A less known side of quantum cryptography
From MaRDI portal
Publication:4686649
DOI10.1007/978-3-319-46376-6_7zbMATH Open1396.81076OpenAlexW2548986625MaRDI QIDQ4686649FDOQ4686649
Authors: Naya Nagy, Marius Nagy, Selim G. Akl
Publication date: 4 October 2018
Published in: Emergent Computation (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-46376-6_7
Recommendations
- The black paper of quantum cryptography: real implementation problems
- Quantum cryptography: key distribution and beyond
- Quantum cryptography. From key distribution to conference key agreement
- Quantum cryptography -- the issue of security in selected quantum protocols and the issue of data credibility
- An enhanced quantum key distribution protocol for security authentication
Cites Work
- Quantum cryptography based on Bell’s theorem
- Measurement of Conditional Phase Shifts for Quantum Logic
- Title not available (Why is that?)
- A method for obtaining digital signatures and public-key cryptosystems
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
- Quantum cryptography: public key distribution and coin tossing
- A single quantum cannot be cloned
- Communication Theory of Secrecy Systems*
- Quantum cryptography using any two nonorthogonal states
- Quantum cryptography without Bell’s theorem
- Privacy Amplification by Public Discussion
- Quantum key distribution and quantum authentication based on entangled state
- Quantum Authenticated Key Distribution
- A Classical Introduction to Cryptography
Cited In (4)
This page was built for publication: A less known side of quantum cryptography
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4686649)