<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1405-5546</journal-id>
<journal-title><![CDATA[Computación y Sistemas]]></journal-title>
<abbrev-journal-title><![CDATA[Comp. y Sist.]]></abbrev-journal-title>
<issn>1405-5546</issn>
<publisher>
<publisher-name><![CDATA[Instituto Politécnico Nacional, Centro de Investigación en Computación]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1405-55462015000100014</article-id>
<article-id pub-id-type="doi">10.13053/CyS-19-1-1549</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[FPGA-Based Emulation of a Synchronous Phase-Coded Quantum Cryptography System]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Arvizu-Mondragón]]></surname>
<given-names><![CDATA[Arturo]]></given-names>
</name>
<xref ref-type="aff" rid="A01"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[López-Leyva]]></surname>
<given-names><![CDATA[Josué A.]]></given-names>
</name>
<xref ref-type="aff" rid="A02"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Ureña]]></surname>
<given-names><![CDATA[Jorge L.]]></given-names>
</name>
<xref ref-type="aff" rid="A01"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Mendieta-Jiménez]]></surname>
<given-names><![CDATA[Francisco J.]]></given-names>
</name>
<xref ref-type="aff" rid="A03"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Sánchez L.]]></surname>
<given-names><![CDATA[Juan de Dios]]></given-names>
</name>
<xref ref-type="aff" rid="A04"/>
</contrib>
</contrib-group>
<aff id="A01">
<institution><![CDATA[,Centro de Investigación Científica y de Educación Superior de Ensenada  ]]></institution>
<addr-line><![CDATA[Ensenada Baja California]]></addr-line>
<country>México</country>
</aff>
<aff id="A02">
<institution><![CDATA[,Centro de Enseñanza Técnica y Superior  ]]></institution>
<addr-line><![CDATA[Ensenada Baja California]]></addr-line>
<country>México</country>
</aff>
<aff id="A03">
<institution><![CDATA[,Agencia Espacial Mexicana  ]]></institution>
<addr-line><![CDATA[ Distrito Federal]]></addr-line>
<country>México</country>
</aff>
<aff id="A04">
<institution><![CDATA[,Universidad Autónoma de Baja California  ]]></institution>
<addr-line><![CDATA[Ensenada Baja California]]></addr-line>
<country>México</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>03</month>
<year>2015</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>03</month>
<year>2015</year>
</pub-date>
<volume>19</volume>
<numero>1</numero>
<fpage>185</fpage>
<lpage>195</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1405-55462015000100014&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1405-55462015000100014&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1405-55462015000100014&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[We present FPGA-based emulation of a synchronous phase-coded quantum cryptography system. Several of the emulated subsystems are used for implementation in a free space demonstrative QPSK scheme for quantum key distribution with continuous variables (CV-QKD) using a base and optical phase synchronization. The CV-QKD systems are commonly implemented using QPSK modulation with switched or simultaneous detection. In this paper we only make use of one base of the QPSK system in order to get a simpler modulation (BPSK) scheme, used for demonstrative purposes. The reported results from the emulation and the experiment in terms of Quantum Bit Error Rate (QBER) and mutual information for different values of the number of photons per bit are in good agreement.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[FPGA]]></kwd>
<kwd lng="en"><![CDATA[quantum cryptography]]></kwd>
<kwd lng="en"><![CDATA[emulation]]></kwd>
</kwd-group>
</article-meta>
</front><body><![CDATA[  	    <p align="justify"><font face="verdana" size="4">Art&iacute;culos</font></p>  	    <p>&nbsp;</p>  	    <p align="center"><font face="verdana" size="4"><b>FPGA&#45;Based Emulation of a Synchronous Phase&#45;Coded Quantum Cryptography System</b></font></p>  	    <p>&nbsp;</p>  	    <p align="center"><font face="verdana" size="2"><b>Arturo Arvizu&#45;Mondrag&oacute;n<sup>1</sup>, Josu&eacute; A. L&oacute;pez&#45;Leyva<sup>2</sup>, Jorge L. Ure&ntilde;a<sup>1</sup>, Francisco J. Mendieta&#45;Jim&eacute;nez<sup>3</sup> and Juan de Dios S&aacute;nchez L.<sup>4</sup></b></font></p>  	    <p>&nbsp;</p>  	    <p align="justify"><font face="verdana" size="2"><sup><i>1</i></sup> <i>Centro de Investigaci&oacute;n Cient&iacute;fica y de Educaci&oacute;n Superior de Ensenada (CICESE), Baja California,</i> <i>M&eacute;xico.</i> <a href="mailto:arvizu@cicese.mx">arvizu@cicese.mx</a>, <a href="mailto:sluc16@hotmail.com">sluc16@hotmail.com</a>.</font></p>  	    <p align="justify"><font face="verdana" size="2"><i><sup>2</sup> CETYS Universidad, Ensenada, Baja California, M&eacute;xico.</i> <a href="mailto:josue.lopez@cetys.mx">josue.lopez@cetys.mx</a>.</font></p>  	    <p align="justify"><font face="verdana" size="2"><i><sup>3</sup> Agencia Espacial Mexicana (AEM), Distrito Federal, M&eacute;xico.</i> <a href="mailto:mendieta.javier@aem.gob.mx">mendieta.javier@aem.gob.mx</a>.</font></p>  	    ]]></body>
