M. Aspelmeyer, H. R. Böhm, T. Gyatso, T. Jennewein, R. Kaltenbaek, M. Lindenthal, G. Molina-Terriza, A. Poppe, K. Resch, M. Taraba, R. Ursin, P. Walther, and A. Zeilinger, “Long-distance free-space distribution of quantum entanglement,” Science 301, 621–623 (2003).

[CrossRef]
[PubMed]

C. Bennett and G. Brassard, “Quantum Cryptography: public key distribution and coin tossing,” inProceedings of the IEEE International Conference on Computers, Systems and Signal Processing(Bangalore, India, 1984), pp. 175–179.

[PubMed]

D. S. Naik, C. G. Peterson, A. G. White, A. J. Berglund, and P. G. Kwiat, “Entangled state quantum cryptography: eavesdropping on the Ekert protocol,” Phys. Rev. Lett. 84, 4733–4736 (2000).

[CrossRef]
[PubMed]

J. C. Bienfang, A. J. Gross, A. Mink, B. J. Hershman, A. Nakassis, X. Tang, R. Lu, D. H. Su, C. W. Clark, and C. J. Williams, “Quantum key distribution with 1.25 Gbps clock synchronization,” Opt. Express 12, 2011–2017 (2004).

[CrossRef]
[PubMed]

M. Peev, O. Maurhardt, T. Lorünser, M. Suda, M. Nölle, A. Poppe, R. Ursin, A. Fedrizzi, H. Böhm, T. Jennewein, and A. Zeilinger, “A novel protocol-authentication algorithm ruling out a man-in-the middle attack in quantum cryptography,” in Proceedings of the International Meeting on Quantum Information Science “Foundations of Quantum Information” - to be published (Camerino, Italy, 2004).

H. Böhm, “A compact source for polarization entangled photon pairs,” Master’s thesis, Vienna University of Technology (2003).

M. Aspelmeyer, H. R. Böhm, T. Gyatso, T. Jennewein, R. Kaltenbaek, M. Lindenthal, G. Molina-Terriza, A. Poppe, K. Resch, M. Taraba, R. Ursin, P. Walther, and A. Zeilinger, “Long-distance free-space distribution of quantum entanglement,” Science 301, 621–623 (2003).

[CrossRef]
[PubMed]

G. Brassard and L. Salvail, “Secret key reconciliation by public discussion,” Lecture Notes in Computer Science 765, 410–423 (1994).

[CrossRef]

C. Bennett and G. Brassard, “Quantum Cryptography: public key distribution and coin tossing,” inProceedings of the IEEE International Conference on Computers, Systems and Signal Processing(Bangalore, India, 1984), pp. 175–179.

[PubMed]

W. Tittel, J. Brendel, H. Zbinden, and N. Gisin, “Quantum cryptography using entangled photons in energy-time Bell states,” Phys. Rev. Lett. 84, 4737–4740 (2000).

[CrossRef]
[PubMed]

J. C. Bienfang, A. J. Gross, A. Mink, B. J. Hershman, A. Nakassis, X. Tang, R. Lu, D. H. Su, C. W. Clark, and C. J. Williams, “Quantum key distribution with 1.25 Gbps clock synchronization,” Opt. Express 12, 2011–2017 (2004).

[CrossRef]
[PubMed]

A. K. Ekert, “Quantum cryptography based on Bell’s theorem,” Phys. Rev. Lett. 67, 661–663 (1991).

[CrossRef]
[PubMed]

M. Peev, O. Maurhardt, T. Lorünser, M. Suda, M. Nölle, A. Poppe, R. Ursin, A. Fedrizzi, H. Böhm, T. Jennewein, and A. Zeilinger, “A novel protocol-authentication algorithm ruling out a man-in-the middle attack in quantum cryptography,” in Proceedings of the International Meeting on Quantum Information Science “Foundations of Quantum Information” - to be published (Camerino, Italy, 2004).

N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden, “Quantum Cryptography,” Rev. Mod. Phys. 74, 145–195 (2002).

