{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,24]],"date-time":"2025-04-24T04:09:24Z","timestamp":1745467764737,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642349300"},{"type":"electronic","value":"9783642349317"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34931-7_6","type":"book-chapter","created":{"date-parts":[[2012,12,5]],"date-time":"2012-12-05T22:24:04Z","timestamp":1354746244000},"page":"80-99","source":"Crossref","is-referenced-by-count":0,"title":["Another Look at Symmetric Incoherent Optimal Eavesdropping against BB84"],"prefix":"10.1007","author":[{"given":"Arpita","family":"Maitra","sequence":"first","affiliation":[]},{"given":"Goutam","family":"Paul","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","first-page":"175","volume-title":"Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing","author":"C.H. Bennett","year":"1984","unstructured":"Bennett, C.H., Brassard, G.: Quantum Cryptography: Public key distribution and coin tossing. In: Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, India, pp. 175\u2013179. IEEE, New York (1984)"},{"issue":"2","key":"6_CR2","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1137\/0217014","volume":"17","author":"C.H. Bennett","year":"1988","unstructured":"Bennett, C.H., Brassard, G., Robert, J.M.: Privacy amplification by public discussion. SIAM Journal on Computing\u00a017(2), 210\u2013229 (1988)","journal-title":"SIAM Journal on Computing"},{"issue":"1","key":"6_CR3","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00191318","volume":"5","author":"C.H. Bennett","year":"1992","unstructured":"Bennett, C.H., Bessette, F., Brassard, G., Salvail, L., Smolin, J.: Experimental quantum cryptography. Journal of Cryptology\u00a05(1), 3\u201328 (1992)","journal-title":"Journal of Cryptology"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Bernstein, D.J., Buchmann, J., Dahmen, E. (eds.): Post-Quantum Cryptography. Springer (2009)","DOI":"10.1007\/978-3-540-88702-7"},{"key":"6_CR5","doi-asserted-by":"publisher","first-page":"4034","DOI":"10.1103\/PhysRevLett.79.4034","volume":"79","author":"E. Biham","year":"1997","unstructured":"Biham, E., Mor, T.: Bounds on Information and the Security of Quantum Cryptography. Phys. Rev. Lett.\u00a079, 4034\u20134037 (1997)","journal-title":"Phys. Rev. Lett."},{"key":"6_CR6","doi-asserted-by":"publisher","first-page":"3018","DOI":"10.1103\/PhysRevLett.81.3018","volume":"81","author":"D. Bru\u00df","year":"1998","unstructured":"Bru\u00df, D.: Optimal eavesdropping in quantum cryptography with six states. Physical Review Letters\u00a081, 3018\u20133021 (1998) (quant-ph\/9805019)","journal-title":"Physical Review Letters"},{"issue":"1","key":"6_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/S0375-9601(97)00176-X","volume":"229","author":"J.I. Cirac","year":"1997","unstructured":"Cirac, J.I., Gisin, N.: Coherent eavesdropping strategies for the 4 state quantum cryptography protocol. Physics Letters A\u00a0229(1), 1\u20137 (1997) (quant-ph\/9702002)","journal-title":"Physics Letters A"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Cover, T., Thomas, J.: Elements of Information Theory, 1st edn., pp. 16\u201320. John Wiley & Sons, Inc. (1991)","DOI":"10.1002\/0471200611"},{"key":"6_CR9","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.E.: New Directions in Cryptography. IEEE Transactions on Information Theory\u00a022, 644\u2013654 (1976)","journal-title":"IEEE Transactions on Information Theory"},{"issue":"2","key":"6_CR10","doi-asserted-by":"publisher","first-page":"1163","DOI":"10.1103\/PhysRevA.56.1163","volume":"56","author":"C.A. Fuchs","year":"1997","unstructured":"Fuchs, C.A., Gisin, N., Griffiths, R.B., Niu, C.S., Peres, A.: Optimal eavesdropping in quantum cryptography. I. Information bound and optimal strategy. Physical Review A\u00a056(2), 1163\u20131172 (1997)","journal-title":"Physical Review A"},{"key":"6_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1007\/3-540-39799-X_31","volume-title":"Advances in Cryptology","author":"V.S. Miller","year":"1986","unstructured":"Miller, V.S.: Use of Elliptic Curves in Cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol.\u00a0218, pp. 417\u2013426. Springer, Heidelberg (1986)"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Nielsen, M.A., Chuang, I.L.: Quantum Computation and Quantum Information. Cambridge University Press (2002)","DOI":"10.1119\/1.1463744"},{"issue":"1","key":"6_CR13","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1103\/PhysRevA.48.96","volume":"48","author":"S.J.D. Phoenix","year":"1993","unstructured":"Phoenix, S.J.D.: Quantum cryptography without conjugate coding. Physical Review A\u00a048(1), 96\u2013102 (1993)","journal-title":"Physical Review A"},{"key":"6_CR14","unstructured":"Quantum Key Distribution Equipment. ID Quantique (IDQ), http:\/\/www.idquantique.com\/"},{"key":"6_CR15","unstructured":"Quantum Key Distribution System (Q-Box). MagiQ Technologies Inc., http:\/\/www.magiqtech.com"},{"key":"6_CR16","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.: A Method for Obtaining Digital Signatures and Public Key Cryptosystems. Communications of the ACM\u00a021, 120\u2013126 (1978)","journal-title":"Communications of the ACM"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Shor, P.: Algorithms for Quantum Computation: Discrete Logarithms and Factoring. In: Foundations of Computer Science (FOCS), pp. 124\u2013134. IEEE Computer Society Press (1994)","DOI":"10.1109\/SFCS.1994.365700"},{"key":"6_CR18","doi-asserted-by":"crossref","unstructured":"Stinson, D.: Cryptography Theory and Practice, 3rd edn., pp. 80\u201381. Chapman & Hall \/ CRC (2005)","DOI":"10.1201\/9781420057133"},{"key":"#cr-split#-6_CR19.1","unstructured":"Wiesner, S.: Conjugate Coding (1970) (manuscript)"},{"key":"#cr-split#-6_CR19.2","doi-asserted-by":"crossref","unstructured":"subsequently published in SIGACT News 15(1), 78-88 (1983)","DOI":"10.1145\/1008908.1008920"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology - INDOCRYPT 2012"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34931-7_6.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T09:23:52Z","timestamp":1745400232000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34931-7_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642349300","9783642349317"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34931-7_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}