<--- Back to Details
First PageDocument Content
Encryption / Quantum key distribution / Data security / Network Security & Cryptography / Secure communication / Cryptography / Security / Espionage
Date: 2005-03-21 15:42:09
Encryption
Quantum key distribution
Data security
Network Security & Cryptography
Secure communication
Cryptography
Security
Espionage

Add to Reading List

Source URL: ee.tamu.edu

Download Document from Source Website

File Size: 92,47 KB

Share Document on Facebook

Similar Documents

Experimental Decoy State Quantum Key Distribution with Unconditional Security Incorporating Finite Statistics Jun Hasegawa ERATO-SORST, JST

DocID: 1u5WD - View Document

Institutionen för systemteknik Department of Electrical Engineering Examensarbete Quantum Key Distribution - current state of the technology and prospects in the near future.

DocID: 1tp0D - View Document

Authentication in Quantum Key Distribution: Security Proof and Universal Hash Functions

DocID: 1tgQg - View Document

Summary of the Theory Component of Quantum Key Distribution and Quantum Cryptography

DocID: 1sHBk - View Document

Summary of Implementation Schemes for Quantum Key Distribution and Quantum Cryptography

DocID: 1rArg - View Document