[CrossRef]

W. Tittel, J. Brendel, H. Zbinden, and N. Gisin, “Quantum cryptography using entangled photons in energy-time Bell states,” Phys. Rev. Lett. 84, 4737–4740 (2000).

[CrossRef]
[PubMed]

J. C. Bienfang, A. J. Gross, A. Mink, B. J. Hershman, A. Nakassis, X. Tang, R. Lu, D. H. Su, C. W. Clark, and C. J. Williams, “Quantum key distribution with 1.25 Gbps clock synchronization,” Opt. Express 12, 2011–2017 (2004).

[CrossRef]
[PubMed]

M. Aspelmeyer, H. R. Böhm, T. Gyatso, T. Jennewein, R. Kaltenbaek, M. Lindenthal, G. Molina-Terriza, A. Poppe, K. Resch, M. Taraba, R. Ursin, P. Walther, and A. Zeilinger, “Long-distance free-space distribution of quantum entanglement,” Science 301, 621–623 (2003).

[CrossRef]
[PubMed]

J. C. Bienfang, A. J. Gross, A. Mink, B. J. Hershman, A. Nakassis, X. Tang, R. Lu, D. H. Su, C. W. Clark, and C. J. Williams, “Quantum key distribution with 1.25 Gbps clock synchronization,” Opt. Express 12, 2011–2017 (2004).

[CrossRef]
[PubMed]

R. Lieger, T. Lorünser, G. Humer, and F. Schupfer, “Embedding quantum cryptography on DSP-boards,” in Proceedings of EUSIPCO - to be published (Vienna, Austria, 2004).

H. Inamori, N. Lütkenhaus, and D. Mayers, “Unconditional security of practical quantum key distribution,” quant-ph/0107017 (2001).

M. Aspelmeyer, H. R. Böhm, T. Gyatso, T. Jennewein, R. Kaltenbaek, M. Lindenthal, G. Molina-Terriza, A. Poppe, K. Resch, M. Taraba, R. Ursin, P. Walther, and A. Zeilinger, “Long-distance free-space distribution of quantum entanglement,” Science 301, 621–623 (2003).

[CrossRef]
[PubMed]

T. Jennewein, C. Simon, G. Weihs, H. Weinfurter, and A. Zeilinger, “Quantum cryptography with entangled photons,” Phys. Rev. Lett. 84, 4729–4732 (2000).

[CrossRef]
[PubMed]

M. Peev, O. Maurhardt, T. Lorünser, M. Suda, M. Nölle, A. Poppe, R. Ursin, A. Fedrizzi, H. Böhm, T. Jennewein, and A. Zeilinger, “A novel protocol-authentication algorithm ruling out a man-in-the middle attack in quantum cryptography,” in Proceedings of the International Meeting on Quantum Information Science “Foundations of Quantum Information” - to be published (Camerino, Italy, 2004).

M. Aspelmeyer, H. R. Böhm, T. Gyatso, T. Jennewein, R. Kaltenbaek, M. Lindenthal, G. Molina-Terriza, A. Poppe, K. Resch, M. Taraba, R. Ursin, P. Walther, and A. Zeilinger, “Long-distance free-space distribution of quantum entanglement,” Science 301, 621–623 (2003).

[CrossRef]
[PubMed]

P. Trojek, C. Schmid, M. Bourennane, H. Weinfurter, and C. Kurtsiefer, “Compact source of polarization-entangled photon,” Opt. Express 12, 276–281 (2004).

[CrossRef]
[PubMed]

C. Kurtsiefer, M. Oberparleiter, and H. Weinfurter, “High-efficiency entangled photon pair collection in type-II parametric fluorescence,” Phys. Rev. A 64, 023802 (2001).

[CrossRef]

D. S. Naik, C. G. Peterson, A. G. White, A. J. Berglund, and P. G. Kwiat, “Entangled state quantum cryptography: eavesdropping on the Ekert protocol,” Phys. Rev. Lett. 84, 4733–4736 (2000).

