2011
DOI: 10.1016/j.proeng.2011.03.067
|View full text |Cite
|
Sign up to set email alerts
|

Generation of DSA for Security Application

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2012
2012
2015
2015

Publication Types

Select...
5
4
1

Relationship

2
8

Authors

Journals

citations
Cited by 32 publications
(11 citation statements)
references
References 12 publications
0
10
0
Order By: Relevance
“…Dark soliton is one of the soliton properties, whereas the soliton amplitude disappears or minimized throughout the propagation in media, thus, the dark soliton detection is difficult [2]. The investigation of dark soliton behaviors has been described, where one point of them has shown the interesting results, where the dark soliton can be stabilized and converted into bright soliton and eventually observed [3,4]. This means that we can employ the dark soliton penalty because of the low level of the peak power to be the benefit, where the predicting idea is that a dark soliton can perform the communication transmission carrier where the recovery can be retrieved by the darkbright soliton conversion [5].…”
Section: Introductionmentioning
confidence: 99%
“…Dark soliton is one of the soliton properties, whereas the soliton amplitude disappears or minimized throughout the propagation in media, thus, the dark soliton detection is difficult [2]. The investigation of dark soliton behaviors has been described, where one point of them has shown the interesting results, where the dark soliton can be stabilized and converted into bright soliton and eventually observed [3,4]. This means that we can employ the dark soliton penalty because of the low level of the peak power to be the benefit, where the predicting idea is that a dark soliton can perform the communication transmission carrier where the recovery can be retrieved by the darkbright soliton conversion [5].…”
Section: Introductionmentioning
confidence: 99%
“…Some research works have shown that some techniques of quantum cryptography are proposed, where the systems of MRR are still complicated. Amiri et al proposed a new quantum key distribution rule in which carrier information is encoded on continuous variables of a single photon [78][79][80]. In such a way, Alice randomly encodes information on either the central frequency of a narrow band single-photon pulse or the time delay of a broadband single-photon pulse.…”
Section: Ring Resonatorsmentioning
confidence: 99%
“…T is a soliton pulse propagation time in a frame moving at the group velocity [24][25][26], T = t-β 1 ×z [27], where β 1 and β 2 are the coefficients of the linear and second order terms of the Taylor expansion of the propagation constant [28][29][30][31][32].…”
Section: Theoretical Modelingmentioning
confidence: 99%