{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T23:26:43Z","timestamp":1772753203949,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540615125","type":"print"},{"value":"9783540686972","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1996]]},"DOI":"10.1007\/3-540-68697-5_25","type":"book-chapter","created":{"date-parts":[[2007,11,8]],"date-time":"2007-11-08T17:10:00Z","timestamp":1194541800000},"page":"329-342","source":"Crossref","is-referenced-by-count":37,"title":["Quantum Cryptography over Underground Optical Fibers"],"prefix":"10.1007","author":[{"given":"R. J.","family":"Hughes","sequence":"first","affiliation":[]},{"given":"G. G.","family":"Luther","sequence":"additional","affiliation":[]},{"given":"G. L.","family":"Morgan","sequence":"additional","affiliation":[]},{"given":"C. G.","family":"Peterson","sequence":"additional","affiliation":[]},{"given":"C.","family":"Simmons","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,7,13]]},"reference":[{"key":"25_CR1","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1080\/00107519508222149","volume":"36","author":"R. J. Hughes","year":"1995","unstructured":"For reviews see R. J. Hughes et al., \u201cQuantum Cryptography,\u201d Contemporary Physics 36, 149 (1995); C. H. Bennett et al., \u201cQuantum Cryptography,\u201d Scientific American 257 no. 10, 50 (1992).","journal-title":"Contemporary Physics"},{"key":"25_CR2","doi-asserted-by":"crossref","unstructured":"D. Atkins et al., \u201cThe Magic Words are Squeamish Ossifrage,\u201d Advances in Cryptology-ASIACRYPT\u2019 94 Proceedings, Springer-Verlag, 1995, pp.263.","DOI":"10.1007\/BFb0000440"},{"key":"25_CR3","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1145\/1008908.1008920","volume":"15","author":"S. Wiesner","year":"1983","unstructured":"S. Wiesner, \u201cConjugate Coding,\u201d SIGACT News 15, 78 (1983).","journal-title":"SIGACT News"},{"key":"25_CR4","unstructured":"C. H. Bennett and G. Brassard, \u201cQuantum Cryptography: Public Key Distribution and Coin Tossing,\u201d Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, Bangalore (New York, IEEE, 1984)."},{"key":"25_CR5","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1103\/PhysRevLett.67.661","volume":"67","author":"A. K. Ekert","year":"1991","unstructured":"A. K. Ekert, \u201cQuantum Cryptography Based on Bell\u2019s Theorem,\u201d Phys. Rev. Lett. 67, 661 (1991).","journal-title":"Phys. Rev. Lett."},{"issue":"4","key":"25_CR6","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1145\/74074.74087","volume":"20","author":"C. H. Bennett","year":"1989","unstructured":"C. H. Bennett and G. Brassard, \u201cThe Dawn of a New Era for Quantum Cryptography: The Experimental Prototype is Working,\u201d SIGACT NEWS 20, no. 4, 78. (1989); C. H. Bennett et al., \u201cExperimental Quantum Cryptography,\u201d J. Crypto. 5, 3 (1992).","journal-title":"SIGACT NEWS"},{"key":"25_CR7","doi-asserted-by":"publisher","first-page":"3121","DOI":"10.1103\/PhysRevLett.68.3121","volume":"68","author":"C. H. Bennett","year":"1992","unstructured":"C. H. Bennett, \u201cQuantum Cryptography Using Any Two Non-Orthogonal States,\u201d Phys. Rev. Lett. 68, 3121 (1992).","journal-title":"Phys. Rev. Lett."},{"key":"25_CR8","doi-asserted-by":"publisher","first-page":"634","DOI":"10.1049\/el:19930424","volume":"29","author":"P. D. Townsend","year":"1994","unstructured":"P. D. Townsend, J. G. Rarity and P. Tapster, \u201cSingle Photon Interference in 10 km Long Optical Fiber Interferometer,\u201d Elec. Lett. 29, 634 (1994); P. D. Townsend, J. G. Rarity and P. Tapster, \u201cEnhanced Single Photon Fringe Visibility in a 10-km Long Prototype Quantum Cryptography Channel,\u201d Elec. Lett. 29, 1291 (1994); P. D. Townsend, \u201cSecure Key Distribution Based on Quantum Cryptography,\u201d Elec. Lett. 30, 809 (1994); C. Marand and P. D. Townsend, \u201cQuantum Key Distribution Over Distances as Long as 30 km,\u201d Opt Lett. 20, 1695 (1995).","journal-title":"Elec. Lett."},{"key":"25_CR9","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1209\/0295-5075\/23\/6\/001","volume":"23","author":"A. Muller","year":"1993","unstructured":"A. Muller et al., \u201cExperimental Demonstration of Quantum Cryptography Using Polarized Photons in Optical Fibre Over More Than 1 km,\u201d Europhys. Lett. 23, 383 (1993); A. Muller, H. Zbinden and N. Gisin, \u201cUnderwater Quantum Coding,\u201d Nature 378, 449 (1995); A. Muller et al., \u201cQuantum Cryptography Over 23 km in Installed Under-lake Telecom Fibre,\u201d Europhys. Lett. 33, 335 (1996).","journal-title":"Europhys. Lett."},{"key":"25_CR10","doi-asserted-by":"publisher","first-page":"2949","DOI":"10.1364\/AO.33.002949","volume":"33","author":"J. D. Franson","year":"1994","unstructured":"J. D. Franson and H. Ilves, \u201cQuantum Cryptography Using Optical Fibers,\u201d Appl. Optics 33, 2949 (1994).","journal-title":"Appl. Optics"},{"key":"25_CR11","doi-asserted-by":"crossref","unstructured":"R. J. Hughes et al., \u201cQuantum Cryptography Over 14 km of Installed Optical Fiber,\u201d Los Alamos report LA-UR-95-2836, invited paper to appear in Proceedings of \u201cSeventh Rochester Conference on Coherence and Quantum Optics,\u201d Rochester, NY, June 1995.","DOI":"10.1007\/978-1-4757-9742-8_15"},{"key":"25_CR12","doi-asserted-by":"publisher","first-page":"1915","DOI":"10.1109\/18.476316","volume":"41","author":"C. H. Bennett","year":"1995","unstructured":"C. H. Bennett et al., \u201cGeneralized Privacy Amplification,\u201d IEEE Trans. Inf. Theory 41, 1915 (1995).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"25_CR13","doi-asserted-by":"crossref","first-page":"6895","DOI":"10.1364\/AO.33.006895","volume":"33","author":"P. C. M. Owens","year":"1994","unstructured":"P. C. M. Owens et al., \u201cPhoton Counting Using Passively Quenched Germanium Avalanche Photodiodes,\u201d Appl. Optics 33, 6895 (1994); A. Lacaita et al., \u201cSingle-Photon Detection Beyond 1\u03bcm: Performance of Commercially Available Germanium Photodiodes,\u201d Appl. Optics 33, 6902 (1994).","journal-title":"Appl. Optics"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO \u201996"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-68697-5_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,4]],"date-time":"2019-05-04T04:27:53Z","timestamp":1556944073000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-68697-5_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1996]]},"ISBN":["9783540615125","9783540686972"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/3-540-68697-5_25","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[1996]]}}}