dc.relation.reference | [1] H. W. Wang, I. M. Tsai, and S. Y. Kuo, ”A Circuit Approach for Implementing Quantum Memory,” in Proceedings of the 2004 IEEE Conference on Nanotechnology (IEEE-NANO), August 2004.
[2] H. W. Wang, I. M. Tsai, C. N. Chung, and S. Y. Kuo, ”A Scheme to Enhance the Error-Correcting Capability of Encoded Quantum Information,”in Proceedings of the 2005 European Conference on Circuit Theory and Design
(ECCTD), 2005.
[3] H.W.Wang, I. M. Tsai, and S. Y. Kuo, ”Protocol and Applications for Sharing Quantum Private Keys,” in Proceedings of the 2005 IEEE International Carnahan Conference On Security Technology (ICCST), 2005.
[4] A. Einstein, B. Podolsky and N. Rosen, in Phys. Rev., 47, 777, (1935).
[5] Charles Bennett and Peter W. Shor, ”Quantum Information Theory,” in IEEE Trans. Info. Theory, 44, 2724, 1998.
[6] R.M. Davis, ”The Data Encryption Standard in Perspective,” in IEEE Communications Society Magazine, November 1978, pp. 5-9.
[7] Joan Daemen and Vincent Rijmen, ”The Design of Rijndael: AES - The Advanced Encryption Standard (Information Security and Cryptography),”
in Springer Verlag, 15 February, 2002.
[8] Ron Rivest, Adi Shamir and Len Adleman, ”RSA algorithm,” 1978.
[9] P. Shor, ”Algorithms for quantum computation: discrete logarithms and factoring,” in Proc. of the 35th Annual IEEE Symposium on the Foundations
of Computer Science, 1994, pp. 124-134.
[10] L. Grover, ”A fast quantum mechanical algorithm for database search,” in Proc. of the 28th Annual ACM Symposium on the Theory of Computing,
1996, pp. 212-219.
[11] R. Rivest, A. Shamir, and L. Adleman, ”A method for obtaining digital signatures and public-key cryptosystems,” in Communications of the ACM,
vol. (2) 21, pp. 120-126 (1978).
[12] W. Diffie, and M. E. Hellman, ”Multiuser Cryptogrphic Techniques,” in Proceeding of AFIPS National Computer Conference, pp. 644-654 (1976).
[13] David Deutsch, ”Quantum Theory, the Church-Turing Principle and the Universal Quantum Computer,” in Proc. of Royal Society London A, 400:97-117, 1985.
[14] LK Grover, ”Quantum Mechanics Helps in Searching for a Needle in a Haystack,” in Phys. Rev. Lett., 79, p.325, 1997.
[15] P. Mohanty and R. A. Webb, ”Decoherence and quantum fluctuations,” in Phys. Rev. B, 55, R13452, 1997.
[16] P.W. Shor, ”Scheme for Reducing Decoherence in Quantum Computer Memory,” in Phys. Rev. A, 52, 2493, 1995.
[17] A. M. Steane, ”Error Correcting Codes in Quantum Theory,” in Phys. Rev. Lett., 77, 793, 1996.
[18] E. Knill and R. Laflamme, ”Theory of Quantum Error-Correcting Codes,”in Phys. Rev. A, 55, 900, 1997
[19] D.A.L., I.L.Chuang and K.B.Whaley, ”Decoherence-Free Subspaces for Quantum Computation,” in Phys. Rev. Lett., 81, 2594 , 1998.
[20] D.A.L. and L.A. Wu, ”Reducing Constraints on Quantum Computer Design by Encoded Selective Recoupling,” in Phys. Rev. Lett., 88, 017905, 2002.
[21] P. Tombesi, D. Vitali, ”Physical realization of an environment with squeezed quantum fluctuations via QND-mediated feedback,” in Phys. Rev. A, 50,
4253, 1994.
[22] D. Vitali, P. Tombesi, and G.J. Milburn, ”Quantum-state protection in cavities,” in Phys. Rev. A, 57, 4930-4944 , 1998.
[23] D. Vitali and P. Tombesi, ”Using parity kicks for decoherence control,” in Phys. Rev. A, 59, 4178-4186, 1999.
[24] L.A. Wu and D.A.L., ”Creating Decoherence-Free Subspaces Using Strong and Fast Pulses,” in Phys. Rev. Lett., 88, 207902, 2002.
[25] D.A.L., D.Bacon and K.B. Whaley, ”Concatenating Decoherence-Free Subspaces and Quantum Error Correcting Codes,” in Phys. Rev. Lett., 82, 4556,
1999.
[26] M.S. Byrd and D.A.L., ”Comprehensive Encoding and Decoupling Solution to Problems of Decoherence and Design in Solid-State Quantum Computing,” in Phys. Rev. Lett., 89, 047901, 2002.
[27] F. Vatan, V.R. Raichowdry and M. Anantram, ”Spatially Correlated Qubit Errors and Burst-Correcting Quantum Codes,” in IEEE Transactions on
Information Theory, Vol. 45, pp. 1703-1708, 1999.
[28] M. Grassl and T. Beth, ”Cyclic quantum error-correcting codes and quantum shift registers,” in Proceedings of the Royal Society London A, 456, pp. 2689-
2706, 2000.
[29] Chau, H. F., ”Quantum convolutional codes,” in Physical Review A, 58, 905-909, 1998.
[30] A. R. Calderbank, P.W.Shor, ”Good quantum error-correcting codes exist,”in Physical Review A, 54(2):1098-1105, August 1996.
[31] Markus Grassl, Willi Geiselmann, Thomas Beth, ”Quantum Reed-Solomon Codes,” in AAECC, 1999: 231-244. 1998.
[32] C. Bennett, ”Quantum cryptography using any two nonorthogonal states,”in Physical Review Letters, vol. 68, no. 21, pp. 3121 - 2124.
[33] C. Bennett and G. Brassard. ”Quantum Cryptography: Public Key Distribution and Coin Tossing,” in Proceedings of IEEE International Conference on Computers Systems and Signal Processing, December 1984, pp. 175-179.
[34] Barnett, S. M., Huttner, B. and Phoenix, S. J. D., ”Eavesdropping strategies and rejected-data protocols in quantum cryptography,” in Journal of Modern
Optics, vol. 40, no. 12, December 1993, pp. 2501 - 2513.
[35] Ekert, A. K., Huttner, B., Palma, G. M. and Peres, A., ”Eavesdropping on quantum cryptosystems,” in Physical Review A, 2000.
[36] Gottesman and Lo, ”From quantum cheating to quantum security,” in Physics Today, Nov. 2000, p. 22.
[37] Bennett, C. H., ”Quantum cryptography using any two nonorthogonal states,” in Physical Review Letters, vol. 68, no. 21, 25 May 1992, pp. 3121 - 2124.
[38] Ekert, A. K., ”Quantum cryptography based on Bell’s theorem,” in Physical Review Letters, vol. 67, no. 6, 5 August 1991, pp. 661 - 663.
[39] Bennett, C. H., Brassard, G., Crepeau, C., Jozsa, R., Peres, A. and Wootters, W. K., ”Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels,” in Physical Review Letters, vol. 70, 29
March 1993, pp. 1895 - 1899. | en |