<body><![CDATA[<p align="justify"><font face="verdana" size="2"><i><sup>4</sup> Universidad Aut&oacute;noma de Baja California (UABC), Ensenada, Baja California, M&eacute;xico.</i> <a href="mailto:jddios@uabc.edu.mx">jddios@uabc.edu.mx</a>.</font></p>  	    <p align="justify"><font face="verdana" size="2"><i>Corresponding author is Arturo Arvizu Mondrag&oacute;n.</i></font></p>  	    <p>&nbsp;</p>  	    <p align="justify"><font face="verdana" size="2">Article received on 30/08/2013.    <br> 	Accepted on 19/08/2014.</font></p>  	    <p>&nbsp;</p>  	    <p align="justify"><font face="verdana" size="2"><b>Abstract</b></font></p>  	    <p align="justify"><font face="verdana" size="2">We present FPGA&#45;based emulation of a synchronous phase&#45;coded quantum cryptography system. Several of the emulated subsystems are used for implementation in a free space demonstrative QPSK scheme for quantum key distribution with continuous variables (CV&#45;QKD) using a base and optical phase synchronization. The CV&#45;QKD systems are commonly implemented using QPSK modulation with switched or simultaneous detection. In this paper we only make use of one base of the QPSK system in order to get a simpler modulation (BPSK) scheme, used for demonstrative purposes. The reported results from the emulation and the experiment in terms of Quantum Bit Error Rate (QBER) and mutual information for different values of the number of photons per bit are in good agreement.</font></p>  	    <p align="justify"><font face="verdana" size="2"><b>Keywords:</b> FPGA, quantum cryptography, emulation.</font></p>  	    <p>&nbsp;</p>  	    ]]></body>
<body><![CDATA[<p align="justify"><font face="verdana" size="2"><a href="/pdf/cys/v19n1/v19n1a14.pdf" target="_blank">DESCARGAR ART&Iacute;CULO EN FORMATO PDF</a></font></p>  	    <p>&nbsp;</p>  	    <p align="justify"><font face="verdana" size="2"><b>References</b></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2"><b>1. Gao, F., Qin, S.J., Guo, F.Z., &amp; Wen, Q.Y. (2011).</b> Dense&#45;Coding Attack on Three&#45;Party Quantum Key Distribution Protocols. <i>IEEE Journal of Quantum Electronics,</i> Vol. 47, No. 5, pp. 630&#45;635.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2071214&pid=S1405-5546201500010001400001&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2"><b>2. Yan, Z., Meyer&#45;Scott, E., Bourgoin, J.P., Higgins, B.L., Gigov, N., MacDonald, A., H&uuml;bel, H., &amp; Jennewein, T. (2013)</b>. Novel High&#45;Speed Polarization Source for Decoy&#45;State BB84 Quantum Key Distribution Over Free Space and Satellite Links, <i>Journal of ligthwave technology,</i> Vol. 31, No. 9, pp. 1399&#45;1408. DOI: 10.1109/JLT.2013.2249040.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2071216&pid=S1405-5546201500010001400002&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2"><b>3. Huang, J., Yin, Z., Chen, W., Wang, S., Li, H., Guo, G., &amp; Han, Z. (2013)</b>. A survey on device&#45;independent quantum communications. <i>China Communications,</i> Vol.10, No. 2, pp. 1&#45;10. DOI:10.1109/CC.2013.6472853.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2071218&pid=S1405-5546201500010001400003&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2"><b>4. Agnolini, S. &amp; Gallion, P. (2004)</b>. Implementation of BB84 protocol by QPSK modulation using Mach&#45;Zehnder modulator. <i>IEEE ICIT '04 International Conference on Industrial Technology.</i> Vol. 1, pp. 250&#45;253. DOI: 10.1109/ICIT.2004.1490292.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2071220&pid=S1405-5546201500010001400004&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2"><b>5. Liao, S., Liu, S., Wang, J., Liu, W., Peng, C., &amp; An, Q. (2012)</b>. Time interval analyzer with FPGA&#45;based TDC for free space quantum key distribution: Principle and validation with prototype setup. <i>Real Time Conference (RT), 18th IEEE&#45;NPSS,</i> 1&#45;6.