X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Journal Article (624) 624
Publication (141) 141
Conference Proceeding (98) 98
Book Chapter (26) 26
Book / eBook (6) 6
Government Document (5) 5
Dissertation (3) 3
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
unconditional security (547) 547
cryptography (260) 260
quantum physics (180) 180
physics, multidisciplinary (145) 145
quantum cryptography (129) 129
physics - quantum physics (119) 119
optics (114) 114
proof (113) 113
computer science (110) 110
quantum key distribution (98) 98
physics, atomic, molecular & chemical (94) 94
key distribution (84) 84
physics (81) 81
security (80) 80
computer science, theory & methods (79) 79
states (74) 74
physics, mathematical (66) 66
analysis (64) 64
engineering, electrical & electronic (64) 64
cryptography and security (62) 62
computer science, information systems (55) 55
protocol (47) 47
entanglement (43) 43
information theory (42) 42
authentication (41) 41
privacy amplification (41) 41
quantum mechanics (40) 40
attack (39) 39
information (37) 37
protocols (34) 34
communication (31) 31
distribution (31) 31
quantum theory (31) 31
physics, particles & fields (30) 30
quantum computing (30) 30
quantum information technology, spintronics (29) 29
business, finance (27) 27
photons (27) 27
quantum science & technology (27) 27
unconditional conservatism (27) 27
data structures, cryptology and information theory (26) 26
economics (25) 25
mathematical physics (25) 25
mathematics, applied (25) 25
physics, general (25) 25
computer information security (24) 24
computer science - cryptography and security (24) 24
bell theorem (23) 23
entropy (22) 22
privacy (22) 22
theoretical, mathematical and computational physics (22) 22
channels (21) 21
classical and quantum mechanics, general physics (21) 21
elementary particles, quantum field theory (21) 21
physics, applied (21) 21
studies (21) 21
bit commitment (20) 20
mathematical analysis (20) 20
poverty (20) 20
telecommunications (20) 20
quantum information (19) 19
qubits (19) 19
unconditional quantile regression (19) 19
encryption (18) 18
noise (18) 18
quantum entanglement (18) 18
scheme (18) 18
computation (17) 17
data encryption (17) 17
systems (17) 17
algorithms (16) 16
atoms (16) 16
messages (16) 16
multidisciplinary sciences (16) 16
accounting conservatism (15) 15
asymmetric timeliness (15) 15
atomic and molecular physics (15) 15
computer science, hardware & architecture (15) 15
conservatism (15) 15
information security (15) 15
secrecy protection (15) 15
errors (14) 14
information science (14) 14
system (14) 14
accounting (13) 13
codes (13) 13
computer communication networks (13) 13
cryptographic protocols (13) 13
index medicus (13) 13
optimization (13) 13
quantum communication (13) 13
secret sharing (13) 13
article (12) 12
information theoretic security (12) 12
mathematical models (12) 12
mathematics (12) 12
networks (12) 12
proxy (12) 12
randomness (12) 12
research (12) 12
more...
Library Location Library Location
Library Location Library Location
X
Sort by Item Count (A-Z)
Filter by Count
Robarts - Stacks (4) 4
Collection Dvlpm't (Acquisitions) - Vendor file (2) 2
Law (Bora Laskin) - Stacks (1) 1
St. Michael's College (John M. Kelly) - 2nd Floor (1) 1
Trinity College (John W Graham) - Stacks (1) 1
UofT at Mississauga - Stacks (1) 1
UofT at Scarborough - Stacks (1) 1
more...
Language Language
Language Language
X
Sort by Item Count (A-Z)
Filter by Count
English (708) 708
Japanese (9) 9
Chinese (6) 6
German (5) 5
Korean (3) 3
Persian (2) 2
Czech (1) 1
Portuguese (1) 1
Russian (1) 1
more...
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


Reviews of Modern Physics, ISSN 0034-6861, 2009, Volume 81, Issue 3, pp. 1301 - 1350
Journal Article
Journal of the ACM (JACM), ISSN 0004-5411, 05/2001, Volume 48, Issue 3, pp. 351 - 406
Journal Article
Optics Express, ISSN 1094-4087, 10/2013, Volume 21, Issue 21, pp. 24550 - 24565
We analyse the finite-size security of the efficient Bennett-Brassard 1984 protocol implemented with decoy states and apply the results to a gigahertz-clocked... 
NETWORK | OPTICS | UNCONDITIONAL SECURITY | CRYPTOGRAPHY | Physics - Quantum Physics
Journal Article
Physical Review A - Atomic, Molecular, and Optical Physics, ISSN 1050-2947, 10/2010, Volume 82, Issue 4
A digital signature is a mathematical scheme for demonstrating the authenticity of a digital message or document. For signing quantum messages, some arbitrated... 
BELL THEOREM | KEY DISTRIBUTION | PHYSICS, ATOMIC, MOLECULAR & CHEMICAL | PROTOCOL | OPTICS | UNCONDITIONAL SECURITY | COMMUNICATION | CRYPTOGRAPHY | QUANTUM INFORMATION | DATA TRANSMISSION | CLASSICAL AND QUANTUM MECHANICS, GENERAL PHYSICS | INFORMATION | IMPLEMENTATION | COMMUNICATIONS | QUANTUM ENTANGLEMENT | QUANTUM STATES | ENERGY LEVELS | EFFICIENCY | SECRECY PROTECTION
Journal Article
INTERNATIONAL JOURNAL OF QUANTUM INFORMATION, ISSN 0219-7499, 02/2008, Volume 6, Issue 1, pp. 1 - 127
Journal Article
IEEE Access, ISSN 2169-3536, 2016, Volume 4, pp. 724 - 749
The security issues facing quantum key distribution (QKD) are explained, herein focusing on those issues that are cryptographic and information theoretic in... 
