First Page | Document Content | |
---|---|---|
![]() Date: 2015-04-02 14:17:26Quantum information science Cryptographic hash functions Post-quantum cryptography McEliece cryptosystem Quantum key distribution NIST hash function competition Quantum computer Advanced Encryption Standard Symmetric-key algorithm Cryptography Quantum cryptography Public-key cryptography | Add to Reading List |
![]() | Experimental Decoy State Quantum Key Distribution with Unconditional Security Incorporating Finite Statistics Jun Hasegawa ERATO-SORST, JSTDocID: 1u5WD - View Document |
![]() | Institutionen för systemteknik Department of Electrical Engineering Examensarbete Quantum Key Distribution - current state of the technology and prospects in the near future.DocID: 1tp0D - View Document |
![]() | Authentication in Quantum Key Distribution: Security Proof and Universal Hash FunctionsDocID: 1tgQg - View Document |
![]() | Summary of the Theory Component of Quantum Key Distribution and Quantum CryptographyDocID: 1sHBk - View Document |
![]() | Summary of Implementation Schemes for Quantum Key Distribution and Quantum CryptographyDocID: 1rArg - View Document |