<--- Back to Details
First PageDocument Content
Quantum cryptography / Applied mathematics / Quantum key distribution / BB84 / Quantum entanglement / Kerberos / Quantum computer / Password / Key size / Cryptography / Theoretical computer science / Quantum information science
Date: 2007-10-26 01:00:00
Quantum cryptography
Applied mathematics
Quantum key distribution
BB84
Quantum entanglement
Kerberos
Quantum computer
Password
Key size
Cryptography
Theoretical computer science
Quantum information science

Authentication and Authorization Using Entangled Photons

Add to Reading List

Source URL: csrc.nist.gov

Download Document from Source Website

File Size: 235,87 KB

Share Document on Facebook

Similar Documents

Cryptography / Post-quantum cryptography / Public-key cryptography / Hashing / Error detection and correction / Digital signature / Hash chain / XMSS / Cryptographic hash function / Merkle tree / Hash function / Key

Hash-based signatures Joost Rijneveld Radboud University, Nijmegen, The Netherlands Post-quantum cryptography

DocID: 1xVpf - View Document

Cryptography / Emerging technologies / Quantum computing / Quantum cryptography / Theoretical computer science / Post-quantum cryptography / Applied mathematics / Mathematics

Tenth International Conference on Post-Quantum Cryptography PQCrypto 2019 Chongqing, China, May 8–10, 2019 pqcrypto2019.org

DocID: 1xVmD - View Document

Emerging technologies / Quantum computing / Theoretical computer science / Quantum cryptography / Cryptography / Quantum information science / Technology / Applied mathematics / Post-quantum cryptography / Internet of things

Implementing Post-Quantum Cryptography on the Cortex M4 Matthias Kannwischer, Joost Rijneveld, Peter Schwabe, and Ko Stoffelen Radboud University, Nijmegen, The Netherlands

DocID: 1xVaG - View Document

Cryptography / Post-quantum cryptography / Trusted Computing / Public-key cryptography / Quantum cryptography / Key size / Advanced Encryption Standard process

Practical Post-Quantum Cryptography for Trusted Computing Matthias J. Kannwischer, PhD Student Workshop on Trusted Computing and its Applications 25 January 2018

DocID: 1xTFq - View Document

F R A U N H O F E R I N S T I T U T E F O R S E C U R E I N F O R M AT I O N T E C H N O L O G Y White Paper Practical Post-Quantum Cryptography

DocID: 1vqNn - View Document