A less known side of quantum cryptography
From MaRDI portal
Publication:4686649
Recommendations
- The black paper of quantum cryptography: real implementation problems
- Quantum cryptography: key distribution and beyond
- Quantum cryptography. From key distribution to conference key agreement
- Quantum cryptography -- the issue of security in selected quantum protocols and the issue of data credibility
- An enhanced quantum key distribution protocol for security authentication
Cites work
- scientific article; zbMATH DE number 1579275 (Why is no real title available?)
- A Classical Introduction to Cryptography
- A method for obtaining digital signatures and public-key cryptosystems
- A single quantum cannot be cloned
- Communication Theory of Secrecy Systems*
- Measurement of Conditional Phase Shifts for Quantum Logic
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
- Privacy Amplification by Public Discussion
- Quantum Authenticated Key Distribution
- Quantum cryptography based on Bell’s theorem
- Quantum cryptography using any two nonorthogonal states
- Quantum cryptography without Bell’s theorem
- Quantum cryptography: public key distribution and coin tossing
- Quantum key distribution and quantum authentication based on entangled state
Cited in
(7)- An enhanced quantum key distribution protocol for security authentication
- Trusted quantum back bone leveraging secure communication
- scientific article; zbMATH DE number 1808266 (Why is no real title available?)
- Quantum computation for network communications and space-based devices
- A chosen-plaintext attack on quantum permutation pad
- From parallelism to nonuniversality: an unconventional trajectory
- Non-contextual chocolate balls versus value indefinite quantum cryptography
This page was built for publication: A less known side of quantum cryptography
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4686649)