Peev, M.; Pacher, C.; Lorünser, T.; Nölle, M.; Poppe, A.; Maurhart, O.; Suda, M.; Fedrizzi, A.; Ursin, R.; Zeilinger, A. Response to “Vulnerability of ‘A novel protocol-authentication algorithm ruling out a man-in-the-middle attack in quantum cryptography”’. (English) Zbl 1182.94045 Int. J. Quantum Inf. 7, No. 7, 1401-1407 (2009). Summary: We respond to a comment by A. Abidin and J.-Å. Larsson on our previous paper [Int. J. Quant. Inf. 3 , No. 3, 225–231 (2005; Zbl 1066.94015)]. Cited in 2 Documents MSC: 94A60 Cryptography 94A62 Authentication, digital signatures and secret sharing 81P94 Quantum cryptography (quantum-theoretic aspects) Keywords:quantum cryptography; QKD; authentication Citations:Zbl 1066.94015 PDFBibTeX XMLCite \textit{M. Peev} et al., Int. J. Quantum Inf. 7, No. 7, 1401--1407 (2009; Zbl 1182.94045) Full Text: DOI References: [1] DOI: 10.1142/S0219749909005754 · Zbl 1184.81040 · doi:10.1142/S0219749909005754 [2] DOI: 10.1142/S0219749905000797 · Zbl 1066.94015 · doi:10.1142/S0219749905000797 [3] Beth T., Quantum Inf. Comput. 5 pp 181– [4] DOI: 10.1016/0022-0000(81)90033-7 · Zbl 0461.68074 · doi:10.1016/0022-0000(81)90033-7 [5] DOI: 10.1016/0022-0000(79)90044-8 · Zbl 0412.68090 · doi:10.1016/0022-0000(79)90044-8 [6] Mehlhorn K., Acta Inf. 21 pp 339– [7] DOI: 10.1103/PhysRevA.73.044305 · doi:10.1103/PhysRevA.73.044305 This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.