{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T21:57:36Z","timestamp":1649109456186},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2008,6,1]],"date-time":"2008-06-01T00:00:00Z","timestamp":1212278400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["DuD"],"published-print":{"date-parts":[[2008,6]]},"DOI":"10.1007\/s11623-008-0095-7","type":"journal-article","created":{"date-parts":[[2008,11,12]],"date-time":"2008-11-12T07:39:27Z","timestamp":1226475567000},"page":"396-399","source":"Crossref","is-referenced-by-count":0,"title":["Quantenphysik und die Zukunft der Kryptographie"],"prefix":"10.1007","volume":"32","author":[{"given":"Per","family":"Kaijser","sequence":"first","affiliation":[]},{"given":"Wernhard","family":"Markwitz","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2008,11,13]]},"reference":[{"key":"95_CR1","doi-asserted-by":"crossref","unstructured":"Kaijser, P.: Three Quantum Leaps in the Development of Information Security, AIP Conference Proceedings 963, Volume 2, Part A, p 197\u2013199. Proceedings of the International Conference on Computational Methods in Science and Engineering 2007 (ICCMSE), Corfu, Greece 25\u201330 September 2007.","DOI":"10.1063\/1.2836038"},{"key":"95_CR2","unstructured":"Singh, S.: Geheime Botschaften, dtv M\u00fcnchen (2001)"},{"key":"95_CR3","volume-title":"Die Geheimschriften und die Dechiffrierkunst","author":"F.W. Kasiski","year":"1863","unstructured":"Kasiski, F.W.: Die Geheimschriften und die Dechiffrierkunst, E.S. Mittler&Sohn, Berlin (1863)"},{"key":"95_CR4","first-page":"295","volume":"45","author":"G.S. Vernam","year":"1926","unstructured":"Vernam, G.S.: Cipher Printing Telegraph Systems for Secret Wire and Radio Telegraphic Communications, Trans. of AIEE 45 (1926), 295\u2013301","journal-title":"Trans. of AIEE"},{"key":"95_CR5","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"C.E. Shannon","year":"1949","unstructured":"Shannon, C.E.: Communication Theory of Secrecy Systems, Bell Systems Technical Journal 28 (1949) 656\u2013715","journal-title":"Bell Systems Technical Journal"},{"key":"95_CR6","unstructured":"Leiberich, O.: Von diplomatischen Code zur Fallt\u00fcrfunktion, Spektrum der Wissenschaft (Juni 1999) 26\u201334"},{"key":"95_CR7","doi-asserted-by":"crossref","unstructured":"Diffie, W.; Hellman, M.E.: New Directions in Cryptography, IEEE Transactions on Information Theory (1976) 644\u2013654","DOI":"10.1109\/TIT.1976.1055638"},{"key":"95_CR8","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"Rivest, R.L.; Shamir, A.: Adelman, L.: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, Communications of the ACM 21 (1978) 120\u2013126","journal-title":"Communications of the ACM"},{"key":"95_CR9","unstructured":"Bennett, C.H.; Brassard, G.: in Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, (New York, 1984), 175\u2013179"},{"key":"95_CR10","unstructured":"Bennett, C.H.; Brassard, G.; Ekert, A.K.: Quanten-Kryptographie, Spektrum der Wissenschaft (Dezember 1992) 96\u2013104"},{"key":"95_CR11","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1103\/PhysRevLett.98.010504","volume":"98","author":"T. Schmitt-Manderbach","year":"2007","unstructured":"Schmitt-Manderbach, T. et al; and Weinfurter, H.: Experimental Demonstration of Free-Space-State Quantum Key Distribution over 144 km, Phys. Rev. Lett. 98, 010504 (2007), 1\u20134","journal-title":"Phys. Rev. Lett."},{"key":"95_CR12","doi-asserted-by":"crossref","first-page":"343","DOI":"10.1038\/nphoton.2007.75","volume":"1","author":"H. Takesue","year":"2007","unstructured":"Takesue, H. et al: Quantum key distribution over 40dB channel loss using superconducting single photon detectors, Nature Photonics 1 (2007), 343\u2013348","journal-title":"Nature Photonics"},{"key":"95_CR13","doi-asserted-by":"crossref","unstructured":"Shor, P.W.: Algorithms for quantum computation: Discrete logarithms and factoring, IEEE Symposium on Foundations of Computer Science (1994) 124\u2013134","DOI":"10.1109\/SFCS.1994.365700"},{"key":"95_CR14","doi-asserted-by":"crossref","unstructured":"Grover, L.K.: A fast quantum mechanical algorithm for database search, Proceedings, 28th Annual ACM Symposium on the Theory of Computing, (May 1996) 212","DOI":"10.1145\/237814.237866"},{"key":"95_CR15","doi-asserted-by":"crossref","first-page":"1484","DOI":"10.1137\/S0097539795293172","volume":"26","author":"P. W. Shor","year":"1997","unstructured":"Shor, P. W.: Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer, SIAM J.Sci.Statist. Comput. 26 (1997) 1484","journal-title":"SIAM J.Sci.Statist. Comput."},{"key":"95_CR16","unstructured":"McAnally, D.: A Refinement of Shor\u2019s Algorithm, arXiv:quant-ph\/0112055v4"},{"key":"95_CR17","doi-asserted-by":"crossref","first-page":"883","DOI":"10.1038\/414883a","volume":"414","author":"M.K. Lieven","year":"2001","unstructured":"Lieven, M.K. et al: Experimental realization of Shor\u2019s quantum factoring algorithm using nuclear magnetic resonance, Nature 414, 883\u2013887 (20 December 2001)","journal-title":"Nature"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-008-0095-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-008-0095-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-008-0095-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T18:20:50Z","timestamp":1559413250000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-008-0095-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,6]]},"references-count":17,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2008,6]]}},"alternative-id":["95"],"URL":"https:\/\/doi.org\/10.1007\/s11623-008-0095-7","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,6]]}}}