CONFERENCES AND SYMPOSIA: Quantum cryptography and V A Kotel'nikov's one-time key and sampling theorems
@article{Molotkov2006CONFERENCESAS, title={CONFERENCES AND SYMPOSIA: Quantum cryptography and V A Kotel'nikov's one-time key and sampling theorems}, author={Sergei N. Molotkov}, journal={Physics-Uspekhi}, year={2006}, url={https://api.semanticscholar.org/CorpusID:118764598} }
12 Citations
Security of the decoy state method for quantum key distribution
- 2021
Computer Science, Physics
The decoy state method is devoted to, a countermeasure against vulnerabilities caused by the use of coherent states of light for QKD protocols whose security is proved under the assumption of single-photon states.
Modular Quantum Key Distribution Setup for Research and Development Applications
- 2019
Physics, Computer Science
A modular QKD setup driven by National Instruments cards with open source LabView code, open source Python code for post-processing procedures, and open source protocol for external applications shows a high degree of robustness beyond laboratory conditions.
A symmetric cryptosystem involving a mixed-base notation
- 2008
Computer Science, Mathematics
A new nonlinear transformation for modern symmetric block-encryption systems is obtained that involves rerepresentation of information in a mixed-base notation in which a set of bases is a private key.
Quantum Inspired Security on a Mobile Phone
- 2017
Computer Science
The experimental results show this project can achieve superior transmission performance, and the correlation between the transmission rate of the system and several parameters, such as the QR code size, has been analyzed.
Differential phase shift quantum key distribution
- 2008
Physics
Quantum key distribution (QKD) has been studied as an ultimate method for secure communications, and it now is emerging as a technology that can be deployed in real fibre networks. Here, we present…
Tight finite-key analysis for mode-pairing quantum key distribution
- 2023
Physics, Computer Science
The results show that the original protocol can break the repeaterless rate-transmittance bound with a typical finite number of pulses in practice, and the proposed six-state protocol can improve the secret key rate significantly in long distance cases.
Wireless underwater optical communication with quantum key distribution
- 2021
Physics, Engineering
The results of experimental modeling of a wireless optical communication channel in an aquatic environment are presented, which were carried out on the basis of a laboratory installation for…
Optimizing Decoy‐State Protocols for Practical Quantum Key Distribution Systems
- 2021
Physics, Computer Science
This work compares the key‐rate performance of 38 decoy‐state protocols using the particle swarm optimization (PSO) algorithm and forms a guideline for practical QKD systems, where the optimal decoy-state protocols are found with the change of five system parameters.
Symmetric Blind Information Reconciliation and Hash-function-based Verification for Quantum Key Distribution
- 2018
Physics, Computer Science
A method, which is based on symmetric blind information reconciliation for the low-density parity-check (LDPC) codes, and a subsequent verification protocol with the use of ϵ-universal hash functions, which allows verifying the identity between the keys with a certain probability.
Instantaneous correlations of Shannon’s big data in nonlocal cosmos
- 2025
Physics
The etheric energy in Umov’s thermomechanical transport through material space changes reversibly within a limited band of hidden rest energy in accordance with Lorentz transformations. Umov’s…