|
[1] V. Scarani, H. Bechmann-Pasquinucci, N. J. Cerf, M. Dušek, N. Lütkenhaus, and M. Peev,The security of practical quantum key distribution,” Reviews of modern physics, vol. 81, no. 3, p. 1301, 2009. [2] N. Venkatachalam, F. P. Shingala, C. Selvagangai, S. Dillibabu, P. Chandravanshi, R. P. Singh, et al., “Scalable QKD post processing system with reconfigurable hardware accelerator,” IEEE Transactions on Quantum Engineering, 2023. [3] D. Stucki, N. Brunner, N. Gisin, V. Scarani, and H. Zbinden, “Fast and simple one-way quantum key distribution,” Applied Physics Letters, vol. 87, no. 19, 2005. [4] R.-Q. Gao, Y.-M. Xie, J. Gu, W.-B. Liu, C.-X. Weng, B.-H. Li, H.-L. Yin, and Z.-B. Chen, “Simple security proof of coherent-one-way quantum key distribution,” Optics Express, vol. 30, no. 13, pp. 23783–23795, 2022. [5] P. Gaudry, “Integer factorization and discrete logarithm problems,” Les cours du CIRM, vol. 4, no. 1, pp. 1–20, 2014. [6] P. W. Shor, “Algorithms for quantum computation: discrete logarithms and factoring,” in Proceedings 35th annual symposium on foundations of computer science, pp. 124–134, Ieee, 1994. [7] N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden, “Quantum cryptography,” Reviews of modern physics, vol. 74, no. 1, p. 145, 2002. [8] L. Chen, L. Chen, S. Jordan, Y.-K. Liu, D. Moody, R. Peralta, R. A. Perlner, and D. SmithTone, Report on post-quantum cryptography, vol. 12. US Department of Commerce, National Institute of Standards and Technology …, 2016. [9] C. E. Shannon and W. Weaver, The mathematical theory of communication, by CE Shannon (and recent contributions to the mathematical theory of communication), W. Weaver. University of illinois Press, 1949. [10] R. Alléaume, C. Branciard, J. Bouda, T. Debuisschert, M. Dianati, N. Gisin, M. Godfrey, P. Grangier, T. Länger, N. Lütkenhaus, et al., “Using quantum key distribution for cryptographic purposes: a survey,” Theoretical Computer Science, vol. 560, pp. 62–81, 2014. [11] Y. Cao, Y. Zhao, Q. Wang, J. Zhang, S. X. Ng, and L. Hanzo, “The evolution of quantum key distribution networks: On the road to the qinternet,” IEEE Communications Surveys & Tutorials, vol. 24, no. 2, pp. 839–894, 2022. [12] N. Gisin, G. Ribordy, H. Zbinden, D. Stucki, N. Brunner, and V. Scarani, “Towards practical and fast quantum cryptography,” arXiv preprint quant-ph/0411022, 2004. [13] K. R. Kurose, “Computer networking: A top-down approach, 7th edition,” Kurose, Keith W. Ross.—, p. 601, 2017. [14] H.-F. Zhang, J. Wang, K. Cui, C.-L. Luo, S.-Z. Lin, L. Zhou, H. Liang, T.-Y. Chen, K. Chen, and J.-W. Pan, “A real-time QKD system based on FPGA,” Journal of Lightwave Technology, vol. 30, no. 20, pp. 3226–3234, 2012. [15] A. Tanaka, M. Fujiwara, K.-i. Yoshino, S. Takahashi, Y. Nambu, A. Tomita, S. Miki, T. Yamashita, Z. Wang, M. Sasaki, et al., “High-speed quantum key distribution system for 1-Mbps real-time key generation,” IEEE Journal of Quantum Electronics, vol. 48, no. 4, pp. 542–550, 2012. [16] N. Walenta, A. Burg, D. Caselunghe, J. Constantin, N. Gisin, O. Guinnard, R. Houlmann, P. Junod, B. Korzh, N. Kulesza, et al., “A fast and versatile QKD system with hardware key distillation and wavelength multiplexing,” arXiv preprint arXiv:1309.2583, 2013. [17] J. Constantin, R. Houlmann, N. Preyss, N. Walenta, H. Zbinden, P. Junod, and A. Burg, “An FPGA-based 4 Mbps secret key distillation engine for quantum key distribution systems,” Journal of Signal Processing Systems, vol. 86, pp. 1–15, 2017. [18] A. Stanco, F. B. Santagiustina, L. Calderaro, M. Avesani, T. Bertapelle, D. Dequal, G. Vallone, and P. Villoresi, “Versatile and concurrent FPGA-based architecture for practical quantum communication systems,” IEEE Transactions on Quantum Engineering, vol. 3, pp. 1–8, 2022. [19] A. I. Nurhadi and N. R. Syambas, “Quantum key distribution (QKD) protocols: A survey,” in 2018 4th International Conference on Wireless and Telematics (ICWT), pp. 1–5, IEEE, 2018. [20] Y.-C. Kao, S.-H. Huang, C.-H. Chang, C.-H. Wu, S.-H. Chu, J. Jiang, A.-C. Zhang, S.-Y. Huang, J.-H. Yan, K.-M. Feng, et al., “Field test of quantum key distribution with high key creation efficiency,” Optics Express, vol. 31, no. 19, pp. 30239–30247, 2023. [21] H.-K. Lo, X. Ma, and K. Chen, “Decoy state quantum key distribution,” Physical review letters, vol. 94, no. 23, p. 230504, 2005. [22] G. Campobello, G. Patane, and M. Russo, “Parallel crc realization,” IEEE Transactions on Computers, vol. 52, no. 10, pp. 1312–1319, 2003 |