We present an entangled-state quantum cryptography system that operated for the first time in a real world application scenario. The full key generation protocol was performed in real time between two distributed embedded hardware devices, which were
Externí odkaz:
http://arxiv.org/abs/quant-ph/0404115
Autor:
Naraghi, L., Mejaddam, A.Y., Birkhan, O.A., Chang, Y., Cropano, C.M., Mesar, T., Larentzakis, A., Peev, M., Sideris, A.C., Van der Wilden, G.M., Imam, A.M., Hwabejire, J.O., Velmahos, G.C., Fagenholz, P.J., Yeh, D., de Moya, M.A., King, D.R.
Publikováno v:
In Journal of Critical Care August 2015 30(4):705-710