[CrossRef]
[PubMed]

P. G. Kwiat, K. Mattle, H. Weinfurter, and A. Zeilinger, “New high-intensity source of polarization-entangled photon pairs,” Phys. Rev. Lett. 75, 4337–4341 (1995).

[CrossRef]
[PubMed]

R. Lieger, T. Lorünser, G. Humer, and F. Schupfer, “Embedding quantum cryptography on DSP-boards,” in Proceedings of EUSIPCO - to be published (Vienna, Austria, 2004).

M. Aspelmeyer, H. R. Böhm, T. Gyatso, T. Jennewein, R. Kaltenbaek, M. Lindenthal, G. Molina-Terriza, A. Poppe, K. Resch, M. Taraba, R. Ursin, P. Walther, and A. Zeilinger, “Long-distance free-space distribution of quantum entanglement,” Science 301, 621–623 (2003).

[CrossRef]
[PubMed]

R. Lieger, T. Lorünser, G. Humer, and F. Schupfer, “Embedding quantum cryptography on DSP-boards,” in Proceedings of EUSIPCO - to be published (Vienna, Austria, 2004).

M. Peev, O. Maurhardt, T. Lorünser, M. Suda, M. Nölle, A. Poppe, R. Ursin, A. Fedrizzi, H. Böhm, T. Jennewein, and A. Zeilinger, “A novel protocol-authentication algorithm ruling out a man-in-the middle attack in quantum cryptography,” in Proceedings of the International Meeting on Quantum Information Science “Foundations of Quantum Information” - to be published (Camerino, Italy, 2004).

J. C. Bienfang, A. J. Gross, A. Mink, B. J. Hershman, A. Nakassis, X. Tang, R. Lu, D. H. Su, C. W. Clark, and C. J. Williams, “Quantum key distribution with 1.25 Gbps clock synchronization,” Opt. Express 12, 2011–2017 (2004).

[CrossRef]
[PubMed]

N. Lütkenhaus, “Security against individual attacks for realistic quantum key distribution,” Phys. Rev. A 61, 052304 (2000).

[CrossRef]

N. Lütkenhaus, “Estimates for practical quantum cryptography,” Phys. Rev. A 59, 3301–3319 (1999).

[CrossRef]

H. Inamori, N. Lütkenhaus, and D. Mayers, “Unconditional security of practical quantum key distribution,” quant-ph/0107017 (2001).

P. G. Kwiat, K. Mattle, H. Weinfurter, and A. Zeilinger, “New high-intensity source of polarization-entangled photon pairs,” Phys. Rev. Lett. 75, 4337–4341 (1995).

[CrossRef]
[PubMed]

M. Peev, O. Maurhardt, T. Lorünser, M. Suda, M. Nölle, A. Poppe, R. Ursin, A. Fedrizzi, H. Böhm, T. Jennewein, and A. Zeilinger, “A novel protocol-authentication algorithm ruling out a man-in-the middle attack in quantum cryptography,” in Proceedings of the International Meeting on Quantum Information Science “Foundations of Quantum Information” - to be published (Camerino, Italy, 2004).

H. Inamori, N. Lütkenhaus, and D. Mayers, “Unconditional security of practical quantum key distribution,” quant-ph/0107017 (2001).

J. C. Bienfang, A. J. Gross, A. Mink, B. J. Hershman, A. Nakassis, X. Tang, R. Lu, D. H. Su, C. W. Clark, and C. J. Williams, “Quantum key distribution with 1.25 Gbps clock synchronization,” Opt. Express 12, 2011–2017 (2004).

[CrossRef]
[PubMed]

M. Aspelmeyer, H. R. Böhm, T. Gyatso, T. Jennewein, R. Kaltenbaek, M. Lindenthal, G. Molina-Terriza, A. Poppe, K. Resch, M. Taraba, R. Ursin, P. Walther, and A. Zeilinger, “Long-distance free-space distribution of quantum entanglement,” Science 301, 621–623 (2003).

