Quantum cryptography

Results: 548



#Item
41Secure Multiparty Computation of Approximations∗ Joan Feigenbaum† Yuval Ishai‡  Martin J. Straussk

Secure Multiparty Computation of Approximations∗ Joan Feigenbaum† Yuval Ishai‡ Martin J. Straussk

Add to Reading List

Source URL: cs-www.cs.yale.edu

Language: English - Date: 2006-09-25 10:55:42
42Cavity QED Approaches to Quantum Information Processing and

Cavity QED Approaches to Quantum Information Processing and

Add to Reading List

Source URL: qist.lanl.gov

Language: English - Date: 2004-04-01 17:25:54
43The Garden-Hose Game and Application to Position-Based Quantum Cryptography Harry Buhrman, Serge Fehr, Christian Schaffner, Florian Speelman 12 September 2011

The Garden-Hose Game and Application to Position-Based Quantum Cryptography Harry Buhrman, Serge Fehr, Christian Schaffner, Florian Speelman 12 September 2011

Add to Reading List

Source URL: www.qcrypt2011.ethz.ch

Language: English - Date: 2011-09-18 10:01:18
44FIRST ANNUAL CONFERENCE ON QUANTUM CRYPTOGRAPHY  www.qcrypt.net ETH Zurich

FIRST ANNUAL CONFERENCE ON QUANTUM CRYPTOGRAPHY www.qcrypt.net ETH Zurich

Add to Reading List

Source URL: www.qcrypt2011.ethz.ch

Language: English - Date: 2011-04-27 08:27:21
45FIRST ANNUAL CONFERENCE ON QUANTUM CRYPTOGRAPHY  www.qcrypt.net ETH Zurich

FIRST ANNUAL CONFERENCE ON QUANTUM CRYPTOGRAPHY www.qcrypt.net ETH Zurich

Add to Reading List

Source URL: www.qcrypt2011.ethz.ch

- Date: 2011-04-27 08:27:29
    46Quantum Error Correction for Long-Distance Quantum Communication Institute of Physics, University of Mainz

    Quantum Error Correction for Long-Distance Quantum Communication Institute of Physics, University of Mainz

    Add to Reading List

    Source URL: www.qec14.ethz.ch

    Language: English - Date: 2014-12-23 08:36:51
    47Classical and Quantum Algorithms for Finding Cycles Jill Cirasella Computational Sciences Specialist Brooklyn College Library

    Classical and Quantum Algorithms for Finding Cycles Jill Cirasella Computational Sciences Specialist Brooklyn College Library

    Add to Reading List

    Source URL: jillcirasella.commons.gc.cuny.edu

    Language: English - Date: 2014-05-02 15:14:51
    481  Stronger Attacks on Causality-Based Key Agreement Benno Salwey and Stefan Wolf Faculty of Informatics, Universit`a della Svizzera Italiana, Via G. Buffi 13, 6900 Lugano, Switzerland

    1 Stronger Attacks on Causality-Based Key Agreement Benno Salwey and Stefan Wolf Faculty of Informatics, Universit`a della Svizzera Italiana, Via G. Buffi 13, 6900 Lugano, Switzerland

    Add to Reading List

    Source URL: cqi.inf.usi.ch

    Language: English - Date: 2016-01-25 05:30:01
    49Microsoft PowerPoint - qcryptCompatibility Mode]

    Microsoft PowerPoint - qcryptCompatibility Mode]

    Add to Reading List

    Source URL: www.qcrypt2011.ethz.ch

    Language: English - Date: 2011-09-26 13:39:03
    50LNCSParallel Repetition of Computationally Sound Protocols Revisited

    LNCSParallel Repetition of Computationally Sound Protocols Revisited

    Add to Reading List

    Source URL: www.nada.kth.se

    Language: English - Date: 2012-05-30 08:49:12