<--- Back to Details
First PageDocument Content
Physics / Qubit / Bell state / Quantum key distribution / Quantum cryptography / Greenberger–Horne–Zeilinger state / Quantum teleportation / Superdense coding / Quantum information science / Theoretical computer science / Quantum mechanics
Date: 2007-10-26 01:00:00
Physics
Qubit
Bell state
Quantum key distribution
Quantum cryptography
Greenberger–Horne–Zeilinger state
Quantum teleportation
Superdense coding
Quantum information science
Theoretical computer science
Quantum mechanics

Vulnerabilities in Quantum Key Distribution Protocols D. Richard Kuhn [removed] National Institute of Standards and Technology Abstract. Recently proposed quantum key distribution protocols are shown to be vulnerable

Add to Reading List

Source URL: csrc.nist.gov

Download Document from Source Website

File Size: 26,78 KB

Share Document on Facebook

Similar Documents

Experimental Decoy State Quantum Key Distribution with Unconditional Security Incorporating Finite Statistics Jun Hasegawa ERATO-SORST, JST

Experimental Decoy State Quantum Key Distribution with Unconditional Security Incorporating Finite Statistics Jun Hasegawa ERATO-SORST, JST

DocID: 1u5WD - View Document

Institutionen för systemteknik Department of Electrical Engineering Examensarbete Quantum Key Distribution - current state of the technology and prospects in the near future.

Institutionen för systemteknik Department of Electrical Engineering Examensarbete Quantum Key Distribution - current state of the technology and prospects in the near future.

DocID: 1tp0D - View Document

Authentication in Quantum Key Distribution: Security Proof and Universal Hash Functions

Authentication in Quantum Key Distribution: Security Proof and Universal Hash Functions

DocID: 1tgQg - View Document

Summary of the Theory Component of Quantum Key Distribution and  Quantum Cryptography

Summary of the Theory Component of Quantum Key Distribution and Quantum Cryptography

DocID: 1sHBk - View Document

Summary of Implementation Schemes for Quantum Key Distribution and  Quantum Cryptography

Summary of Implementation Schemes for Quantum Key Distribution and Quantum Cryptography

DocID: 1rArg - View Document