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2071222&pid=S1405-5546201500010001400005&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2"><b>6. Zhang, H.F., Wang, J., Cui, K., Luo, C.L., Lin, S.Z., Zhou, L., Liang, H., Chen, T.Y., Chen, K., &amp; Pan, J.W. (2012)</b>. A Real&#45;Time QKD System Based on FPGA. <i>Journal of ligthwave technology,</i> Vol. 30, No. 20, pp. 3226&#45;3234. DOI:10.1109/JLT.2012.2217394.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2071224&pid=S1405-5546201500010001400006&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2"><b>7. Oesterling, L., Hayford, D., &amp; Friend, G. (2012)</b>. Comparison of commercial and next generation quantum key distribution: Technologies for secure communication of information. <i>IEEE Conference on Technologies for Homeland Security (HST),</i> pp. 156&#45;161.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2071226&pid=S1405-5546201500010001400007&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2"><b>8. Trappe, W. &amp; Washington, L.C. (2002)</b>. <i>Introduction to Cryptography with Coding Theory.</i> Pearson Prentice Hall. pp. 25&#45;50.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2071228&pid=S1405-5546201500010001400008&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2"><b>9. Bennett, C. &amp; Brassard, G. (1984)</b>. Quantum cryptography: Public key distribution and coin tossing. <i>Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing,</i> pp. 175&#45;179.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2071230&pid=S1405-5546201500010001400009&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2"><b>10. Silva, M.B.C, Xu, Q., Agnolini, S., Gallion, P., &amp; Mendieta, F.J. (2006)</b>. Homodyne detection for quantum key distribution: an alternative to photon counting in BB84 protocol, <i>International Conference on Application of Photonic Technology.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2071232&pid=S1405-5546201500010001400010&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></i></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2"><b>11. Jouguet, P., &amp; Kunz&#45;Jacques, S. (2014)</b>. High Performance error correction for quantum key distribution using polar codes. <i>Quantum information and computation,</i> Vol. 14, No. 3, pp. 329&#45;338.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2071234&pid=S1405-5546201500010001400011&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2"><b>12. Lopez Leyva, J.A. (2014)</b>. Dual Quantum Random Number Generator using a FPGA for QKD&#45;CV systems: Preliminary results. <i>International Journal of Emerging Research in Management &amp; Technology,</i> Vol. 3, No. 6, pp. 6&#45;8.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2071236&pid=S1405-5546201500010001400012&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2"><b>13. Desurvire, E. (2009)</b>. <i>Classical and quantum information theory.</i> Cambridge, UK, Cambridge University Press.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2071238&pid=S1405-5546201500010001400013&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2"><b>14. Al&#45;Khateeb, W., Al&#45;Khateeb, K., Ahmad, N.E., &amp;</b> <b>Salleh, S.N.M. (2013)</b>. Practical Considerations on Quantum Key Distribution (QKD). <i>International Conference on Advanced Computer Science Applications and Technologies (ACSAT),</i> pp. 278&#45;283 DOI:10.1109/ACSAT.2013.62.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2071240&pid=S1405-5546201500010001400014&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2"><b>15. Capraro, I. &amp; Occhipinti, T. (2007)</b>. Implementation of a Real Time High Level Protocol Software for Quantum Key Distribution. <i>IEEE International Conference on Signal Processing and Communications ICSPC,</i> pp. 704&#45;707. DOI:10.1109/ICSPC.2007.4728416.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2071242&pid=S1405-5546201500010001400015&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2"><b>16. Niemiec, M. &amp; Pach, A.R. (2013)</b>. Management of security in quantum cryptography. <i>IEEE Communications Magazine,</i> Vol. 51, No. 8, pp. 3641. DOI:10.1109/MCOM.2013.6576336.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2071244&pid=S1405-5546201500010001400016&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2"><b>17. Xu, Q., Mondragon, A.A., Gallion, P., &amp; Mendieta, F.J. (2009)</b>. Homodyne In&#45;Phase and Quadrature Detection of Weak Coherent States With Carrier Phase Tracking. <i>IEEE Journal of Selected Topics in Quantum Electronics, Vol.