[CrossRef]
[PubMed]

D. S. Naik, C. G. Peterson, A. G. White, A. J. Berglund, and P. G. Kwiat, “Entangled state quantum cryptography: eavesdropping on the Ekert protocol,” Phys. Rev. Lett. 84, 4733–4736 (2000).

[CrossRef]
[PubMed]

J. C. Bienfang, A. J. Gross, A. Mink, B. J. Hershman, A. Nakassis, X. Tang, R. Lu, D. H. Su, C. W. Clark, and C. J. Williams, “Quantum key distribution with 1.25 Gbps clock synchronization,” Opt. Express 12, 2011–2017 (2004).

[CrossRef]
[PubMed]

M. Peev, O. Maurhardt, T. Lorünser, M. Suda, M. Nölle, A. Poppe, R. Ursin, A. Fedrizzi, H. Böhm, T. Jennewein, and A. Zeilinger, “A novel protocol-authentication algorithm ruling out a man-in-the middle attack in quantum cryptography,” in Proceedings of the International Meeting on Quantum Information Science “Foundations of Quantum Information” - to be published (Camerino, Italy, 2004).

C. Kurtsiefer, M. Oberparleiter, and H. Weinfurter, “High-efficiency entangled photon pair collection in type-II parametric fluorescence,” Phys. Rev. A 64, 023802 (2001).

[CrossRef]

M. Peev, O. Maurhardt, T. Lorünser, M. Suda, M. Nölle, A. Poppe, R. Ursin, A. Fedrizzi, H. Böhm, T. Jennewein, and A. Zeilinger, “A novel protocol-authentication algorithm ruling out a man-in-the middle attack in quantum cryptography,” in Proceedings of the International Meeting on Quantum Information Science “Foundations of Quantum Information” - to be published (Camerino, Italy, 2004).

D. S. Naik, C. G. Peterson, A. G. White, A. J. Berglund, and P. G. Kwiat, “Entangled state quantum cryptography: eavesdropping on the Ekert protocol,” Phys. Rev. Lett. 84, 4733–4736 (2000).

[CrossRef]
[PubMed]

M. Aspelmeyer, H. R. Böhm, T. Gyatso, T. Jennewein, R. Kaltenbaek, M. Lindenthal, G. Molina-Terriza, A. Poppe, K. Resch, M. Taraba, R. Ursin, P. Walther, and A. Zeilinger, “Long-distance free-space distribution of quantum entanglement,” Science 301, 621–623 (2003).

[CrossRef]
[PubMed]

M. Peev, O. Maurhardt, T. Lorünser, M. Suda, M. Nölle, A. Poppe, R. Ursin, A. Fedrizzi, H. Böhm, T. Jennewein, and A. Zeilinger, “A novel protocol-authentication algorithm ruling out a man-in-the middle attack in quantum cryptography,” in Proceedings of the International Meeting on Quantum Information Science “Foundations of Quantum Information” - to be published (Camerino, Italy, 2004).

M. Aspelmeyer, H. R. Böhm, T. Gyatso, T. Jennewein, R. Kaltenbaek, M. Lindenthal, G. Molina-Terriza, A. Poppe, K. Resch, M. Taraba, R. Ursin, P. Walther, and A. Zeilinger, “Long-distance free-space distribution of quantum entanglement,” Science 301, 621–623 (2003).

[CrossRef]
[PubMed]

N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden, “Quantum Cryptography,” Rev. Mod. Phys. 74, 145–195 (2002).

[CrossRef]

G. Brassard and L. Salvail, “Secret key reconciliation by public discussion,” Lecture Notes in Computer Science 765, 410–423 (1994).

[CrossRef]

R. Lieger, T. Lorünser, G. Humer, and F. Schupfer, “Embedding quantum cryptography on DSP-boards,” in Proceedings of EUSIPCO - to be published (Vienna, Austria, 2004).

T. Jennewein, C. Simon, G. Weihs, H. Weinfurter, and A. Zeilinger, “Quantum cryptography with entangled photons,” Phys. Rev. Lett. 84, 4729–4732 (2000).

