Continuous-variable quantum computing and its applications to cryptography
From MaRDI portal
Recommendations
- Quantum computational cryptography
- Continuous-variable quantum key distribution
- Quantum Computation over Continuous Variables
- Verifiable quantum encryption and its practical applications
- Applied quantum cryptography
- Teleportation-based continuous variable quantum cryptography
- Quantum computation and cryptography: An overview
- Computational Indistinguishability Between Quantum States and Its Cryptographic Application
- Computational indistinguishability between quantum states and its cryptographic application
Cites work
- Multi-bits transfer based on the quantum three-stage protocol with quantum error correction codes
- Quantum Computation over Continuous Variables
- Quantum algorithm for determining a complex number string
- Quantum communication and quantum multivariate polynomial interpolation
- Quantum cryptography based on Bell’s theorem
- Quantum cryptography based on the Deutsch-Jozsa algorithm
- Quantum cryptography, quantum communication, and quantum computer in a noisy environment
- Quantum key distribution protocol based on modified generalization of Deutsch-Jozsa algorithm in \(d\)-level quantum system
Cited in
(6)- Quantum cryptography based on an algorithm for determining a function using qudit systems
- scientific article; zbMATH DE number 5320213 (Why is no real title available?)
- Cryptanalysis of multi-user quantum private query protocol
- Quantum cryptography based on an algorithm for determining simultaneously all the mappings of a Boolean function
- Continuous-variable and hybrid quantum gates
- Computational indistinguishability between quantum states and its cryptographic application
This page was built for publication: Continuous-variable quantum computing and its applications to cryptography
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2208007)