Quantum Key Distribution
From MaRDI portal
Publication:3562811
Recommendations
Cites work
- scientific article; zbMATH DE number 1579275 (Why is no real title available?)
- scientific article; zbMATH DE number 1394316 (Why is no real title available?)
- Efficient quantum key distribution scheme and a proof of its unconditional security
- Experimental quantum cryptography.
- Generalized privacy amplification
- New hash functions and their use in authentication and set equality
- Quantum Cryptography and Secret-Key Distillation
- Quantum cryptography based on Bell’s theorem
- Quantum cryptography using any two nonorthogonal states
- Quantum cryptography: public key distribution and coin tossing
- SECURITY OF QUANTUM KEY DISTRIBUTION
- Universal classes of hash functions
Cited in
(15)- Quantum key distribution
- Quantum Authenticated Key Distribution
- Post-quantum signal key agreement from SIDH
- QUANTUM KEY-DISTRIBUTION PROTOCOL FOR N-BIT SECRET MESSAGE COMMUNICATION
- Equiangular quantum key distribution in more than two dimensions
- Quantum Key Distribution Protocol Optimization
- Quantum cryptography: public key distribution and coin tossing
- Security of Device-Independent Quantum Key Distribution Protocols
- Theory of quantum key distribution (QKD)
- Quantum cryptography
- Quantum Key Distribution Scheme with High Efficiency
- On the information-splitting essence of two types of quantum key distribution protocols
- Quantum key-length extension
- scientific article; zbMATH DE number 5953560 (Why is no real title available?)
- Transferable quantum cheque scheme based on quantum public-key cryptography
This page was built for publication: Quantum Key Distribution
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3562811)