<--- Back to Details
First PageDocument Content
Quantum information science / Quantum key distribution / Key-agreement protocol / Internet Key Exchange / IPsec / BB84 / Man-in-the-middle attack / Internet Security Association and Key Management Protocol / Alice and Bob / Cryptography / Cryptographic protocols / Quantum cryptography
Date: 2003-07-24 11:26:24
Quantum information science
Quantum key distribution
Key-agreement protocol
Internet Key Exchange
IPsec
BB84
Man-in-the-middle attack
Internet Security Association and Key Management Protocol
Alice and Bob
Cryptography
Cryptographic protocols
Quantum cryptography

Quantum Cryptography in Practice Chip Elliott Dr. David Pearson Dr. Gregory Troxel

Add to Reading List

Source URL: conferences.sigcomm.org

Download Document from Source Website

File Size: 793,75 KB

Share Document on Facebook

Similar Documents

Post-quantum key exchange for the Internet based on lattices Joppe Bos, Craig Costello, Léo Ducas, Ilya Mironov, Michael Naehrig, Valeria Nikolaenko, Ananth Raghunathan, Douglas Stebila  Part 1:

Post-quantum key exchange for the Internet based on lattices Joppe Bos, Craig Costello, Léo Ducas, Ilya Mironov, Michael Naehrig, Valeria Nikolaenko, Ananth Raghunathan, Douglas Stebila Part 1:

DocID: 1v3VQ - View Document

Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols ∗ William Aiello AT&T Labs Research

Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols ∗ William Aiello AT&T Labs Research

DocID: 1v3dI - View Document

Implementing Internet Key Exchange (IKE) Niklas Hallqvist Applitron Datasystem AB  Angelos D. Keromytis

Implementing Internet Key Exchange (IKE) Niklas Hallqvist Applitron Datasystem AB Angelos D. Keromytis

DocID: 1t0ZF - View Document

Cryptography / E-commerce / Stock market / Key management / Public key infrastructure / Public-key cryptography / Password / Electronic trading / Certificate authority / Futures exchange / Security / Computer security

Guide to ensure information and communications security In the information society and globalized world of today, people are becoming more and more connected to their computers and the Internet. As a result, electronic t

DocID: 1rsa9 - View Document

Cryptography / Public-key cryptography / Public key infrastructure / Cryptographic protocols / Key management / Transport Layer Security / Public key certificate / X.509 / Certificate authority / Transmission Control Protocol / Internet Key Exchange

Item Title Consolidated iTC Feedback – DNcPPv2 SD Reviewer iTC Editorial Team Item Identifier NDcPPv2 Supporting Document

DocID: 1r0j0 - View Document