{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T16:40:07Z","timestamp":1744216807283,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":30,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642338595"},{"type":"electronic","value":"9783642338601"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33860-1_9","type":"book-chapter","created":{"date-parts":[[2012,9,26]],"date-time":"2012-09-26T22:44:30Z","timestamp":1348699470000},"page":"97-107","source":"Crossref","is-referenced-by-count":2,"title":["Attacks on Fixed Apparatus Quantum Key Distribution Schemes"],"prefix":"10.1007","author":[{"given":"Michel","family":"Boyer","sequence":"first","affiliation":[]},{"given":"Ran","family":"Gelles","sequence":"additional","affiliation":[]},{"given":"Tal","family":"Mor","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"9_CR1","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1088\/1367-2630\/6\/1\/092","volume":"6","author":"R. All\u00e9aume","year":"2004","unstructured":"All\u00e9aume, R., Treussart, F., Messin, G., Dumeige, Y., Roch, J.F., Beveratos, A., Brouri-Tualle, R., Poizat, J.P., Grangier, P.: Experimental open-air quantum key distribution with a single-photon source. New Journal of Physics\u00a06(1), 92 (2004)","journal-title":"New Journal of Physics"},{"issue":"21","key":"9_CR2","doi-asserted-by":"publisher","first-page":"3121","DOI":"10.1103\/PhysRevLett.68.3121","volume":"68","author":"C.H. Bennett","year":"1992","unstructured":"Bennett, C.H.: Quantum cryptography using any two nonorthogonal states. Physical Review Letters\u00a068(21), 3121\u20133124 (1992)","journal-title":"Physical Review Letters"},{"key":"9_CR3","unstructured":"Bennett, C.H., Brassard, G.: Quantum Cryptography: Public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, pp. 175\u2013179 (December 1984)"},{"issue":"14","key":"9_CR4","doi-asserted-by":"publisher","first-page":"140501","DOI":"10.1103\/PhysRevLett.99.140501","volume":"99","author":"M. Boyer","year":"2007","unstructured":"Boyer, M., Kenigsberg, D., Mor, T.: Quantum Key Distribution with Classical Bob. Physical Review Letters\u00a099(14), 140501 (2007)","journal-title":"Physical Review Letters"},{"issue":"3","key":"9_CR5","doi-asserted-by":"publisher","first-page":"32341","DOI":"10.1103\/PhysRevA.79.032341","volume":"79","author":"M. Boyer","year":"2009","unstructured":"Boyer, M., Gelles, R., Kenigsberg, D., Mor, T.: Semiquantum key distribution. Phys. Rev. A\u00a079(3), 032341 (2009)","journal-title":"Phys. Rev. A"},{"issue":"6","key":"9_CR6","doi-asserted-by":"publisher","first-page":"1330","DOI":"10.1103\/PhysRevLett.85.1330","volume":"85","author":"G. Brassard","year":"2000","unstructured":"Brassard, G., L\u00fctkenhaus, N., Mor, T., Sanders, B.C.: Limitations on practical quantum cryptography. Physical Review Letters\u00a085(6), 1330\u20131333 (2000)","journal-title":"Physical Review Letters"},{"key":"9_CR7","doi-asserted-by":"publisher","first-page":"3018","DOI":"10.1103\/PhysRevLett.81.3018","volume":"81","author":"D. Bru\u00df","year":"1998","unstructured":"Bru\u00df, D.: Optimal Eavesdropping in Quantum Cryptography with Six States. Physical Review Letters\u00a081, 3018\u20133021 (1998)","journal-title":"Physical Review Letters"},{"key":"9_CR8","doi-asserted-by":"publisher","first-page":"3283","DOI":"10.1103\/PhysRevLett.81.3283","volume":"81","author":"W.T. Buttler","year":"1998","unstructured":"Buttler, W.T., Hughes, R.J., Kwiat, P.G., Lamoreaux, S.K., Luther, G.G., Morgan, G.L., Nordholt, J.E., Peterson, C.G., Simmons, C.M.: Practical free-space quantum key distribution over 1 km. Phys. Rev. Lett.\u00a081, 3283\u20133286 (1998)","journal-title":"Phys. Rev. Lett."},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Dusek, M., L\u00fctkenhaus, N., Hendrych, M.: Chapter 5 quantum cryptography. In: Wolf, E. (ed.) Progress in Optics, vol.