# Quantum key distribution

## Papers overview

Semantic Scholar uses AI to extract papers important to this topic.

Highly Cited

2010

Highly Cited

2010

- 2010

Cryptography has begun its journey into the field of quantum information theory. Classical cryptography has shown weaknessesâ€¦Â (More)

Is this relevant?

Highly Cited

2008

Highly Cited

2008

- IEEE Communications Magazine
- 2008

Quantum-key distribution has been studied as an ultimate method for secure communications, and now it is emerging as a technologyâ€¦Â (More)

Is this relevant?

Highly Cited

2005

Highly Cited

2005

- Physical review letters
- 2005

Standard quantum key distribution protocols are provably secure against eavesdropping attacks, if quantum theory is correct. Itâ€¦Â (More)

Is this relevant?

Highly Cited

2005

Highly Cited

2005

- 2005

Decoy states have recently been proposed as a useful method for substantially improving the performance of quantum keyâ€¦Â (More)

Is this relevant?

Highly Cited

2005

Highly Cited

2005

- TCC
- 2005

Institute of Computer Science, The Hebrew University, Jerusalem, Israel Institute of Theoretical Physics and Astrophysicsâ€¦Â (More)

Is this relevant?

Highly Cited

2004

Highly Cited

2004

- International Symposium onInformation Theoryâ€¦
- 2004

This paper prove the security of the Bennett-Brassard (BB84) quantum key distribution protocol in the case where the source andâ€¦Â (More)

Is this relevant?

Highly Cited

2004

Highly Cited

2004

- EQEC '05. European Quantum Electronics Conferenceâ€¦
- 2004

The paper reports on the entangled-state quantum cryptography system practical operation. The full key generation protocol wasâ€¦Â (More)

Is this relevant?

Highly Cited

2003

Highly Cited

2003

- Nature
- 2003

Quantum continuous variables are being explored as an alternative means to implement quantum key distribution, which is usuallyâ€¦Â (More)

Is this relevant?

Highly Cited

2000

Highly Cited

2000

- Physical review letters
- 2000

We prove that the 1984 protocol of Bennett and Brassard (BB84) for quantum key distribution is secure. We first give a keyâ€¦Â (More)

Is this relevant?

Highly Cited

2000

Highly Cited

2000

- Journal of Cryptology
- 2000

We prove the security of theoretical quantum key distribution against the most general attacks which can be performed on theâ€¦Â (More)

Is this relevant?