-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathbibliografia.bib
More file actions
236 lines (199 loc) · 7.74 KB
/
bibliografia.bib
File metadata and controls
236 lines (199 loc) · 7.74 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
% Separare gli autori con " and ", anziché ", ".
% Ad esempio: "Adadi and Berrada"
@article{implausibility_blind,
title = {On the implausibility of classical client blind quantum computing},
author = {Scott Aaronson and Alexandru Cojocaruy and Alexandru Gheorghiuz and Elham Kashefi},
year = {2017}
}
@article{possibility_blind,
title = {On the possibility of classical client blind quantum computing},
author = {Alexandru Cojocaru and Léo Colisson and Elham Kashe and Petros Wallden},
year = {2018}
}
@article{private_quantum,
title = {Private quantum computation: an introduction to blind quantum computing and related protocols},
author = {Joseph F. Fitzsimons},
year = {2017}
}
@article{survey_prominent_qkd,
title = {A Survey of the Prominent Quantum Key Distribution Protocols},
author = {Mart Haitjema},
year = {2007}
}
@article{lo_chau,
title = {Unconditional Security Of Quantum Key Distribution Over Arbitrarily Long Distances},
author = {Hoi-kwong Lo and H. F. Chau},
year = {1998}
}
@article{security_qkdp,
title = {Security using Quantum Key Distribution Protocols (QKDPs)},
author = {D N Kartheek and M Abhilash Kumar and M R Pavan Kumar},
year = {2012}
}
@article{e91,
title = {Quantum cryptography based on Bell's theorem},
author = {A. K. Ekert},
year = {1991
}
}
@article{brassard_lutknenhaus,
title = {Security aspects of Practical Quantum Criptography},
author = {G. Brassard and N. Lutkenhaus and T. Mor and B. C. Sanders},
year = {2000}
}
@article{scarani_renner,
title = {Quantum cryptography with finite resources: unconditional security bound for discrete-variable protocols with one-way post-processing},
author = {V. Scarani and R. Renner},
year = {2018}
}
@article{survey_qkd,
title = {Using quantum key distribution for cryptographic purposes: A survey},
author = {R.Alléaumea and C. Branciard and J. Boudad and T. Debuisscherte and M. Dianatif and N. Gisinc and M. Godfreyg and P. Grangierh and T. Längeri and N.Lütkenhausj and C. Monyki and P. Painchaultk and M. Peevi and A. Poppei and T. Porninl and J. Rarityg and R. Rennerm and G. Ribordyn and M. Riguidela and L. Salvailo and A. Shieldsp and H. Weinfurterq and A. Zeilingerr},
year = {2014}
}
@article{survey_qc_qkd,
title = {A survey on quantum cryptography and quantum key distribution protocols},
author = {Maithili S. Jha and Samrit Kumar Maity and Manish Kumar Nirmal and Jaya Krishna},
year = {2019}
}
@article{survey_qc,
title = {A Survey on Quantum Cryptography},
author = {LI Jian and LI Na and ZHANG Yu and WEN Shuang and DU Wei and CHEN Wei and MA Wenping},
year = {2018}
}
@article{security_individual_realistic_qkd,
title = {Security against individual attacks for realistic quantum key distribution},
author = {Norbert Lütkenhau},
year = {1999}
}
@article{bb84,
title = {Quantum Cryptography: Public key distribution and coin tossing},
author = {C. H. Bennet and G. Brassard},
year = {1984}
}
@article{elboukhari,
title = {Quantum Key Distribution Protocol: A Survey},
author = {M. Elboukhari and M. Azizi and A. Azizi},
year = {2010}
}
@article{shor_preskill,
title = {Simple proof of security of the BB84 quantum key distribution protocol},
author = {P. W. Shor and J. Preskill},
year = {2000}
}
@article{mayers,
title = {Unconditional security in quantum cryptography},
author = {D. Mayers},
year = {2001}
}
@article{hughes,
title = {Practical free-space quantum key distribution over 10km in daylight and at night},
author = {R. Hughes and J. Nordholt and D. Derkacs and C. Peterson},
year = {2002}
}
@article{knight,
title = {Manipulating cold atoms for quantum information processing”},
