Quantum cryptography

Results: 548



#Item
31Position-Based Quantum Cryptography: Impossibility and Constructions Full version available at http://arxiv.org/absHarry Buhrman∗ Vipul Goyal§

Position-Based Quantum Cryptography: Impossibility and Constructions Full version available at http://arxiv.org/absHarry Buhrman∗ Vipul Goyal§

Add to Reading List

Source URL: qip2011.quantumlah.org

- Date: 2011-01-03 00:32:15
    32Weaknesses of Authentication in Quantum Cryptography and Strongly Universal Hash Functions

    Weaknesses of Authentication in Quantum Cryptography and Strongly Universal Hash Functions

    Add to Reading List

    Source URL: liu.diva-portal.org

    - Date: 2010-06-16 03:36:14
      33Standardization of post-quantum cryptography Tanja Lange 08 May 2016 A Workshop About Cryptographic Standards

      Standardization of post-quantum cryptography Tanja Lange 08 May 2016 A Workshop About Cryptographic Standards

      Add to Reading List

      Source URL: www.cryptoexperts.com

      - Date: 2016-05-30 09:49:30
        34Summary of the Theory Component of Quantum Key Distribution and  Quantum Cryptography

        Summary of the Theory Component of Quantum Key Distribution and Quantum Cryptography

        Add to Reading List

        Source URL: qist.lanl.gov

        - Date: 2004-07-27 17:15:26
          35Full-field implementation of a perfect eavesdropper on a quantum cryptography system arXiv:1011.0105v2 [quant-ph] 18 MarIlja Gerhardt,1, 2 Qin Liu,1, 3 Ant´ıa Lamas-Linares,2 Johannes Skaar,3, 4 Christian Kurtsi

          Full-field implementation of a perfect eavesdropper on a quantum cryptography system arXiv:1011.0105v2 [quant-ph] 18 MarIlja Gerhardt,1, 2 Qin Liu,1, 3 Ant´ıa Lamas-Linares,2 Johannes Skaar,3, 4 Christian Kurtsi

          Add to Reading List

          Source URL: arxiv.org

          - Date: 2012-03-19 20:23:48
            36FIRST ANNUAL CONFERENCE ON QUANTUM CRYPTOGRAPHY  www.qcrypt.net ETH Zurich

            FIRST ANNUAL CONFERENCE ON QUANTUM CRYPTOGRAPHY www.qcrypt.net ETH Zurich

            Add to Reading List

            Source URL: www.qcrypt2011.ethz.ch

            - Date: 2011-04-27 08:27:29
              37Quantum cryptography: a practical information security perspective∗ Kenneth G. Paterson, Fred Piper and R¨ udiger Schack Department of Mathematics, Royal Holloway, University of London Egham, Surrey TW20 0EX, UK

              Quantum cryptography: a practical information security perspective∗ Kenneth G. Paterson, Fred Piper and R¨ udiger Schack Department of Mathematics, Royal Holloway, University of London Egham, Surrey TW20 0EX, UK

              Add to Reading List

              Source URL: eprint.iacr.org

              - Date: 2009-08-11 10:17:38
                38Summary of Implementation Schemes for Quantum Key Distribution and  Quantum Cryptography

                Summary of Implementation Schemes for Quantum Key Distribution and Quantum Cryptography

                Add to Reading List

                Source URL: qist.lanl.gov

                - Date: 2004-07-27 17:15:17
                  39Programm_Qrypt2011_A5.indd

                  Programm_Qrypt2011_A5.indd

                  Add to Reading List

                  Source URL: www.qcrypt2011.ethz.ch

                  Language: English - Date: 2011-09-07 05:34:37
                  40Summary of Implementation Schemes for Quantum Key Distribution and  Quantum Cryptography

                  Summary of Implementation Schemes for Quantum Key Distribution and Quantum Cryptography

                  Add to Reading List

                  Source URL: qist.lanl.gov

                  Language: English - Date: 2004-07-27 17:15:17