First Page | Document Content | |
---|---|---|
Date: 2007-10-26 01:00:00Physics Qubit Bell state Quantum key distribution Quantum cryptography Greenberger–Horne–Zeilinger state Quantum teleportation Superdense coding Quantum information science Theoretical computer science Quantum mechanics | Vulnerabilities in Quantum Key Distribution Protocols D. Richard Kuhn [removed] National Institute of Standards and Technology Abstract. Recently proposed quantum key distribution protocols are shown to be vulnerableAdd to Reading ListSource URL: csrc.nist.govDownload Document from Source WebsiteFile Size: 26,78 KBShare Document on Facebook |
Experimental Decoy State Quantum Key Distribution with Unconditional Security Incorporating Finite Statistics Jun Hasegawa ERATO-SORST, JSTDocID: 1u5WD - View Document | |
Institutionen för systemteknik Department of Electrical Engineering Examensarbete Quantum Key Distribution - current state of the technology and prospects in the near future.DocID: 1tp0D - View Document | |
Authentication in Quantum Key Distribution: Security Proof and Universal Hash FunctionsDocID: 1tgQg - View Document | |
Summary of the Theory Component of Quantum Key Distribution and Quantum CryptographyDocID: 1sHBk - View Document | |
Summary of Implementation Schemes for Quantum Key Distribution and Quantum CryptographyDocID: 1rArg - View Document |