</i> 15, No. 6,&nbsp;pp. 581&#45;1590. DOI:10.1109/JSTQE.2009.2023803.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2071246&pid=S1405-5546201500010001400017&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2"><b>18. Li, J., Chen, J., Zeng, H., &amp; Li, H. (2013)</b>. Design of Quantum Secure Communication System Based on FPGA. <i>Progress in Electromagnetics Research Symposium (PIERS) Proceedings,</i> Taipei, pp. 342&#45;346.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2071248&pid=S1405-5546201500010001400018&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2"><b>19. Shen, Q., Liao, S., Wang, J., Liu, W., Peng, C., &amp; An, Q. (2013)</b>. An FPGA&#45;Based TDC for Free Space Quantum Key Distribution, <i>IEEE Transactions on Nuclear Science,</i> Vol. 60, No. 5, pp. 3570&#45;3577. DOI:10.1109/TNS.2013.2280169.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2071250&pid=S1405-5546201500010001400019&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2"><b>20. Ma, L., Mink, A., &amp; Tang, X. (2009)</b>. High Speed Quantum Key Distribution Over Optical Fiber Network System. <i>Journal of Research of the National Institute of Standards and Technology,</i> Vol. 144, No. 3, pp. 149&#45;177.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2071252&pid=S1405-5546201500010001400020&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2"><b>21. Khalid, A.U., Zilic, Z., &amp; Radecka, K. (2004)</b>. FPGA Emulation of Quantum Circuits. <i>Proceedings of the IEEE Intl. Conf. on Computer Design,</i> San Jose California, USA, pp. 310&#45;315.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2071254&pid=S1405-5546201500010001400021&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>      ]]></body><back>
<ref-list>
<ref id="B1">
<label>1</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gao]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Qin]]></surname>
<given-names><![CDATA[S.J.]]></given-names>
</name>
<name>
<surname><![CDATA[Guo]]></surname>
<given-names><![CDATA[F.Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Wen]]></surname>
<given-names><![CDATA[Q.Y.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Dense-Coding Attack on Three-Party Quantum Key Distribution Protocols]]></article-title>
<source><![CDATA[IEEE Journal of Quantum Electronics]]></source>
<year>2011</year>
<volume>47</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>630-635</page-range></nlm-citation>
</ref>
<ref id="B2">
<label>2</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yan]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Meyer-Scott]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Bourgoin]]></surname>
<given-names><![CDATA[J.P.]]></given-names>
</name>
<name>
<surname><![CDATA[Higgins]]></surname>
<given-names><![CDATA[B.L.]]></given-names>
</name>
<name>
<surname><![CDATA[Gigov]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[MacDonald]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Hübel]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Jennewein]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Novel High-Speed Polarization Source for Decoy-State BB84 Quantum Key Distribution Over Free Space and Satellite Links]]></article-title>
<source><![CDATA[Journal of ligthwave technology]]></source>
<year>2013</year>
<volume>31</volume>
<numero>9</numero>
<issue>9</issue>
<page-range>1399-1408</page-range></nlm-citation>
</ref>
<ref id="B3">
<label>3</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Huang]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Yin]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Guo]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Han]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[A survey on device-independent quantum communications]]></article-title>
<source><![CDATA[China Communications]]></source>
<year>2013</year>
<volume>10</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>1-10</page-range></nlm-citation>
</ref>
<ref id="B4">
<label>4</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Agnolini]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Gallion]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<source><![CDATA[Implementation of BB84 protocol by QPSK modulation using Mach-Zehnder modulator]]></source>
<year>2004</year>
<volume>1</volume>
<page-range>250-253</page-range></nlm-citation>
</ref>
<ref id="B5">
