Academic literature on the topic 'Distribution quantique de clefs'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Distribution quantique de clefs.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Distribution quantique de clefs"
Diamanti, Eleni. "Progrés et défis pour la cryptographie quantique." Photoniques, no. 91 (May 2018): 33–37. http://dx.doi.org/10.1051/photon/20189133.
Full textBoucher, W., and T. Debuisschert. "Démonstration expérimentale d'une distribution quantique de clé par codage temporel." Journal de Physique IV (Proceedings) 135, no. 1 (October 2006): 147–48. http://dx.doi.org/10.1051/jp4:2006135034.
Full textKLOPP, FRÉDÉRIC. "PRECISE HIGH ENERGY ASYMPTOTICS FOR THE INTEGRATED DENSITY OF STATES OF AN UNBOUNDED RANDOM JACOBI MATRIX." Reviews in Mathematical Physics 12, no. 04 (April 2000): 575–620. http://dx.doi.org/10.1142/s0129055x00000198.
Full textFréché, Jean-Pierre. "Des probabilités négatives ?" Revue des questions scientifiques 193, no. 1-2 (January 1, 2022): 49–68. http://dx.doi.org/10.14428/qs.v193i1-2.70203.
Full textBarrientos Marín, Jorge Hugo. "Calidad de la educación pública y logro académico en Medellín, 2004-2006. Una aproximación por regresión intercuartil." Lecturas de Economía, no. 68 (November 11, 2008): 121–44. http://dx.doi.org/10.17533/udea.le.n68a267.
Full textMeijers, Ints. "Challenges and Solutions for Secure Key Management and Monitoring: Review of the Cerberis3 Quantum Key Distribution System." Quantum Reports 6, no. 3 (August 13, 2024): 426–35. http://dx.doi.org/10.3390/quantum6030027.
Full textGUILLEMIN, Patrick René. "Distribution quantique de clés cryptographiques DQC." Sécurité des systèmes d'information, April 2015. http://dx.doi.org/10.51257/a-v1-h5214.
Full textGUILLEMIN, Patrick René. "Distribution quantique de clés cryptographiques DQC (QKD)." Sécurité des systèmes d'information, November 2023. http://dx.doi.org/10.51257/a-v2-h5214.
Full textBAMELA, Hyacinthe ATANGANA. "NORTHERN CAMEROONIAN ROAD EXCHANGE CORRIDORS AND STRUCTURING OF CROSSED TERRITORIES." Bulletin de la Société Géographique de Liège, 2024, 169–84. http://dx.doi.org/10.25518/0770-7576.7314.
Full textDissertations / Theses on the topic "Distribution quantique de clefs"
Denys, Aurélie. "Quantum key distribution and quantum error correction with bosonic systems." Electronic Thesis or Diss., Sorbonne université, 2024. http://www.theses.fr/2024SORUS152.
Full textThis thesis concerns the theoretical study of quantum key distribution and quantum error correction implemented with bosonic systems. The former is referred to as continuous-variable quantum key distribution while the latter is called bosonic error correction. In the first chapter, an analytical bound on the asymptotic secret key rate of continuous-variable quantum key distribution protocols is derived. This quantity broadly quantifies the security of a protocol. This is a significant contribution as it helps to compare the security of different instances of a protocol and to make an informed choice. In Chapter 2, a new bosonic code, the 2T-qutrit, is introduced and studied. This encoding has the particularity of using two bosonic modes, which means the space in which the information is encoded is even bigger than when only a single mode is used. This work then inspired the construction of important families of multi-mode codes, including some of the codes introduced in Chapter 3. The latter presents a general construction of error correcting codes such that the encoded information can easily be manipulated to carry out the desired logical computations
Sabban, Manuel. "Sécurité en cryptographie quantique utilisant la détection homodyne d'états cohérents à faible énergie." Phd thesis, Paris, ENST, 2009. https://pastel.hal.science/pastel-00005898.
Full textThe proposed word is a reflexion on security of some quantum key distribution protocols. We chose the phase of weak coherent states to support our information. Two main ideas are developped in this thesis. The first is a study of the advantages that a differential phase shift keying système with photon counter can provide, and the second is a reflexion of what a double-threshold can provide to homodyne measurements. In the part devoted to security of DPSK systems, we first compared quantitatively the security with an absolute reference scheme and that with the DPSK scheme. E show that the DPSK scheme is slightly better because the security can be considered split individually and collectively on photons. We eventually studied the security of double-threshold quantum key distribution homodyne systems. This method give access to the reliability of a measure, and allow us to choose whether or not we keep a given measurement. Different attacks have been taken into account to study achievable amount of security of systems of this kind
Sabban, Manuel. "Sécurité en cryptographie quantique utilisant la détection homodyne d'états cohérents à faible énergie." Phd thesis, Télécom ParisTech, 2009. http://pastel.archives-ouvertes.fr/pastel-00005898.
