CONFERENCES AND SYMPOSIA: Quantum cryptography and V A Kotel'nikov's one-time key and sampling theorems

@article{Molotkov2006CONFERENCESAS,
  title={CONFERENCES AND SYMPOSIA: Quantum cryptography and V A Kotel'nikov's one-time key and sampling theorems},
  author={Sergei N. Molotkov},
  journal={Physics-Uspekhi},
  year={2006},
  url={https://api.semanticscholar.org/CorpusID:118764598}
}
  • S. N. Molotkov
  • Published 1 July 2006
  • Computer Science, Mathematics, Physics
  • Physics-Uspekhi
12 Citations

Security of the decoy state method for quantum key distribution

The decoy state method is devoted to, a countermeasure against vulnerabilities caused by the use of coherent states of light for QKD protocols whose security is proved under the assumption of single-photon states.

Modular Quantum Key Distribution Setup for Research and Development Applications

A modular QKD setup driven by National Instruments cards with open source LabView code, open source Python code for post-processing procedures, and open source protocol for external applications shows a high degree of robustness beyond laboratory conditions.

A symmetric cryptosystem involving a mixed-base notation

A new nonlinear transformation for modern symmetric block-encryption systems is obtained that involves rerepresentation of information in a mixed-base notation in which a set of bases is a private key.

Quantum Inspired Security on a Mobile Phone

The experimental results show this project can achieve superior transmission performance, and the correlation between the transmission rate of the system and several parameters, such as the QR code size, has been analyzed.

Differential phase shift quantum key distribution

Quantum key distribution (QKD) has been studied as an ultimate method for secure communications, and it now is emerging as a technology that can be deployed in real fibre networks. Here, we present

Tight finite-key analysis for mode-pairing quantum key distribution

The results show that the original protocol can break the repeaterless rate-transmittance bound with a typical finite number of pulses in practice, and the proposed six-state protocol can improve the secret key rate significantly in long distance cases.

Wireless underwater optical communication with quantum key distribution

The results of experimental modeling of a wireless optical communication channel in an aquatic environment are presented, which were carried out on the basis of a laboratory installation for

Optimizing Decoy‐State Protocols for Practical Quantum Key Distribution Systems

This work compares the key‐rate performance of 38 decoy‐state protocols using the particle swarm optimization (PSO) algorithm and forms a guideline for practical QKD systems, where the optimal decoy-state protocols are found with the change of five system parameters.

Symmetric Blind Information Reconciliation and Hash-function-based Verification for Quantum Key Distribution

A method, which is based on symmetric blind information reconciliation for the low-density parity-check (LDPC) codes, and a subsequent verification protocol with the use of ϵ-universal hash functions, which allows verifying the identity between the keys with a certain probability.

Instantaneous correlations of Shannon’s big data in nonlocal cosmos

The etheric energy in Umov’s thermomechanical transport through material space changes reversibly within a limited band of hidden rest energy in accordance with Lorentz transformations. Umov’s