Quantum key distribution using universal hash functions over finite fields
From MaRDI portal
Publication:2107057
DOI10.1007/S11128-022-03468-YOpenAlexW4220674283MaRDI QIDQ2107057FDOQ2107057
Authors: Khodakhast Bibak
Publication date: 29 November 2022
Published in: Quantum Information Processing (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s11128-022-03468-y
Recommendations
- New Universal Hash Functions
- Special properties of strongly universal\(_2\) hash functions important in quantum cryptography
- Quantum hashing via \(\varepsilon \)-universal hashing constructions and Freivalds' fingerprinting schemas
- Quantum hashing via \(\epsilon\)-universal hashing constructions and classical fingerprinting
- Privacy amplification for quantum key distribution
Cryptography (94A60) Polynomials over finite fields (11T06) Quantum cryptography (quantum-theoretic aspects) (81P94)
Cites Work
- MMH: Software message authentication in the Gbit/second rates
- Fast Software Encryption
- New hash functions and their use in authentication and set equality
- Universal classes of hash functions
- Key Recycling in Authentication
- Title not available (Why is that?)
- Title not available (Why is that?)
- Generalized privacy amplification
- Title not available (Why is that?)
- Theory of Cryptography
- Randomized and deterministic simulations of PRAMs by parallel machines with restricted granularity of parallel memories
- Polynomial hash functions are reliable (extended abstract)
- Numbers of solutions of equations in finite fields
- Progress in Cryptology - INDOCRYPT 2004
- Title not available (Why is that?)
- On the Existence of Solutions of Certain Equations in a Finite Field
- Characters over Certain Types of Rings with Applications to the Theory of Equations in a Finite Field
- On the Nature of the Solutions of Certain Equations in a Finite Field
- Universal hashing and authentication codes
- Quantum authentication with key recycling
- On the Power of Quantum Memory
- Title not available (Why is that?)
- A lower bound for the number of solutions of equations over finite fields
- Leftover Hashing Against Quantum Side Information
- Title not available (Why is that?)
- New security notions and feasibility results for authentication of quantum data
- Order-restricted linear congruences
- Rings of arithmetic functions. II. The number of solutions of quadratic congruences
- Quantum key distribution with PRF(Hash, Nonce) achieves everlasting security
- Revocable Quantum Timed-Release Encryption
- Commentary on ``Numbers of solutions of equations in finite fields by André Weil
- Leftover Hashing From Quantum Error Correction: Unifying the Two Approaches to the Security Proof of Quantum Key Distribution
- Sampling of Min-Entropy Relative to Quantum Knowledge
Cited In (2)
Uses Software
This page was built for publication: Quantum key distribution using universal hash functions over finite fields
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2107057)