<label>5</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Liao]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Peng]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[An]]></surname>
<given-names><![CDATA[Q.]]></given-names>
</name>
</person-group>
<source><![CDATA[Time interval analyzer with FPGA-based TDC for free space quantum key distribution: Principle and validation with prototype setup]]></source>
<year>2012</year>
<page-range>1-6</page-range></nlm-citation>
</ref>
<ref id="B6">
<label>6</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[H.F.]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Cui]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Luo]]></surname>
<given-names><![CDATA[C.L.]]></given-names>
</name>
<name>
<surname><![CDATA[Lin]]></surname>
<given-names><![CDATA[S.Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhou]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Liang]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[T.Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Pan]]></surname>
<given-names><![CDATA[J.W.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[A Real-Time QKD System Based on FPGA]]></article-title>
<source><![CDATA[Journal of ligthwave technology]]></source>
<year>2012</year>
<volume>30</volume>
<numero>20</numero>
<issue>20</issue>
<page-range>3226-3234</page-range></nlm-citation>
</ref>
<ref id="B7">
<label>7</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Oesterling]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Hayford]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Friend]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<source><![CDATA[Comparison of commercial and next generation quantum key distribution: Technologies for secure communication of information]]></source>
<year>2012</year>
<page-range>156-161</page-range></nlm-citation>
</ref>
<ref id="B8">
<label>8</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Trappe]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Washington]]></surname>
<given-names><![CDATA[L.C.]]></given-names>
</name>
</person-group>
<source><![CDATA[Introduction to Cryptography with Coding Theory]]></source>
<year>2002</year>
<page-range>25-50</page-range><publisher-name><![CDATA[Pearson Prentice Hall]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B9">
<label>9</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bennett]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Brassard]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<source><![CDATA[Quantum cryptography: Public key distribution and coin tossing]]></source>
<year>1984</year>
<page-range>175-179</page-range></nlm-citation>
</ref>
<ref id="B10">
<label>10</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Silva]]></surname>
<given-names><![CDATA[M.B.C]]></given-names>
</name>
<name>
<surname><![CDATA[Xu]]></surname>
<given-names><![CDATA[Q.]]></given-names>
</name>
<name>
<surname><![CDATA[Agnolini]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Gallion]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Mendieta]]></surname>
<given-names><![CDATA[F.J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Homodyne detection for quantum key distribution: an alternative to photon counting in BB84 protocol]]></source>
<year>2006</year>
</nlm-citation>
</ref>
<ref id="B11">
<label>11</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Jouguet]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Kunz-Jacques]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[High Performance error correction for quantum key distribution using polar codes]]></article-title>
<source><![CDATA[Quantum information and computation]]></source>
<year>2014</year>
<volume>14</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>329-338</page-range></nlm-citation>
</ref>
<ref id="B12">
<label>12</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lopez Leyva]]></surname>
<given-names><![CDATA[J.A.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Dual Quantum Random Number Generator using a FPGA for QKD-CV systems: Preliminary results]]></article-title>
<source><![CDATA[International Journal of Emerging Research in Management & Technology]]></source>
<year>2014</year>
<volume>3</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>6-8</page-range></nlm-citation>
</ref>
<ref id="B13">
<label>13</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Desurvire]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<source><![CDATA[Classical and quantum information theory]]></source>
<year>2009</year>
