Reply to: ``Comment on: `Exposed-key weakness of ' [Phys. Lett. A 370 (2007) 131] [Phys. Lett. A 372 (2008) 7091]
From MaRDI portal
Publication:646977
DOI10.1016/J.PHYSLETA.2008.10.039zbMATH Open1227.81141OpenAlexW2139574620MaRDI QIDQ646977FDOQ646977
Authors: Charlene Ahn, Kevin Birnbaum
Publication date: 30 November 2011
Published in: Physics Letters. A (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.physleta.2008.10.039
Recommendations
- Comment on: ``Exposed-key weakness of \(\alpha \eta \) [Phys. Lett. A 370 (2007) 131]
- Exposed-key weakness of \(\alpha \eta \)
- On the security of \(\alpha \eta\): response to \` some attacks on quantum-based cryptographic protocols'
- Criteria of key security
- Comment on ``Quantum key distribution and quantum authentication based on entangled state
Cites Work
Cited In (4)
- Authentication schemes, perfect local randomizers, perfect secrecy and secret sharing schemes
- Comment on: ``Exposed-key weakness of \(\alpha \eta \) [Phys. Lett. A 370 (2007) 131]
- Exposed-key weakness of \(\alpha \eta \)
- On the security of \(\alpha \eta\): response to \` some attacks on quantum-based cryptographic protocols'
This page was built for publication: Reply to: ``Comment on: `Exposed-key weakness of \(\alpha \eta \)' [Phys. Lett. A 370 (2007) 131] [Phys. Lett. A 372 (2008) 7091]
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q646977)