{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:28:26Z","timestamp":1750220906675,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,1,10]],"date-time":"2020-01-10T00:00:00Z","timestamp":1578614400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,1,10]]},"DOI":"10.1145\/3377644.3377671","type":"proceedings-article","created":{"date-parts":[[2020,2,26]],"date-time":"2020-02-26T08:16:17Z","timestamp":1582704977000},"page":"36-41","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Quantum Cryptography and Simulation"],"prefix":"10.1145","author":[{"given":"Shuangbao","family":"Wang","sequence":"first","affiliation":[{"name":"Morgan State University, Baltimore, Maryland"}]},{"given":"Matthew","family":"Rohde","sequence":"additional","affiliation":[{"name":"Columbus State University, Columbus, Georgia"}]},{"given":"Amjad","family":"Ali","sequence":"additional","affiliation":[{"name":"Thomas Edison University, Trenton, NJ"}]}],"member":"320","published-online":{"date-parts":[[2020,2,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1838002.1838046"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISIEA.2012.6496677"},{"key":"e_1_3_2_1_3_1","volume-title":"Retrieved","author":"Hilgevoord Jan","year":"2016","unstructured":"Jan Hilgevoord . 2016 . The Uncertainty Principle . Retrieved September 10, 2017 from https:\/\/plato.stanford.edu\/entries\/qt-uncertainty\/ Jan Hilgevoord. 2016. The Uncertainty Principle. Retrieved September 10, 2017 from https:\/\/plato.stanford.edu\/entries\/qt-uncertainty\/"},{"key":"e_1_3_2_1_4_1","volume-title":"Retrieved","author":"Bub Jeffrey","year":"2015","unstructured":"Jeffrey Bub . 2015 . Quantum Entanglement and Information . Retrieved September 10, 2017 from https:\/\/plato.stanford.edu\/entries\/qt-entangle\/ Jeffrey Bub. 2015. Quantum Entanglement and Information. Retrieved September 10, 2017 from https:\/\/plato.stanford.edu\/entries\/qt-entangle\/"},{"key":"e_1_3_2_1_5_1","first-page":"175","volume-title":"Proceedings of IEEE International Conference on Computers, Systems and Signal Processing","volume":"175","author":"Bennett C. H.","year":"2017","unstructured":"C. H. Bennett and G. Brassard . 1984. Quantum Cryptography: Public Key Distribution and Coin Tossing . In Proceedings of IEEE International Conference on Computers, Systems and Signal Processing , Volume 175 . Pages 175 -- 179 . Retrieved August 21, 2017 from http:\/\/researcher.watson.ibm.com\/researcher\/files\/us-bennetc\/BB84highest.pdf C. H. Bennett and G. Brassard. 1984. Quantum Cryptography: Public Key Distribution and Coin Tossing. In Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, Volume 175. Pages 175--179. Retrieved August 21, 2017 from http:\/\/researcher.watson.ibm.com\/researcher\/files\/us-bennetc\/BB84highest.pdf"},{"key":"e_1_3_2_1_6_1","volume-title":"Quantum Cryptography: A Survey. In ACM Comput. Surv. 39, 2, Article 6 (July","author":"Bruss Dagmar","year":"2007","unstructured":"Dagmar Bruss , G\u00e1bor Erd\u00e9lyi , Tim Meyer , 2007 . Quantum Cryptography: A Survey. In ACM Comput. Surv. 39, 2, Article 6 (July 2007). 27 pages. DOI=https:\/\/dx.doi.org\/10.1145\/1242471.1242474 10.1145\/1242471.1242474 Dagmar Bruss, G\u00e1bor Erd\u00e9lyi, Tim Meyer, et al. 2007. Quantum Cryptography: A Survey. In ACM Comput. Surv. 39, 2, Article 6 (July 2007). 27 pages. DOI=https:\/\/dx.doi.org\/10.1145\/1242471.1242474"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.67.661"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1167253.1167274"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ECONF.2015.33"},{"key":"e_1_3_2_1_10_1","volume-title":"MagiQ Research Labs. Retrieved","author":"Technologies Q","year":"2017","unstructured":"Magi Q Technologies . 2017. MagiQ Research Labs. Retrieved September 9, 2017 from http:\/\/www.magiqtech.com\/research-labs\/ MagiQ Technologies. 2017. MagiQ Research Labs. Retrieved September 9, 2017 from http:\/\/www.magiqtech.com\/research-labs\/"},{"key":"e_1_3_2_1_11_1","unstructured":"IDQ. 2017. Quantum-Safe Crypto. Retrieved September 9 2017 from http:\/\/www.idquantique.com\/quantum-safe-crypto\/  IDQ. 2017. Quantum-Safe Crypto. Retrieved September 9 2017 from http:\/\/www.idquantique.com\/quantum-safe-crypto\/"},{"key":"e_1_3_2_1_12_1","volume-title":"Single-Photon Systems. Retrieved","author":"IDQ.","year":"2017","unstructured":"IDQ. 2017. Single-Photon Systems. Retrieved September 9, 2017 from http:\/\/www.idquantique.com\/photon-counting\/ IDQ. 2017. Single-Photon Systems. Retrieved September 9, 2017 from http:\/\/www.idquantique.com\/photon-counting\/"},{"key":"e_1_3_2_1_13_1","volume-title":"Random Number Generation. Retrieved","author":"IDQ.","year":"2017","unstructured":"IDQ. 2017. Random Number Generation. Retrieved September 9, 2017 from http:\/\/www.idquantique.com\/random-number-generation\/ IDQ. 2017. Random Number Generation. Retrieved September 9, 2017 from http:\/\/www.idquantique.com\/random-number-generation\/"},{"key":"e_1_3_2_1_14_1","volume-title":"Retrieved","author":"Marks Paul","year":"2007","unstructured":"Paul Marks . 