[CrossRef]
[PubMed]

J. C. Bienfang, A. J. Gross, A. Mink, B. J. Hershman, A. Nakassis, X. Tang, R. Lu, D. H. Su, C. W. Clark, and C. J. Williams, “Quantum key distribution with 1.25 Gbps clock synchronization,” Opt. Express 12, 2011–2017 (2004).

[CrossRef]
[PubMed]

M. Peev, O. Maurhardt, T. Lorünser, M. Suda, M. Nölle, A. Poppe, R. Ursin, A. Fedrizzi, H. Böhm, T. Jennewein, and A. Zeilinger, “A novel protocol-authentication algorithm ruling out a man-in-the middle attack in quantum cryptography,” in Proceedings of the International Meeting on Quantum Information Science “Foundations of Quantum Information” - to be published (Camerino, Italy, 2004).

J. C. Bienfang, A. J. Gross, A. Mink, B. J. Hershman, A. Nakassis, X. Tang, R. Lu, D. H. Su, C. W. Clark, and C. J. Williams, “Quantum key distribution with 1.25 Gbps clock synchronization,” Opt. Express 12, 2011–2017 (2004).

[CrossRef]
[PubMed]

M. Aspelmeyer, H. R. Böhm, T. Gyatso, T. Jennewein, R. Kaltenbaek, M. Lindenthal, G. Molina-Terriza, A. Poppe, K. Resch, M. Taraba, R. Ursin, P. Walther, and A. Zeilinger, “Long-distance free-space distribution of quantum entanglement,” Science 301, 621–623 (2003).

[CrossRef]
[PubMed]

N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden, “Quantum Cryptography,” Rev. Mod. Phys. 74, 145–195 (2002).

[CrossRef]

W. Tittel, J. Brendel, H. Zbinden, and N. Gisin, “Quantum cryptography using entangled photons in energy-time Bell states,” Phys. Rev. Lett. 84, 4737–4740 (2000).

[CrossRef]
[PubMed]

M. Aspelmeyer, H. R. Böhm, T. Gyatso, T. Jennewein, R. Kaltenbaek, M. Lindenthal, G. Molina-Terriza, A. Poppe, K. Resch, M. Taraba, R. Ursin, P. Walther, and A. Zeilinger, “Long-distance free-space distribution of quantum entanglement,” Science 301, 621–623 (2003).

[CrossRef]
[PubMed]

M. Peev, O. Maurhardt, T. Lorünser, M. Suda, M. Nölle, A. Poppe, R. Ursin, A. Fedrizzi, H. Böhm, T. Jennewein, and A. Zeilinger, “A novel protocol-authentication algorithm ruling out a man-in-the middle attack in quantum cryptography,” in Proceedings of the International Meeting on Quantum Information Science “Foundations of Quantum Information” - to be published (Camerino, Italy, 2004).

G. S. Vernam, “Cipher printing telegraph systems for secret wire and radio,” J. Amer. Inst. Elect. Eng. 55, 109–115 (1926).

M. Aspelmeyer, H. R. Böhm, T. Gyatso, T. Jennewein, R. Kaltenbaek, M. Lindenthal, G. Molina-Terriza, A. Poppe, K. Resch, M. Taraba, R. Ursin, P. Walther, and A. Zeilinger, “Long-distance free-space distribution of quantum entanglement,” Science 301, 621–623 (2003).

[CrossRef]
[PubMed]

T. Jennewein, C. Simon, G. Weihs, H. Weinfurter, and A. Zeilinger, “Quantum cryptography with entangled photons,” Phys. Rev. Lett. 84, 4729–4732 (2000).

[CrossRef]
[PubMed]

P. Trojek, C. Schmid, M. Bourennane, H. Weinfurter, and C. Kurtsiefer, “Compact source of polarization-entangled photon,” Opt. Express 12, 276–281 (2004).

