Quantum cryptography

Results: 548



#Item
151Secure Communication based on Quantum Cryptography / Quantum key distribution / Quantum network / Key distribution / Telecommunication / Public-key cryptography / Network switch / Wavelength-division multiplexing / Node / Cryptography / Quantum cryptography / Quantum information science

PDF Document

Add to Reading List

Source URL: quantumrepeaters.eu

Language: English - Date: 2015-01-14 06:03:52
152Quantum cryptography / Cryptography / Polarization / Quantum key distribution / BB84 / Photon / Introduction to quantum mechanics / Polarizing filter / Physics / Quantum information science / Quantum mechanics

Quantum Cryptography Umesh V. Vazirani CSNovember 28, 2005 Why Quantum Cryptography?

Add to Reading List

Source URL: www-inst.eecs.berkeley.edu

Language: English - Date: 2005-12-04 23:43:39
153Cryptography / Applied mathematics / Quantum information science / Quantum cryptography / Cyberwarfare / Security / Quantum mechanics / Quantum money / Public-key cryptography

New constructions for Quantum Money Iordanis Kerenidis CNRS-Univ Paris Diderot joint work with Marios Georgiou

Add to Reading List

Source URL: www.pcqc.fr

Language: English - Date: 2015-03-25 23:26:32
154Automorphic forms / Post-quantum cryptography / Analytic number theory / Modular forms / Number theorists / NTRUEncrypt / Joseph H. Silverman / NTRU / Jill Pipher / Mathematical analysis / Mathematics / Abstract algebra

1. J. Hoffstein, A. Kontorovich, The first non-vanishing quadratic twist of an automorphic L-series, preprint 2. S. Ganguly, J. Hoffstein, J. Sengupta, Determining modular forms on SL(2, Z) by central values of convoluti

Add to Reading List

Source URL: www.math.brown.edu

Language: English - Date: 2009-09-09 20:10:33
155Quantum cryptography / Classes of computers / Computing / Quantum information theory / Cryptography / Quantum key distribution / Quantum information / Quantum computer / Actor model / Theoretical computer science / Applied mathematics / Quantum information science

Rodney D. Van Meter IIIZaimokuza Kamakura, Kanagawa-ken, Japanmobile: +email: , http://web.sfc.keio.ac.jp/˜rdv/

Add to Reading List

Source URL: web.sfc.keio.ac.jp

Language: English - Date: 2009-07-20 23:44:35
156Physics / Security token / Quantum channel / Quantum cryptography / Cryptography / Computational complexity theory / Theoretical computer science / Applied mathematics / Quantum information science

Microsoft PowerPoint - Broadbent-QOTP-Paris-for-posting.pptx

Add to Reading List

Source URL: www.pcqc.fr

Language: English - Date: 2015-04-05 22:49:05
157Partial differential equations / Post-quantum cryptography / Number theorists / Jill Pipher / Fourier analysis / Differential operators / NTRUEncrypt / NTRU / Dirichlet problem / Mathematical analysis / Mathematics / Calculus

Curriculum Vitae: Jill C. Pipher ACADEMIC DEGREES B.A. in Mathematics, UCLA, 1979 PhD. in Mathematics, UCLA, 1985, Harmonic Analysis

Add to Reading List

Source URL: www.math.brown.edu

Language: English - Date: 2015-01-15 13:34:56
158Quantum cryptography / Classes of computers / Computing / Quantum information theory / Cryptography / Quantum key distribution / Quantum information / Quantum computer / Actor model / Theoretical computer science / Applied mathematics / Quantum information science

Rodney D. Van Meter IIIZaimokuza Kamakura, Kanagawa-ken, Japanmobile: +email: , http://web.sfc.keio.ac.jp/˜rdv/

Add to Reading List

Source URL: web.sfc.keio.ac.jp

Language: English - Date: 2009-07-20 23:44:35
159Applied mathematics / Fourier analysis / Information theory / Quantum computer / Quantum cryptography / Nuclear magnetic resonance / Fourier series / Qubit / Fourier transform / Theoretical computer science / Mathematical analysis / Joseph Fourier

PHYSICAL REVIEW A 90, Fast adiabatic qubit gates using only σ z control John M. Martinis Department of Physics, University of California, Santa Barbara, California 93106, USA

Add to Reading List

Source URL: www.physast.uga.edu

Language: English - Date: 2014-12-04 14:10:42
160Security / Paillier cryptosystem / Merkle–Hellman knapsack cryptosystem / Niederreiter cryptosystem / Cryptography / Post-quantum cryptography / Cryptosystem / RSA / Semantic security / Public-key cryptography / Cyberwarfare / Applied mathematics

Noname manuscript No. (will be inserted by the editor) Generalizing Cryptosystems Based on the Subset Sum Problem Aniket Kate · Ian Goldberg

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2011-05-05 15:39:42
UPDATE