author = {P. Knight},
year = {2005}
}
@article{lomonaco,
title = {A quick glance at quantum cryptography},
author = {S. J. Lomonaco Jr.},
year = {1999}
}
@article{nielsen_chuang,
title = {Quantum Computation and Quantum Information},
author = {M. Nielsen and I. Chuang},
year = {2000}
}
@article{hwang,
title = {EPR quantum key distribution protocols with potential 100\% qubit efficiency},
author = {T. Hwang and K. C. Lee},
year = {2007}
}
@article{sarg04,
title = {Quantum cryptography protocols robust against photon number splitting attacks},
author = {A. Scarani and A. Acin and G. Ribordy and N. Gisin},
year = {2004}
}
@article{b92,
title = {Quantum cryptography using any two non-orthoganol states},
author = {C. H. Bennet},
year = {1992}
}
@article{tamaki,
title = {Unconditionally secure key distribution based on two non orthogonal states},
author = {k. Tamaki and M. Koashi and n. Imoto},
year = {2003}
}
@article{limitation_practical_qc,
author = {Brassard, Gilles and Lütkenhaus, Norbert and Mor, Tal and Sanders, Barry},
year = {2000},
month = {09},
pages = {1330-3},
title = {Limitations on Practical Quantum Cryptography},
volume = {85},
journal = {Physical review letters},
doi = {10.1103/PhysRevLett.85.1330}
}
@article{fibre421,
author = {Alberto Boaron and Gianluca Boso and Davide Rusca and Cedric Vulliez and Claire Autebert and Misael Caloz and Matthieu Perrenoud and
Gaëtan Gras and Felix Bussieres and Ming-Jun Li and Daniel Nolan and Anthony Martin and Hugo Zbinden},
title = {Secure Quantum Key Distribution over 421 km of Optical Fiber},
year = {2018}
}
@article{quantum_eu,
author = {Travagnin Martino and Lewis Adam M.},
title = {Quantum Key Distribution in-field implementations},
year = {2019}
}
@article{beam_splitting,
author = {Calsamiglia, John and Barnett, Stephen and Lütkenhaus, Norbert},
year = {2001},
month = {07},
pages = {},
title = {Conditional beam splitting attack on quantum key distribution},
volume = {65},
journal = {Physical Review A},
doi = {10.1103/PhysRevA.65.012312}
}
@article{matlab_impl,
author = {P.P. Rohde},
title = {Quack! A Quantum Computer Simulator for Matlab},
year = {2005}
}
@article{ent_impl,
author = {Juan Yin and Yuan Cao and Yu-Huai Li and Ji-Gang Ren and Sheng-Kai Liao and Liang Zhang and Wen-Qi Cai and Wei-Yue Liu and Bo Li and Hui Dai and Ming Li and Yong-Mei Huang and Lei Deng and Li Li and Qiang Zhang and Nai-Le Liu and Yu-Ao Chen and Chao-Yang Lu and Rong Shu and Cheng-Zhi Peng and Jian-Yu Wang and Jian-Wei Pan},
title = {Satellite-to-Ground Entanglement-Based Quantum Key Distribution},
year = {2005}
}
@INPROCEEDINGS{ddos_mitigation_sdn,
author={Hugues-Salas, E. and Ntavou, F. and Ou, Y. and Kennard, J. E. and White, C. and Gkounis, D. and Nikolovgenis, K. and Kanellos, G. and Erven, C. and Lord, A. and Nejabati, R. and Simeonidou, D.},
booktitle={2018 Optical Fiber Communications Conference and Exposition (OFC)},
title={Experimental Demonstration of DDoS Mitigation over a Quantum Key Distribution (QKD) Network Using Software Defined Networking (SDN)},
year={2018},
volume={},
number={},
pages={1-3},
doi={}
}
@online{algo_shor,
author = {Wikipedia},
title = {Algoritmo di fattorizzazione di Shor},
year = {2022}
}
@article{trusted_noise,
author = {Ladyslav C. Usenko and Radim Filip},
title = {Trusted Noise in Continuous-Variable Quantum Key Distribution: A Threat and a Defense},
year = {2016}
}
@article{revealing_pns,
author = {A. A. Gaidash and V. I. Egorov and A. V. Gleim},
title = {Revealing of photon-number splitting attack on quantum key distribution system by photon-number resolving devices},
year = {2016}
}
@article{in_field_implementations,
author = {Travagnin Martino and Lewis Adam M.},
title = {Quantum Key Distribution in-field implementations},
year = {2019}
}