[CrossRef]
[PubMed]

C. Kurtsiefer, M. Oberparleiter, and H. Weinfurter, “High-efficiency entangled photon pair collection in type-II parametric fluorescence,” Phys. Rev. A 64, 023802 (2001).

[CrossRef]

T. Jennewein, C. Simon, G. Weihs, H. Weinfurter, and A. Zeilinger, “Quantum cryptography with entangled photons,” Phys. Rev. Lett. 84, 4729–4732 (2000).

[CrossRef]
[PubMed]

P. G. Kwiat, K. Mattle, H. Weinfurter, and A. Zeilinger, “New high-intensity source of polarization-entangled photon pairs,” Phys. Rev. Lett. 75, 4337–4341 (1995).

[CrossRef]
[PubMed]

D. S. Naik, C. G. Peterson, A. G. White, A. J. Berglund, and P. G. Kwiat, “Entangled state quantum cryptography: eavesdropping on the Ekert protocol,” Phys. Rev. Lett. 84, 4733–4736 (2000).

[CrossRef]
[PubMed]

S. Wiesner, “Conjugate Coding,” submitted to IEEE Information Theory (ca. 1970) Later published in Sigact News 15(1), 78–88 (1983).

J. C. Bienfang, A. J. Gross, A. Mink, B. J. Hershman, A. Nakassis, X. Tang, R. Lu, D. H. Su, C. W. Clark, and C. J. Williams, “Quantum key distribution with 1.25 Gbps clock synchronization,” Opt. Express 12, 2011–2017 (2004).

[CrossRef]
[PubMed]

N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden, “Quantum Cryptography,” Rev. Mod. Phys. 74, 145–195 (2002).

[CrossRef]

W. Tittel, J. Brendel, H. Zbinden, and N. Gisin, “Quantum cryptography using entangled photons in energy-time Bell states,” Phys. Rev. Lett. 84, 4737–4740 (2000).

[CrossRef]
[PubMed]

M. Aspelmeyer, H. R. Böhm, T. Gyatso, T. Jennewein, R. Kaltenbaek, M. Lindenthal, G. Molina-Terriza, A. Poppe, K. Resch, M. Taraba, R. Ursin, P. Walther, and A. Zeilinger, “Long-distance free-space distribution of quantum entanglement,” Science 301, 621–623 (2003).

[CrossRef]
[PubMed]

T. Jennewein, C. Simon, G. Weihs, H. Weinfurter, and A. Zeilinger, “Quantum cryptography with entangled photons,” Phys. Rev. Lett. 84, 4729–4732 (2000).

[CrossRef]
[PubMed]

P. G. Kwiat, K. Mattle, H. Weinfurter, and A. Zeilinger, “New high-intensity source of polarization-entangled photon pairs,” Phys. Rev. Lett. 75, 4337–4341 (1995).

[CrossRef]
[PubMed]

M. Peev, O. Maurhardt, T. Lorünser, M. Suda, M. Nölle, A. Poppe, R. Ursin, A. Fedrizzi, H. Böhm, T. Jennewein, and A. Zeilinger, “A novel protocol-authentication algorithm ruling out a man-in-the middle attack in quantum cryptography,” in Proceedings of the International Meeting on Quantum Information Science “Foundations of Quantum Information” - to be published (Camerino, Italy, 2004).

G. S. Vernam, “Cipher printing telegraph systems for secret wire and radio,” J. Amer. Inst. Elect. Eng. 55, 109–115 (1926).

G. Brassard and L. Salvail, “Secret key reconciliation by public discussion,” Lecture Notes in Computer Science 765, 410–423 (1994).

[CrossRef]

P. Trojek, C. Schmid, M. Bourennane, H. Weinfurter, and C. Kurtsiefer, “Compact source of polarization-entangled photon,” Opt. Express 12, 276–281 (2004).

[CrossRef]
[PubMed]

J. C. Bienfang, A. J. Gross, A. Mink, B. J. Hershman, A. Nakassis, X. Tang, R. Lu, D. H. Su, C. W. Clark, and C. J. Williams, “Quantum key distribution with 1.25 Gbps clock synchronization,” Opt. Express 12, 2011–2017 (2004).

