<--- Back to Details
First PageDocument Content
Quantum cryptography / Applied mathematics / Quantum key distribution / BB84 / Quantum entanglement / Kerberos / Quantum computer / Password / Key size / Cryptography / Theoretical computer science / Quantum information science
Date: 2007-10-26 01:00:00
Quantum cryptography
Applied mathematics
Quantum key distribution
BB84
Quantum entanglement
Kerberos
Quantum computer
Password
Key size
Cryptography
Theoretical computer science
Quantum information science

Authentication and Authorization Using Entangled Photons

Add to Reading List

Source URL: csrc.nist.gov

Download Document from Source Website

File Size: 235,87 KB

Share Document on Facebook

Similar Documents

Experimental Decoy State Quantum Key Distribution with Unconditional Security Incorporating Finite Statistics Jun Hasegawa ERATO-SORST, JST

DocID: 1u5WD - View Document

Institutionen för systemteknik Department of Electrical Engineering Examensarbete Quantum Key Distribution - current state of the technology and prospects in the near future.

DocID: 1tp0D - View Document

Authentication in Quantum Key Distribution: Security Proof and Universal Hash Functions

DocID: 1tgQg - View Document

Summary of the Theory Component of Quantum Key Distribution and Quantum Cryptography

DocID: 1sHBk - View Document

Summary of Implementation Schemes for Quantum Key Distribution and Quantum Cryptography

DocID: 1rArg - View Document