Recommendations
Cites work
- scientific article; zbMATH DE number 3856987 (Why is no real title available?)
- scientific article; zbMATH DE number 503241 (Why is no real title available?)
- A Mathematical Theory of Communication
- A Pseudorandom Generator from any One-way Function
- A Tight High-Order Entropic Quantum Uncertainty Relation with Applications
- A new protocol and lower bounds for quantum coin flipping
- A proof of the security of quantum key distribution (extended abstract)
- Can Quantum-Mechanical Description of Physical Reality Be Considered Complete?
- Cryptography in the Bounded-Quantum-Storage Model
- Dense quantum coding and quantum finite automata
- Efficient quantum key distribution scheme and a proof of its unconditional security
- Founding Cryptography on Oblivious Transfer – Efficiently
- Generalized privacy amplification
- Improving the Security of Quantum Protocols via Commit-and-Open
- Privacy Amplification by Public Discussion
- Probability Inequalities for Sums of Bounded Random Variables
- Proof of security of quantum key distribution with two-way classical communications
- Quantum cryptography
- Quantum cryptography based on Bell’s theorem
- Quantum cryptography using any two nonorthogonal states
- Quantum cryptography without Bell’s theorem
- Quantum cryptography. II: How to re-use a one-time pad safely even if \(\mathrm P=\mathrm{NP}\)
- Quantum cryptography: public key distribution and coin tossing
- Quantum key distribution and string oblivious transfer in noisy channels
- Robust cryptography in the noisy-quantum-storage model
- SECURITY OF QUANTUM KEY DISTRIBUTION
- Sampling in a quantum population, and applications
- Secure Identification and QKD in the Bounded-Quantum-Storage Model
- The Operational Meaning of Min- and Max-Entropy
- Theory of Cryptography
- Unconditional security in quantum cryptography
Cited in
(27)- Recent progress in quantum cryptography and quantum computation
- CODES FOR KEY GENERATION IN QUANTUM CRYPTOGRAPHY
- A review of quantum and hybrid quantum/classical blockchain protocols
- Entropic security in quantum cryptography
- Quantum candies and quantum cryptography
- ON STANDARDS AND SPECIFICATIONS IN QUANTUM CRYPTOGRAPHY
- Quantum cryptography: public key distribution and coin tossing
- Efficient simulation for quantum message authentication
- Quantum cryptography beyond quantum key distribution
- A game theoretic approach to study the quantum key distribution BB84 protocol
- Quantum Key Distribution
- Quantum cryptography
- On Quantum Cryptography and Number Theory
- Computational Security of Quantum Encryption
- Adaptive cascade
- scientific article; zbMATH DE number 6492476 (Why is no real title available?)
- Cryptography from pseudorandom quantum states
- A game-theoretic security framework for quantum cryptography: performance analysis and application
- Quantum cryptography over non-Markovian channels
- scientific article; zbMATH DE number 1796842 (Why is no real title available?)
- Long distance quantum cryptography made simple
- Optimal symmetric ternary quantum encryption schemes
- Quantum-Secure Symmetric-Key Cryptography Based on Hidden Shifts
- Quantum-chaotic cryptography
- QUANTUM SECRET ENCRYPTION AND DECRYPTION IN CAVITY QED
- Verifiable quantum encryption and its practical applications
- Quantum meaningful visual cryptography
This page was built for publication: Quantum cryptography
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q975385)