Response to "Vulnerability of 'A novel protocol-authentication algorithm ruling out a man-in-the-middle attack in quantum cryptography'"

M. Peev*, C. Pacher, T. Lorunser, M. Nolle, A. Poppe, O. Maurhart, M. Suda, Alessandro Fedrizzi, R. Ursin, A. Zeilinger

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

7 Citations (Scopus)

Abstract

In this work, we respond to a comment by A. Abidin and J.-A. Larsson on our previous paper, Int. J. Quant. Inf. 3 (2005) 225.

Original languageEnglish
Pages (from-to)1401-1407
Number of pages7
JournalInternational Journal of Quantum Information
Volume7
Issue number7
DOIs
Publication statusPublished - Oct 2009

Keywords

  • Quantum cryptography
  • QKD
  • Authentication
  • Hash functions

Fingerprint

Dive into the research topics of 'Response to "Vulnerability of 'A novel protocol-authentication algorithm ruling out a man-in-the-middle attack in quantum cryptography'"'. Together they form a unique fingerprint.

Cite this