First Page | Document Content | |
---|---|---|
![]() Date: 2012-06-18 20:01:55Applied mathematics Quantum information science Kish cypher Quantum key distribution Quantum computer Key size Information-theoretic security Man-in-the-middle attack Noisy-storage model Cryptography Quantum cryptography Theoretical computer science | Source URL: arxiv.orgDownload Document from Source WebsiteFile Size: 547,01 KBShare Document on Facebook |
![]() | Programm_Qrypt2011_A5.inddDocID: 1rmsV - View Document |
![]() | Continuous-Variable Protocols in the Noisy-Quantum-Storage Model Fabian Furrer,1, 2 Christian Schaffner,3, 4 and Stephanie Wehner5 1) NTT Basic Research Laboratories, NTT Corporation, 3-1 Morinosato-Wakamiya, Atsugi, KanDocID: 1lbyz - View Document |
![]() | Relativistic quantum cryptography Jed Kaniewski Centre for Quantum Technologies, NUS QuTech, TU Delft 23 March 2015DocID: 19AbQ - View Document |
![]() | Beating cyber criminals with quantum solutionsDocID: 114oo - View Document |
![]() | A High Speed Quantum Communication TestbedDocID: CWoD - View Document |