Full textKaiser, Florian. "Ingénierie de l'intrication photonique pour l'information quantique et l'optique quantique fondamentale." Phd thesis, Université de Nice Sophia-Antipolis, 2012. http://tel.archives-ouvertes.fr/tel-00777002.
Full textAgnolini, Sébastien. "Contribution à l'étude et à la réalisation d'un système de distribution quantique de clef par codage en phase." Phd thesis, Université Pierre et Marie Curie - Paris VI, 2007. http://pastel.archives-ouvertes.fr/pastel-00003416.
Full textAgnolini, Sébastien. "Contributions à l'étude et à la réalisation d'un système de distribution quantique de clef par codage en phase." Paris 6, 2007. https://pastel.archives-ouvertes.fr/pastel-00003416.
Full textBoucher, William. "Distribution quantique de clé par codage temporel." Paris 6, 2004. http://www.theses.fr/2004PA066014.
Full textAmblard, Zoé. "Cryptographie quantique et applications spatiales." Thesis, Limoges, 2016. http://www.theses.fr/2016LIMO0113.
Full textThis thesis in collaboration with Thales Alenia Space studies quantum cryptographic protocols for n parties in dimension d. We first analyze the family of Bell inequalities called homogeneous Bell inequalities introduces by François Arnault in [1] and we construct several theoretical tools for a better understanding of these inequalities. With these tools, we show how to implement the measurements required to test these inequalities by using optical devices calleds multiport beamsplitters and described by Zukowski et al. in [2]. We use these devices to construct new cryptographic protocols in dimension d called hdDEB which we describe in [3]. Then, we study advantages and drawbacks of the use of quantum cryptography to protect satellite links in a noisy environment. We consider several scenarios with LEO satellites and, for each of them, we conclude about the interest of using Quantum Key Distribution protocols
Bocquet, Aurélien. "Modèles de sécurité réalistes pour la distribution quantique de clés." Phd thesis, Paris, Télécom ParisTech, 2011. https://pastel.hal.science/pastel-00784705.
Full textSince its invention in 1984 by C. H. Bennett and G. Brassard, the BB84 protocol has been proven secure against the most general attacks allowed by quantum mechanics, the coherent attacks. In order to conduct such an attack, an eavesdropper needs a quantum memory. It is however technologically very hard to create a quantum memory with adequate properties at the moment. It is therefore useful to study the evolution of the power of the eavesdropper when he doesn’t have access to a perfect quantum memory but instead to a noisy quantum memory. New security models where the power of the eavesdropper is limited by the quality of its quantum memory have already been developed specifically for the study of two-party protocols like bit commitment or oblivious transfer. We therefore used these models and adapted them to the particular case of quantum key distribution. With these newly developed tools, we have studied the security of quantum key distribution protocols when the adversary doesn’t have a quantum memory and when he has access to a limited amount of noisy memory. This research improves our knowledge on the interaction between the quality of the quantum memory and the power of the attacks. It leads to a better understanding of the tradeoff between performance (measured in term of key rate or maximum distance) and security
Bocquet, Aurélien. "Modèles de sécurité réalistes pour la distribution quantique de clés." Phd thesis, Télécom ParisTech, 2011. http://pastel.archives-ouvertes.fr/pastel-00784705.
Full textBooks on the topic "Distribution quantique de clefs"
Veselić, Ivan. Existence and regularity properties of the integrated density of states of random Schrödinger operators. Berlin: Springer-Verlag, 2007.
Find full textExistence and regularity properties of the integrated density of states of random Schrödinger operators. Berlin: Springer-Verlag, 2008.
Find full textKon, Mark A. Probability Distributions in Quantum Statistical Mechanics. Springer London, Limited, 2006.
Find full textKon, Mark A. Probability Distributions in Quantum Statistical Mechanics. Springer Berlin / Heidelberg, 1985.
Find full textConcepts and Methods in Modern Theoretical Chemistry Vol. 1: Electronic Structure and Reactivity. Taylor & Francis Group, 2013.
Find full textBook chapters on the topic "Distribution quantique de clefs"
"Complément BXV Gaz parfait en équilibre thermique ; fonctions de distribution quantiques." In Mécanique quantique - Tome III, 37–56. EDP Sciences, 2017. http://dx.doi.org/10.1051/978-2-7598-2151-8.c005.
Full textReports on the topic "Distribution quantique de clefs"
Rousseau, Henri-Paul. Gutenberg, L’université et le défi numérique. CIRANO, December 2022. http://dx.doi.org/10.54932/wodt6646.
Full text