Back to Results
First PageMeta Content
Quantum cryptography / Computational complexity theory / Quantum information science / Quantum key distribution / XTR / Leftover hash lemma / Quantum computer / Expected value / Entanglement distillation / Cryptography / Theoretical computer science / Applied mathematics


Unconditional Security in Quantum Cryptography DOMINIC MAYERS NEC Research Institute, Princeton, New Jersey
Add to Reading List

Document Date: 2004-09-28 21:44:14


Open Document

File Size: 385,59 KB

Share Result on Facebook

Currency

USD / /

/

Event

Person Communication and Meetings / /

Facility

Princeton University / Quantum Cryptography DOMINIC MAYERS NEC Research Institute / NEC Research Institute / /

IndustryTerm

quantum protocol / quantum communication devices / proposed quantum key distribution protocol / quantum computing devices / quantum key distribution protocols / quantum protocols / quantum key distribution protocol / basic tool / /

NaturalFeature

Shannon / /

Organization

Department of Computer Science / Quantum Cryptography DOMINIC MAYERS NEC Research Institute / Princeton University / NEC Research Institute / Association for Computing Machinery / /

Person

Bob / Alice / DOMINIC MAYERS / /

Position

author / Prime Minister / General / /

ProgrammingLanguage

K / /

ProvinceOrState

New Jersey / Prince Edward Island / /

PublishedMedium

Journal of the ACM / /

Technology

Encryption / quantum protocols / quantum protocol / QKD protocol / Cryptography / public key / quantum key distribution protocols / proposed quantum key distribution protocol / secret key / specific protocol / quantum key distribution protocol / /

SocialTag