2007 . Quantum Cryptography to Protect Swiss Election . Retrieved September 12, 2017 from https:\/\/www.newscientist.com\/article\/dn12786-quantum-cryptography-to-protect-swiss-election\/ Paul Marks. 2007. Quantum Cryptography to Protect Swiss Election. Retrieved September 12, 2017 from https:\/\/www.newscientist.com\/article\/dn12786-quantum-cryptography-to-protect-swiss-election\/"},{"key":"e_1_3_2_1_15_1","volume-title":"Retrieved","author":"Quantum Swiss","year":"2010","unstructured":"Swiss Quantum . 2010 . Quantum Encryption to Secure World Cup Link . Retrieved September 12, 2017 from http:\/\/swissquantum.idquantique.com\/?Quantum-encryption-to-secure-World Swiss Quantum. 2010. Quantum Encryption to Secure World Cup Link. Retrieved September 12, 2017 from http:\/\/swissquantum.idquantique.com\/?Quantum-encryption-to-secure-World"},{"volume-title":"Retrieved","year":"2017","key":"e_1_3_2_1_16_1","unstructured":"QuintessenceLabs. 2017 . Quantum Cybersecurity . Retrieved September 12, 2017 from https:\/\/www.quintessencelabs.com\/quantum-cybersecurity\/ QuintessenceLabs. 2017. Quantum Cybersecurity. Retrieved September 12, 2017 from https:\/\/www.quintessencelabs.com\/quantum-cybersecurity\/"},{"volume-title":"Retrieved","year":"2017","key":"e_1_3_2_1_17_1","unstructured":"QuintessenceLabs. 2017 . Quantum Cybersecurity - Ultimate Data Protection . Retrieved September 12, 2017 from https:\/\/www.quintessencelabs.com\/products\/#clientSDK QuintessenceLabs. 2017. Quantum Cybersecurity - Ultimate Data Protection. Retrieved September 12, 2017 from https:\/\/www.quintessencelabs.com\/products\/#clientSDK"},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings","volume":"5815","author":"Elliott Chip","year":"2005","unstructured":"Chip Elliott , Alexander Colvin , David Pearson , 2005 . Current Status of the DARPA Quantum Network . In Proceedings Volume 5815 , Quantum Information and Computation 30, 12 pages. DOI: https:\/\/dx.doi.org\/10.1117\/12.606489 10.1117\/12.606489 Chip Elliott, Alexander Colvin, David Pearson, et al. 2005. Current Status of the DARPA Quantum Network. In Proceedings Volume 5815, Quantum Information and Computation 30, 12 pages. DOI: https:\/\/dx.doi.org\/10.1117\/12.606489"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1038\/nature23655"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1038\/nature23675"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2093698.2093884"},{"key":"e_1_3_2_1_22_1","volume-title":"Inc. Retrieved","author":"Product Overview OptSim","year":"2017","unstructured":"OptSim Product Overview . 2017 . Synopsys , Inc. Retrieved September 20, 2017 from https:\/\/www.synopsys.com\/optical-solutions\/rsoft\/system-network-optsim.html OptSim Product Overview. 2017. Synopsys, Inc. Retrieved September 20, 2017 from https:\/\/www.synopsys.com\/optical-solutions\/rsoft\/system-network-optsim.html"},{"key":"#cr-split#-e_1_3_2_1_23_1.1","doi-asserted-by":"crossref","unstructured":"B. Archana and S. Krithika. 2015. Implementation of BB84 Quantum Key Distribution using OptSim. In 2015-2nd International Conference on Electronics and Communication Systems. Pages 457--460. DOI: https:\/\/dx.doi.org\/10.1109\/ECS.2015.7124946 10.1109\/ECS.2015.7124946","DOI":"10.1109\/ECS.2015.7124946"},{"key":"#cr-split#-e_1_3_2_1_23_1.2","doi-asserted-by":"crossref","unstructured":"B. Archana and S. Krithika. 2015. Implementation of BB84 Quantum Key Distribution using OptSim. In 2015-2nd International Conference on Electronics and Communication Systems. Pages 457--460. DOI: https:\/\/dx.doi.org\/10.1109\/ECS.2015.7124946","DOI":"10.1109\/ECS.2015.7124946"},{"volume-title":"Retrieved","year":"2017","key":"e_1_3_2_1_24_1","unstructured":"OptiSystem. 2017 . Optiwave Systems Inc . Retrieved September 20, 2017 from https:\/\/optiwave.com\/category\/products\/system-and-amplifier-design\/optisystem\/ OptiSystem. 2017. Optiwave Systems Inc. Retrieved September 20, 2017 from https:\/\/optiwave.com\/category\/products\/system-and-amplifier-design\/optisystem\/"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISIEA.2012.6496677"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2179298.2179363"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAT.2013.62"}],"event":{"name":"ICCSP 2020: 2020 4th International Conference on Cryptography, Security and Privacy","sponsor":["NJU Nanjing University"],"location":"Nanjing China","acronym":"ICCSP 2020"},"container-title":["Proceedings of the 2020 4th International Conference on Cryptography, Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3377644.3377671","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3377644.3377671","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:53Z","timestamp":1750203893000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3377644.3377671"}},"subtitle":["Tools and Techniques"],"short-title":[],"issued":{"date-parts":[[2020,1,10]]},"references-count":28,"alternative-id":["10.1145\/3377644.3377671","10.1145\/3377644"],"URL":"https:\/\/doi.org\/10.1145\/3377644.3377671","relation":{},"subject":[],"published":{"date-parts":[[2020,1,10]]},"assertion":[{"value":"2020-02-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}