<--- Back to Details
First PageDocument Content
Quantum cryptography / Applied mathematics / Quantum key distribution / BB84 / Quantum entanglement / Kerberos / Quantum computer / Password / Key size / Cryptography / Theoretical computer science / Quantum information science
Date: 2007-10-26 01:00:00
Quantum cryptography
Applied mathematics
Quantum key distribution
BB84
Quantum entanglement
Kerberos
Quantum computer
Password
Key size
Cryptography
Theoretical computer science
Quantum information science

Authentication and Authorization Using Entangled Photons

Add to Reading List

Source URL: csrc.nist.gov

Download Document from Source Website

File Size: 235,87 KB

Share Document on Facebook

Similar Documents

GNU Network Security Labyrinth - or: an howto for network application authors TLS SASL Kerberos

DocID: 1u5Kc - View Document

Secrets d’authentification épisode II Kerberos contre-attaque Aurélien Bordes Résumé L’authentification est un composant essentiel dans la sécurité

DocID: 1tqI0 - View Document

Hadoop Security Design? Just Add Kerberos? Really? Andrew Becherer Black Hat USAhttps://www.isecpartners.com

DocID: 1tnaA - View Document

iSEC Partners, Inc. Hadoop Security Design Just Add Kerberos? Really? iSEC Partners, Inc. is

DocID: 1tfbi - View Document

Computing / Cryptography / Computer architecture / Computer network security / Shellcode / Data structure alignment / X86 / Kerberos / Transmission Control Protocol

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz I Solutions

DocID: 1rhHq - View Document