\u00a049, pp. 381\u2013454. Elsevier (2006)","DOI":"10.1016\/S0079-6638(06)49005-3"},{"key":"9_CR10","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1145\/863955.863982","volume-title":"SIGCOMM 2003: Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications","author":"C. Elliott","year":"2003","unstructured":"Elliott, C., Pearson, D., Troxel, G.: Quantum cryptography in practice. In: SIGCOMM 2003: Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, pp. 227\u2013238. ACM Press, New York (2003)"},{"key":"9_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1007\/978-3-642-33860-1_12","volume-title":"Proceedings of the 1st International Conference on Theory and Practice of Natural Computing","author":"R. Gelles","year":"2012","unstructured":"Gelles, R., Mor, T.: On the Security of Interferometric Quantum Key Distribution. In: Dediu, A.-H., Mart\u00edn-Vide, C., Truthe, B. (eds.) TPNC 2012. LNCS, vol.\u00a07505, pp. 133\u2013146. Springer, Heidelberg (2012)"},{"issue":"1","key":"9_CR12","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1103\/RevModPhys.74.145","volume":"74","author":"N. Gisin","year":"2002","unstructured":"Gisin, N., Ribordy, G., Tittel, W., Zbinden, H.: Quantum cryptography. Reviews of Modern Physics\u00a074(1), 145\u2013195 (2002)","journal-title":"Reviews of Modern Physics"},{"key":"9_CR13","doi-asserted-by":"crossref","first-page":"325","DOI":"10.26421\/QIC4.5-1","volume":"5","author":"D. Gottesman","year":"2004","unstructured":"Gottesman, D., Lo, H.K., L\u00fctkenhaus, N., Preskill, J.: Security of quantum key distribution with imperfect devices. Quantum Information and Computation\u00a05, 325\u2013360 (2004), arXiv:quant-ph\/0212066","journal-title":"Quantum Information and Computation"},{"issue":"2-3","key":"9_CR14","first-page":"533","volume":"47","author":"R.J. Hughes","year":"2000","unstructured":"Hughes, R.J., Morgan, G.L., Peterson, C.G.: Quantum key distribution over a 48 km optical fibre network. Journal of Modern Optics\u00a047(2-3), 533\u2013547 (2000)","journal-title":"Journal of Modern Optics"},{"issue":"1","key":"9_CR15","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1088\/1367-2630\/4\/1\/343","volume":"4","author":"R.J. Hughes","year":"2002","unstructured":"Hughes, R.J., Nordholt, J.E., Derkacs, D., Peterson, C.G.: Practical free-space quantum key distribution over 10 km in daylight and at night. New Journal of Physics\u00a04(1), 43 (2002)","journal-title":"New Journal of Physics"},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"Hughes, R., Nordholt, J., Morgan, G., Peterson, C.: Free space quantum key distribution in daylight. Summaries of Papers Presented at the Quantum Electronics and Laser Science Conference, QELS 2002. Technical Digest, p. 266 (2002)","DOI":"10.1109\/QELS.2002.1031406"},{"key":"9_CR17","unstructured":"Hwang, W.Y., Lim, I.T., Park, J.W.: No-clicking event in quantum key distribution. ArXiv:quant-ph\/0412206 (2004)"},{"key":"9_CR18","doi-asserted-by":"crossref","unstructured":"Jaeger, G., Sergienko, A.: Entangled states in quantum key distribution. In: AIP Conference Proceedings, vol.\u00a0810(1), pp. 161\u2013167 (2006)","DOI":"10.1063\/1.2158719"},{"key":"9_CR19","doi-asserted-by":"crossref","unstructured":"Kurtsiefer, C., Zarda, P., Halder, M., Weinfurter, H., Gorman, P.M., Tapster, P.R., Rarity, J.G.: Quantum cryptography: A step towards global key distribution. Nature\u00a0419 (2002)","DOI":"10.1038\/419450a"},{"key":"9_CR20","doi-asserted-by":"publisher","first-page":"691","DOI":"10.1080\/09500340410001730986","volume":"52","author":"V. Makarov","year":"2005","unstructured":"Makarov, V., Hjelme, D.R.: Faked states attack on quantum cryptosystems. Journal of Modern Optics\u00a052, 691\u2013705 (2005)","journal-title":"Journal of Modern