Quantum cryptography

Results: 548



#Item
491Quantum mechanics / Qubit / Quantum computer / Quantum information / Quantum cryptography / Photon / Spin / Physical information / Quantum teleportation / Physics / Theoretical computer science / Quantum information science

Abstract. Technology is the sum of the information, knowledge and agency. This takes energy and information as fundamental concepts. In this paper I’ll try to describe very briefly in popular form of some applications

Add to Reading List

Source URL: www.medicine-science.net23.net

Language: English - Date: 2013-02-01 02:02:53
492Espionage / Applied mathematics / Quantum key distribution / Secure communication / One-time pad / Key distribution / Key management / Secure voice / Secure Communication based on Quantum Cryptography / Cryptography / Quantum cryptography / Quantum information science

October 14, 2010 Press Release Inauguration of the Tokyo QKD Network ~ Ultimate secure communication at the world’s highest bit rate on a metropolitan fiber network in Tokyo ~

Add to Reading List

Source URL: www.mitsubishielectric.com

Language: English - Date: 2014-02-17 01:20:19
493Cryptography / Quantum information science / Quantum key distribution / Photon / BB84 / Bell test experiments / Alice and Bob / Decoy state / Physics / Quantum cryptography / Quantum mechanics

Perfect eavesdropping on a quantum cryptography system Ilja Gerhardt,1, 2 Qin Liu,1, 3 Ant´ıa Lamas-Linares,2 Johannes Skaar,3, 4 Christian Kurtsiefer,2, a) and Vadim Makarov3, b) 1) These authors contributed equally t

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2010-11-01 20:12:12
494Models of computation / Information theory / Quantum computer / Quantum cryptography / Qubit / Theoretical computer science / Quantum information science / Applied mathematics

Introduction Known Results: Cases (a) and (b) Completing the Characterization: Cases (c) and (d) The Minimum Size of Qubit Unextendible Product Bases

Add to Reading List

Source URL: www.njohnston.ca

Language: English - Date: 2013-05-23 22:57:56
495Quantum information science / Post-quantum cryptography / Theoretical computer science / Quantum cryptography / Lattice problem / Quantum computer / Quantum algorithm / McEliece cryptosystem / Qubit / Cryptography / Mathematics / Applied mathematics

Post-Quantum Signatures Johannes Buchmann Carlos Coronado Daniela Engelbert

Add to Reading List

Source URL: itslab.csce.kyushu-u.ac.jp

Language: English - Date: 2012-07-09 05:17:42
496Elliptic curves / Public-key cryptography / Elliptic curve cryptography / NTRU / Elliptic Curve DSA / Lattice problem / Counting points on elliptic curves / Hyperelliptic curve cryptography / Elliptic curve / Cryptography / Post-quantum cryptography / Finite fields

References [1] M. Agrawal, N. Kayal, and N. Saxena. PRIMES is in P. Ann. of Math. (2), 160(2):781–793, [removed]L. V. Ahlfors. Complex Analysis. McGraw-Hill Book Co., New York, third edition, 1978. An introduction to

Add to Reading List

Source URL: www.math.brown.edu

Language: English - Date: 2008-03-20 11:42:48
497Quantum information science / Quantum cryptography / Quantum information theory / Quantum measurement / Qubit / Quantum entanglement / Quantum computer / Quantum information / Quantum state / Physics / Theoretical computer science / Quantum mechanics

Isaac Newton Institute for Mathematical Sciences Quantum Information Science 16 August – 17 December 2004 Organisers: Dr CH Bennett (IBM Yorktown), Dr DP DiVincenzo (IBM Yorktown), Professor N Linden (Bristol), Profes

Add to Reading List

Source URL: www.newton.ac.uk

Language: English - Date: 2004-09-07 05:43:35
498Cryptographic protocols / Post-quantum cryptography / Elliptic curve cryptography / NTRU / Outline of cryptography / Cryptanalysis / Lattice-based cryptography / Alice and Bob / Diffie–Hellman key exchange / Cryptography / Public-key cryptography / Finite fields

Preface The creation of public key cryptography by Diffie and Hellman in 1976 and the subsequent invention of the RSA public key cryptosystem by Rivest, Shamir, and Adleman in 1978 are watershed events in the long histor

Add to Reading List

Source URL: www.math.brown.edu

Language: English - Date: 2008-03-20 11:45:18
499Post-quantum cryptography / Quantum cryptography / Key size / Quantum computer / NTRU / Digital signature / Elliptic Curve DSA / Cipher / XTR / Cryptography / Public-key cryptography / Key management

Post-Quantum Cryptography Tanja Lange Technische Universiteit Eindhoven [removed] 17 December 2008

Add to Reading List

Source URL: hyperelliptic.org

Language: English - Date: 2009-01-22 19:45:07
UPDATE