Quantum cryptography

Results: 548



#Item
511Quantum cryptography / Computational complexity theory / Quantum information science / Quantum key distribution / XTR / Leftover hash lemma / Quantum computer / Expected value / Entanglement distillation / Cryptography / Theoretical computer science / Applied mathematics

Unconditional Security in Quantum Cryptography DOMINIC MAYERS NEC Research Institute, Princeton, New Jersey

Add to Reading List

Source URL: xxx.tau.ac.il

Language: English - Date: 2004-09-28 21:44:14
512Quantum information science / Cryptographic protocols / Quantum key distribution / Secure Communication based on Quantum Cryptography / Symmetric-key algorithm / Public-key cryptography / Key size / Key distribution / Key-agreement protocol / Cryptography / Key management / Quantum cryptography

SECOQC White Paper on Quantum Key Distribution and Cryptography

Add to Reading List

Source URL: www.secoqc.net

Language: English - Date: 2008-05-06 12:12:25
513Quantum complexity theory / Oblivious transfer / PP / Function / Verifiable computing / Cryptography / Theoretical computer science / Mathematics

A Proof of Security of Yao’s Protocol for Two-Party Computation Yehuda Lindell∗

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-01-11 03:00:15
514Theoretical computer science / Quantum cryptography / Emerging technologies / Cryptography / Quantum key distribution / Qubit / Quantum entanglement / Introduction to quantum mechanics / Quantum computer / Physics / Quantum information science / Quantum mechanics

Single and Entangled Photons Jonathan Papa Quantum computing is a sought after technology that will greatly increase the speed and

Add to Reading List

Source URL: www.optics.rochester.edu

Language: English - Date: 2011-11-06 21:01:09
515Quantum information science / Cryptography / Applied mathematics / Error detection and correction / Quantum key distribution / Low-density parity-check code / Information theory / Forward error correction / Channel / Quantum cryptography / Coding theory / Theoretical computer science

C:/Documents and Settings/rinton/Desktop/QIC11-3&4/QIC100710[removed]dvi

Add to Reading List

Source URL: www.dma.fi.upm.es

Language: English - Date: 2011-01-18 12:38:43
516Probability and statistics / Pseudorandom number generators / Information theory / Thermodynamic entropy / State functions / Hardware random number generator / Entropy / Random number generation / Cryptographically secure pseudorandom number generator / Cryptography / Randomness / Applied mathematics

Entropy Analysis and System Design for Quantum Random Number Generators in CMOS Integrated Circuits Scott A Wilber*

Add to Reading List

Source URL: comscire.com

Language: English - Date: 2013-07-16 10:30:47
517Computational complexity theory / Operations research / Quantum computer / Quantum cryptography / Tabu search / Algorithm / Quantum algorithm / Adiabatic quantum computation / Simulated annealing / Applied mathematics / Theoretical computer science / Mathematics

Experimental Evaluation of an Adiabatic Quantum System for Combinatorial Optimization Catherine C. McGeoch

Add to Reading List

Source URL: www.cs.amherst.edu

Language: English - Date: 2013-05-10 07:06:47
518Applied mathematics / Quantum teleportation / Qubit / Quantum information / Quantum key distribution / Quantum algorithm / Quantum state / Quantum entanglement / Quantum information science / Theoretical computer science / Physics

Position-Based Quantum Cryptography: Impossibility and Constructions Harry Buhrman∗

Add to Reading List

Source URL: www.cs.ucla.edu

Language: English - Date: 2010-09-14 00:29:31
519Post-quantum cryptography / Ø / Acute accent / Goppa code / Mathematics / Applied mathematics / Notation / ISO/IEC / C1 Controls and Latin-1 Supplement / Public-key cryptography / Electronic commerce / McEliece cryptosystem

Code-based Cryptography:Implementing the McEliece Scheme on Reconfigurable Hardware

Add to Reading List

Source URL: www.emsec.rub.de

Language: English - Date: 2010-04-20 22:07:38
520Post-quantum cryptography / Merkle signature scheme / Hashing / Digital signature / Cryptographic hash function / Digital Signature Algorithm / Elliptic Curve DSA / RSA / Hash function / Cryptography / Public-key cryptography / Key management

CMSS – An Improved Merkle Signature Scheme Johannes Buchmann1 , Luis Carlos Coronado Garc´ıa2 , Erik Dahmen1 , Martin D¨

Add to Reading List

Source URL: www.cdc.informatik.tu-darmstadt.de

Language: English - Date: 2006-10-23 05:39:57
UPDATE