Quantum mechanics has profoundly revolutionized the field of physics and our understanding of nature. Many effects predicted by quantum mechanics and with no classical analogue such as wave-particle duality, the coherent superposition of quantum states, the uncertainty principle, entanglement, and non-locality, are in deep contrast with our general common sense and yet they survived to any experimental verification. Interestingly, when these peculiar quantum effects are studied within the framework of Information Theory, they provide advantages for tasks such as computation, communication, and cryptography. This thesis work studies how quantum resources can be exploited to develop and implement practical protocols for secure communication ...
Quantum computing, first introduced in the early 70's, has taken on new life with the developme...
of any of the information contained in it must acknowledge this thesis as the source of the quotatio...
International audienceIn this work we present a security analysis for quantum key distribution, esta...
Quantum technologies are today a reality, and they have been applied to different subjects, such as ...
Cryptography is the science of securing information by transforming it into a form that cannot be ea...
Measurements on entangled quantum systems necessarily yield outcomes that are intrinsically unpredic...
Quantum cryptography exploits principles of quantum physics for the secure processing of information...
Quantum cryptography is arguably the fastest growing area in quantum information science. Novel theo...
Quantum information theory is a modern branch of theoretical physics. One of its main goals is to in...
The peculiar properties of quantum mechanics enable possibilities not allowed by classical physics. ...
Quantum cryptography is based on quantum mechanics to guarantee secure communication. It allows two ...
Quantum communication provides several examples of communication protocols which cannot be imple-men...
The thesis starts with a high-level introduction into cryptography and quantum mechanics. Chapter 2 ...
Quantum cryptography is arguably the fastest growing area in quantum information science. Novel theo...
In usual security proofs of quantum protocols the adversary (Eve) is expected to have full control o...
Quantum computing, first introduced in the early 70's, has taken on new life with the developme...
of any of the information contained in it must acknowledge this thesis as the source of the quotatio...
International audienceIn this work we present a security analysis for quantum key distribution, esta...
Quantum technologies are today a reality, and they have been applied to different subjects, such as ...
Cryptography is the science of securing information by transforming it into a form that cannot be ea...
Measurements on entangled quantum systems necessarily yield outcomes that are intrinsically unpredic...
Quantum cryptography exploits principles of quantum physics for the secure processing of information...
Quantum cryptography is arguably the fastest growing area in quantum information science. Novel theo...
Quantum information theory is a modern branch of theoretical physics. One of its main goals is to in...
The peculiar properties of quantum mechanics enable possibilities not allowed by classical physics. ...
Quantum cryptography is based on quantum mechanics to guarantee secure communication. It allows two ...
Quantum communication provides several examples of communication protocols which cannot be imple-men...
The thesis starts with a high-level introduction into cryptography and quantum mechanics. Chapter 2 ...
Quantum cryptography is arguably the fastest growing area in quantum information science. Novel theo...
In usual security proofs of quantum protocols the adversary (Eve) is expected to have full control o...
Quantum computing, first introduced in the early 70's, has taken on new life with the developme...
of any of the information contained in it must acknowledge this thesis as the source of the quotatio...
International audienceIn this work we present a security analysis for quantum key distribution, esta...