A Less Known Side of Quantum Cryptography
From MaRDI portal
Publication:4686649
DOI10.1007/978-3-319-46376-6_7zbMath1396.81076OpenAlexW2548986625MaRDI QIDQ4686649
Selim G. Akl, Naya Nagy, Marius Nagy
Publication date: 4 October 2018
Published in: Emergent Computation (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-46376-6_7
Related Items (1)
Cites Work
- Unnamed Item
- Quantum cryptography: public key distribution and coin tossing
- Quantum Authenticated Key Distribution
- Communication Theory of Secrecy Systems*
- Privacy Amplification by Public Discussion
- A method for obtaining digital signatures and public-key cryptosystems
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
- Quantum cryptography based on Bell’s theorem
- Quantum cryptography using any two nonorthogonal states
- Quantum cryptography without Bell’s theorem
- Measurement of Conditional Phase Shifts for Quantum Logic
- A single quantum cannot be cloned
- A Classical Introduction to Cryptography
- Quantum key distribution and quantum authentication based on entangled state
This page was built for publication: A Less Known Side of Quantum Cryptography