Journal of Engineering and Applied Sciences
Year:
2017
Volume:
12
Issue:
7 SI
Page No.
8229 - 8239
References
Abdullah, A.A., 2015. Modified quantum three pass protocol based on hybrid cryptosystem. Ph.D Thesis, Eastern Mediterranean University, Famagusta, Northern Cyprus.
Bennett, C.H. and G. Brassard, 2004. Quantum cryptography: Public key distribution and coin tossing. Theor. Comput. Sci., 560: 7-11.
Direct Link | Bennett, C.H., 1992. Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett., 68: 3121-3124.
CrossRef | PubMed | Blake-Wilson, S. and A. Menezes, 1998. Authenticated Diffe-Hellman Key Agreement Protocols. In: Selected Areas in Cryptography, Tavares S. and H. Meijer (Eds.). Springer, Berlin, Germany, ISBN:978-3-540-65894-8, pp: 339-361.
Cai, R.Y. and V. Scarani, 2009. Finite-key analysis for practical implementations of quantum key distribution. N. J. Phys., 11: 1-21.
PubMed | Direct Link | Diffie, W. and M.E. Hellman, 1976. New directions in cryptography. IEEE Trans. Inform. Theory, 22: 644-654.
CrossRef | Direct Link | Garzia, F., 2013. Handbook of Communications Security. WIT Press, Ashurst, UK., ISBN:978-1-84564-768-1, Pages: 658.
Gisin, N., G. Ribordy, W. Tittel and H. Zbinden, 2002. Quantum cryptography. Rev. Mod. Phys., 74: 145-195.
CrossRef | Horodecki, R., P. Horodecki, M. Horodecki and K. Horodecki, 2009. Quantum entanglement. Rev. Mod. Phys., 81: 865-942.
CrossRef | Direct Link | Khalaf, R.Z., 2015. Quantum encryption algorithm based on modified BB84 and authentication DH algorithm. Ph.D Thesis, Eastern Mediterranean University, Famagusta, Northern Cyprus.
Lindblad, G., 1999. A general no-cloning theorem. Lett. Math. Phys., 47: 189-196.
Direct Link | Stallings, W., 2006. Cryptography and Network Security: Principles and Practices. 4th Edn., Pearson Education, Delhi, Indian, ISBN:978-81-7758-774-6, Pages: 673.
Steiner, M., G. Tsudik and M. Waidner, 1996. Diffie-Hellman key distribution extended to group communication. Proceedings of the 3rd ACM Conference on Computer and Communications Security, March 14-15, ACM Press, New Delhi, India, pp: 31-37.