<publisher-loc><![CDATA[Cambridge ]]></publisher-loc>
<publisher-name><![CDATA[Cambridge University Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B14">
<label>14</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Al-Khateeb]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Al-Khateeb]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Ahmad]]></surname>
<given-names><![CDATA[N.E.]]></given-names>
</name>
<name>
<surname><![CDATA[Salleh]]></surname>
<given-names><![CDATA[S.N.M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Practical Considerations on Quantum Key Distribution (QKD). International Conference on Advanced Computer Science Applications and Technologies (ACSAT)]]></source>
<year>2013</year>
<page-range>278-283</page-range></nlm-citation>
</ref>
<ref id="B15">
<label>15</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Capraro]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
<name>
<surname><![CDATA[Occhipinti]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<source><![CDATA[Implementation of a Real Time High Level Protocol Software for Quantum Key Distribution]]></source>
<year>2007</year>
<page-range>704-707</page-range></nlm-citation>
</ref>
<ref id="B16">
<label>16</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Niemiec]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Pach]]></surname>
<given-names><![CDATA[A.R.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Management of security in quantum cryptography]]></article-title>
<source><![CDATA[IEEE Communications Magazine]]></source>
<year>2013</year>
<volume>51</volume>
<numero>8</numero>
<issue>8</issue>
<page-range>3641</page-range></nlm-citation>
</ref>
<ref id="B17">
<label>17</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Xu]]></surname>
<given-names><![CDATA[Q.]]></given-names>
</name>
<name>
<surname><![CDATA[Mondragon]]></surname>
<given-names><![CDATA[A.A.]]></given-names>
</name>
<name>
<surname><![CDATA[Gallion]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Mendieta]]></surname>
<given-names><![CDATA[F.J.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Homodyne In-Phase and Quadrature Detection of Weak Coherent States With Carrier Phase Tracking]]></article-title>
<source><![CDATA[IEEE Journal of Selected Topics in Quantum Electronics]]></source>
<year>2009</year>
<volume>15</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>581-1590</page-range></nlm-citation>
</ref>
<ref id="B18">
<label>18</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Zeng]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<source><![CDATA[Design of Quantum Secure Communication System Based on FPGA]]></source>
<year>2013</year>
<page-range>342-346</page-range><publisher-loc><![CDATA[Taipei ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B19">
<label>19</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Shen]]></surname>
<given-names><![CDATA[Q.]]></given-names>
</name>
<name>
<surname><![CDATA[Liao]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Peng]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[An]]></surname>
<given-names><![CDATA[Q.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[An FPGA-Based TDC for Free Space Quantum Key Distribution]]></article-title>
<source><![CDATA[IEEE Transactions on Nuclear Science]]></source>
<year>2013</year>
<volume>60</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>3570-3577</page-range></nlm-citation>
</ref>
<ref id="B20">
<label>20</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ma]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Mink]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Tang]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[High Speed Quantum Key Distribution Over Optical Fiber Network System]]></article-title>
<source><![CDATA[Journal of Research of the National Institute of Standards and Technology]]></source>
<year>2009</year>
<volume>144</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>149-177</page-range></nlm-citation>
</ref>
<ref id="B21">
<label>21</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Khalid]]></surname>
<given-names><![CDATA[A.U.]]></given-names>
</name>
<name>
<surname><![CDATA[Zilic]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Radecka]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<source><![CDATA[FPGA Emulation of Quantum Circuits]]></source>
<year>2004</year>
<publisher-loc><![CDATA[San Jose^eCalifornia California]]></publisher-loc>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
