Quantum cryptography

Results: 548



#Item
161Cryptography / Quantum information science / Man-in-the-middle attack / Quantum computer / Quantum key distribution / Noisy-storage model / Quantum cryptography / Theoretical computer science / Applied mathematics

Relativistic quantum cryptography Jed Kaniewski Centre for Quantum Technologies, NUS QuTech, TU Delft 23 March 2015

Add to Reading List

Source URL: www.pcqc.fr

Language: English - Date: 2015-03-25 23:25:36
162Models of computation / Computational complexity theory / Information theory / Quantum computer / Quantum cryptography / Quantum gate / Quantum circuit / Relaxation / Qubit / Theoretical computer science / Quantum information science / Applied mathematics

PHYSICAL REVIEW B 82, 104522 共2010兲 Analysis of a tunable coupler for superconducting phase qubits Ricardo A. Pinto and Alexander N. Korotkov* Department of Electrical Engineering, University of California, Riversid

Add to Reading List

Source URL: www.physast.uga.edu

Language: English - Date: 2010-12-15 11:27:20
163Quantum information science / Quantum cryptography / Canada Research Chairs / Quantum key distribution / Institute for Quantum Computing / Secure Communication based on Quantum Cryptography / Michele Mosca / Quantum computer / Centre for Applied Cryptographic Research / Cryptography / Quantum mechanics / Theoretical computer science

Quantum-Safe-Crypto Workshop Programme Committee - Biographies Charles BROOKSON, ETSI OCG Security Chairman Charles worked recently in the Department for Business, Innovation and Skills of the United Kingdom Government f

Add to Reading List

Source URL: docbox.etsi.org

Language: English - Date: 2013-09-25 02:21:27
164Machine learning / AKA / Secure Shell / Perfect forward secrecy / Data / Information / Computing / Cryptography / Cryptographic protocols / Learning with errors

Post-quantum Authenticated Key Exchange from Ideal Lattices ¨ u¨ r Dagdelen3 Jiang Zhang1 , Zhenfeng Zhang1,∗ , Jintai Ding2,∗ , Michael Snook2 , and Ozg 1 Institute of Software, Chinese Academy of Sciences, China

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-09 11:41:32
165Alice and Bob / Applied mathematics / Mathematics / Quantum key distribution / Quantum information science / Cryptography / Quantum cryptography

Quantum Key Recycling Joint work with Ivan Damg˚ ard and Louis Salvail Thomas B. Pedersen

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2005-08-31 11:29:17
166Diffie–Hellman key exchange / Key management / Elliptic curve Diffie–Hellman / Quantum key distribution / RSA / Key exchange / Key / SPEKE / Integrated Encryption Scheme / Cryptography / Cryptographic protocols / Public-key cryptography

CODING CONCEPTS TUTORIAL BEN EVERARD WHY DO THIS? • Understand advanced

Add to Reading List

Source URL: www.linuxvoice.com

Language: English - Date: 2015-01-08 10:21:45
167Theoretical computer science / Year of birth missing / Centre for Quantum Technologies / National University of Singapore / Quantum cryptography / Vlatko Vedral / Artur Ekert / Institute for Quantum Computing / Quantum key distribution / Physics / Quantum mechanics / Quantum information science

Centr e fo r Qu ant um Techn ologies Contents

Add to Reading List

Source URL: www.quantumlah.org

Language: English - Date: 2011-01-24 01:34:22
168Theoretical computer science / Quantum cryptography / Quantum computer / Post-quantum cryptography / Digital signature / Quantum algorithm / Key size / Cryptographic primitive / Elliptic curve cryptography / Cryptography / Public-key cryptography / Key management

Evaluating Post-Quantum Asymmetric Cryptographic Algorithm Candidates

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-03 09:28:55
169Post-quantum cryptography / Key size / Cloud computing / Alice and Bob / Cryptography / Quantum cryptography / Quantum information science

PQCRYPTO project in the EU Tanja Lange 3 April 2015

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-03 09:35:45
170NTRUSign / Lattice-based cryptography / NTRU / Homomorphic encryption / Digital signature / Lattice problem / RSA / Elliptic curve cryptography / Lattice / Cryptography / Post-quantum cryptography / Public-key cryptography

Practical Lattice-based Digital Signature Schemes

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-09 11:42:22
UPDATE