<--- Back to Details
First PageDocument Content
Quantum cryptography / Applied mathematics / Quantum key distribution / BB84 / Quantum entanglement / Kerberos / Quantum computer / Password / Key size / Cryptography / Theoretical computer science / Quantum information science
Date: 2007-10-26 01:00:00
Quantum cryptography
Applied mathematics
Quantum key distribution
BB84
Quantum entanglement
Kerberos
Quantum computer
Password
Key size
Cryptography
Theoretical computer science
Quantum information science

Authentication and Authorization Using Entangled Photons

Add to Reading List

Source URL: csrc.nist.gov

Download Document from Source Website

File Size: 235,87 KB

Share Document on Facebook

Similar Documents

Quantum information science / Theoretical computer science / Quantum mechanics / Quantum cryptography / Cryptography / Quantum computing / BB84 / Qubit / Quantum key distribution / Quantum information / Controlled NOT gate / Quantum money

Lecture 8, Thurs Feb 9: More on Quantum Money, BB84 QKD Guest Lecture by Supartha Podder Continuation of Quantum Money Last time we discussed how classical money is copyable and described a scheme for making money uncopy

DocID: 1xUoL - View Document

Quantum cryptography / Cryptography / Theoretical computer science / Quantum mechanics / Quantum key distribution / Quantum network / Quantum computing / Noisy-storage model / Nicolas Gisin / Artur Ekert / BB84

Programm_Qrypt2011_A5.indd

DocID: 1rmsV - View Document

Quantum cryptography / Cryptography / Quantum information science / Theoretical computer science / Physics / Quantum key distribution / BB84 / Photon / Quantum network

Quantum  cryptography  with   pseudorandom  bases  and  the   problem  of  quantum  state   discrimina8on   P.A.  Tregubov  and  A.S.  Trushechkin    

DocID: 1qvy1 - View Document

Quantum information science / Quantum cryptography / Error detection and correction / Cryptography / Coding theory / Quantum key distribution / Low-density parity-check code / BB84 / Hash function / Alexander Holevo

Post-processing procedure for industrial quantum key distribution systems arXiv:E.O. Kiktenko1,2 , A.S. Trushechkin2,3 , R.U. Valiev1,4 , Y.V. Kurochkin1 , and A.K. Fedorov1,2 1 Russian

DocID: 1p1nV - View Document

Quantum cryptography / Quantum information science / Cryptography / Emerging technologies / Quantum computing / Quantum key distribution / Quantum network / Public-key cryptography / Quantum mechanics / BB84 / Photon / Three-stage quantum cryptography protocol

Quantum cryptography in RQC Moscow, 2016 The quantum cryptography provide solution which is impossible in classical world

DocID: 1oUkS - View Document