Ciphers | Protocols | Computer hacking | Quantum mechanics | Encryption | Cryptography | Computer security | SYSTEM | AUTHENTICATION | DISTRIBUTION PROTOCOL | INFORMATION | COMPUTER SCIENCE, INFORMATION SYSTEMS | PROOF | TELECOMMUNICATIONS | UNCONDITIONAL SECURITY | Cryptographic protocols | CRYPTOGRAPHY | ENGINEERING, ELECTRICAL & ELECTRONIC
Journal Article
PHYSICAL REVIEW A, ISSN 2469-9926, 08/2006, Volume 74, Issue 2
We suggest a type of attack on quantum cryptosystems that exploits variations in detector efficiency as a function of a control parameter accessible to an... 
FIBER | STATES | UP-CONVERSION | SINGLE-PHOTON DETECTION | KEY DISTRIBUTION | PHYSICS, ATOMIC, MOLECULAR & CHEMICAL | ATTACK | PROOF | OPTICS | UNCONDITIONAL SECURITY | CRYPTOGRAPHY | Physics - Quantum Physics | VARIATIONS | DISTRIBUTION | ERRORS | QUANTUM CRYPTOGRAPHY | PHOTONS | ATOMIC AND MOLECULAR PHYSICS | QUANTUM MECHANICS | EFFICIENCY | SECRECY PROTECTION | CONTROL | PULSES | QUBITS
Journal Article
Information Sciences, ISSN 0020-0255, 11/2016, Volume 369, pp. 80 - 99
Journal Article
International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings, ISSN 1533-7146, 2004, Volume 4, Issue 5, pp. 136 - 360
Conference Proceeding
New Journal of Physics, ISSN 1367-2630, 04/2009, Volume 11, Issue 4, p. 045018
We present an approach to the unconditional security of quantum key distribution protocols based on a complementarity argument. The approach is applicable to,... 
STATES | ERROR-CORRECTION | PHYSICS, MULTIDISCIPLINARY | UNCONDITIONAL SECURITY | CRYPTOGRAPHY
Journal Article
IEEE Transactions on Information Theory, ISSN 0018-9448, 08/2014, Volume 60, Issue 8, pp. 4973 - 4986
Journal Article
New Journal of Physics, ISSN 1367-2630, 09/2012, Volume 14, Issue 9, p. 93014
We present a tight security analysis of the Bennett-Brassard 1984 protocol taking into account the finite-size effect of key distillation and achieving... 
HYPERGEOMETRIC DISTRIBUTION | CHANNEL | PHYSICS, MULTIDISCIPLINARY | PRIVACY AMPLIFICATION | UNCONDITIONAL SECURITY | Physics - Quantum Physics
Journal Article
Physical Review A - Atomic, Molecular, and Optical Physics, ISSN 1050-2947, 12/2012, Volume 86, Issue 6
In usual security proofs of quantum protocols the adversary (Eve) is expected to have full control over any quantum communication between any communicating... 
PHYSICS, ATOMIC, MOLECULAR & CHEMICAL | PROOF | CHANNELS | OPTICS | UNCONDITIONAL SECURITY | PRIVACY AMPLIFICATION | ADVERSARIES | CRYPTOGRAPHY
Journal Article
by Bi, LQ and Dai, SS and Hu, B
ENTROPY, ISSN 1099-4300, 03/2017, Volume 19, Issue 3, p. 100
In this paper we introduce two normalized versions of non-perfect security for private-key encryption: one version in the framework of Shannon entropy, another... 
kolmogorov complexity | private-key encryption | entropy | unconditional security | PHYSICS, MULTIDISCIPLINARY | Entropy | Encryption | Data encryption | Security | Entropy (Information theory)
Journal Article
Physical Review A - Atomic, Molecular, and Optical Physics, ISSN 1050-2947, 09/2008, Volume 78, Issue 3
In this paper, we rigorously prove the intuition that in security proofs for the Bennett-Brassard 1984 (BB84) protocol, one may regard an incoming signal to... 
OPTICS | UNCONDITIONAL SECURITY | PHYSICS, ATOMIC, MOLECULAR & CHEMICAL | CRYPTOGRAPHY
Journal Article
Physical Review A - Atomic, Molecular, and Optical Physics, ISSN 1050-2947, 06/2015, Volume 91, Issue 6
In free-space quantum key distribution (QKD), the sensitivity of the receiver's detector channels may depend differently on the spatial mode of incoming... 
SYSTEM | ATTACK | PROOF | OPTICS | UNCONDITIONAL SECURITY | PHYSICS, ATOMIC, MOLECULAR & CHEMICAL | Physics - Quantum Physics
Journal Article
Quantum Information Processing, ISSN 1570-0755, 6/2018, Volume 17, Issue 6, pp. 1 - 21
Journal Article