[CrossRef]
[PubMed]

C. Kurtsiefer, M. Oberparleiter, and H. Weinfurter, “High-efficiency entangled photon pair collection in type-II parametric fluorescence,” Phys. Rev. A 64, 023802 (2001).

[CrossRef]

N. Lütkenhaus, “Estimates for practical quantum cryptography,” Phys. Rev. A 59, 3301–3319 (1999).

[CrossRef]

N. Lütkenhaus, “Security against individual attacks for realistic quantum key distribution,” Phys. Rev. A 61, 052304 (2000).

[CrossRef]

P. G. Kwiat, K. Mattle, H. Weinfurter, and A. Zeilinger, “New high-intensity source of polarization-entangled photon pairs,” Phys. Rev. Lett. 75, 4337–4341 (1995).

[CrossRef]
[PubMed]

A. K. Ekert, “Quantum cryptography based on Bell’s theorem,” Phys. Rev. Lett. 67, 661–663 (1991).

[CrossRef]
[PubMed]

T. Jennewein, C. Simon, G. Weihs, H. Weinfurter, and A. Zeilinger, “Quantum cryptography with entangled photons,” Phys. Rev. Lett. 84, 4729–4732 (2000).

[CrossRef]
[PubMed]

D. S. Naik, C. G. Peterson, A. G. White, A. J. Berglund, and P. G. Kwiat, “Entangled state quantum cryptography: eavesdropping on the Ekert protocol,” Phys. Rev. Lett. 84, 4733–4736 (2000).

[CrossRef]
[PubMed]

W. Tittel, J. Brendel, H. Zbinden, and N. Gisin, “Quantum cryptography using entangled photons in energy-time Bell states,” Phys. Rev. Lett. 84, 4737–4740 (2000).

[CrossRef]
[PubMed]

C. Bennett and G. Brassard, “Quantum Cryptography: public key distribution and coin tossing,” inProceedings of the IEEE International Conference on Computers, Systems and Signal Processing(Bangalore, India, 1984), pp. 175–179.

[PubMed]

N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden, “Quantum Cryptography,” Rev. Mod. Phys. 74, 145–195 (2002).

[CrossRef]

M. Aspelmeyer, H. R. Böhm, T. Gyatso, T. Jennewein, R. Kaltenbaek, M. Lindenthal, G. Molina-Terriza, A. Poppe, K. Resch, M. Taraba, R. Ursin, P. Walther, and A. Zeilinger, “Long-distance free-space distribution of quantum entanglement,” Science 301, 621–623 (2003).

[CrossRef]
[PubMed]

S. Wiesner, “Conjugate Coding,” submitted to IEEE Information Theory (ca. 1970) Later published in Sigact News 15(1), 78–88 (1983).

idQuantique SA (Geneve, Switzerland), http://www.idquantique.com/.

magiq technologies (Sommerville, USA), http://www.magiqtech.com/.

NEC Ltd.(Tokyo, Japan), http://www.nec.com/.

H. Inamori, N. Lütkenhaus, and D. Mayers, “Unconditional security of practical quantum key distribution,” quant-ph/0107017 (2001).

H. Böhm, “A compact source for polarization entangled photon pairs,” Master’s thesis, Vienna University of Technology (2003).

R. Lieger, T. Lorünser, G. Humer, and F. Schupfer, “Embedding quantum cryptography on DSP-boards,” in Proceedings of EUSIPCO - to be published (Vienna, Austria, 2004).

M. Peev, O. Maurhardt, T. Lorünser, M. Suda, M. Nölle, A. Poppe, R. Ursin, A. Fedrizzi, H. Böhm, T. Jennewein, and A. Zeilinger, “A novel protocol-authentication algorithm ruling out a man-in-the middle attack in quantum cryptography,” in Proceedings of the International Meeting on Quantum Information Science “Foundations of Quantum Information” - to be published (Camerino, Italy, 2004).