Optics"},{"issue":"6","key":"9_CR21","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1209\/0295-5075\/23\/6\/001","volume":"23","author":"A. Muller","year":"1993","unstructured":"Muller, A., Breguet, J., Gisin, N.: Experimental demonstration of quantum cryptography using polarized photons in optical fibre over more than 1 km. EPL (Europhysics Letters)\u00a023(6), 383 (1993)","journal-title":"EPL (Europhysics Letters)"},{"issue":"5","key":"9_CR22","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1209\/epl\/i1996-00343-4","volume":"33","author":"A. Muller","year":"1996","unstructured":"Muller, A., Zbinden, H., Gisin, N.: Quantum cryptography over 23 km in installed under-lake telecom fibre. EPL (Europhysics Letters)\u00a033(5), 335 (1996)","journal-title":"EPL (Europhysics Letters)"},{"key":"9_CR23","unstructured":"Nambu, Y., Hatanaka, T., Nakamura, K.: Planar lightwave circuits for quantum cryptographic systems. ArXiv:quant-ph\/0307074 (2003)"},{"issue":"8B","key":"9_CR24","doi-asserted-by":"publisher","first-page":"1109","DOI":"10.1143\/JJAP.43.L1109","volume":"43","author":"Y. Nambu","year":"2004","unstructured":"Nambu, Y., Hatanaka, T., Nakamura, K.: Bb84 quantum key distribution system based on silica-based planar lightwave circuits. Japanese Journal of Applied Physics\u00a043(8B), L1109\u2013L1110 (2004)","journal-title":"Japanese Journal of Applied Physics"},{"key":"9_CR25","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1088\/1367-2630\/4\/1\/382","volume":"4","author":"J. Rarity","year":"2002","unstructured":"Rarity, J., Tapster, P., Gorman, P., Knight, P.: Ground to satellite secure key exchange using quantum cryptography. New Journal of Physics\u00a04, 82 (2002)","journal-title":"New Journal of Physics"},{"key":"9_CR26","doi-asserted-by":"publisher","first-page":"809","DOI":"10.1049\/el:19940558","volume":"30","author":"P.D. Townsend","year":"1994","unstructured":"Townsend, P.D.: Secure key distribution system based on quantum cryptography. Electronics Letters\u00a030, 809\u2013811 (1994)","journal-title":"Electronics Letters"},{"issue":"8","key":"9_CR27","doi-asserted-by":"publisher","first-page":"87901","DOI":"10.1103\/PhysRevLett.91.087901","volume":"91","author":"Z.D. Walton","year":"2003","unstructured":"Walton, Z.D., Abouraddy, A.F., Sergienko, A.V., Saleh, B.E.A., Teich, M.C.: Decoherence-free subspaces in quantum key distribution. Phys. Rev. Lett.\u00a091(8), 087901 (2003)","journal-title":"Phys. Rev. Lett."},{"key":"9_CR28","doi-asserted-by":"crossref","unstructured":"Zbinden, H.: Experimental quantum cryptography. In: Lo, H., Spiller, T., Popescu, S. (eds.) Introduction to Quantum Computation and Information, pp. 120\u2013142. World Scientific (1998)","DOI":"10.1142\/9789812385253_0005"},{"key":"9_CR29","doi-asserted-by":"publisher","first-page":"743","DOI":"10.1007\/s003400050574","volume":"67","author":"H. Zbinden","year":"1998","unstructured":"Zbinden, H., Bechmann-Pasquinucci, H., Gisin, N., Ribordy, G.: Quantum cryptography. Applied Physics B: Lasers and Optics\u00a067, 743\u2013748 (1998)","journal-title":"Applied Physics B: Lasers and Optics"},{"issue":"5","key":"9_CR30","doi-asserted-by":"publisher","first-page":"52312","DOI":"10.1103\/PhysRevA.79.052312","volume":"79","author":"X. Zou","year":"2009","unstructured":"Zou, X., Qiu, D., Li, L., Wu, L., Li, L.: Semiquantum-key distribution using less than four quantum states. Phys. Rev. A\u00a079(5), 052312 (2009)","journal-title":"Phys. Rev. A"}],"container-title":["Lecture Notes in Computer Science","Theory and Practice of Natural Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33860-1_9.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T16:01:36Z","timestamp":1744214496000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33860-1_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642338595","9783642338601"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33860-1_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}