<--- Back to Details
First PageDocument Content
Applied mathematics / Quantum information science / Kish cypher / Quantum key distribution / Quantum computer / Key size / Information-theoretic security / Man-in-the-middle attack / Noisy-storage model / Cryptography / Quantum cryptography / Theoretical computer science
Date: 2012-06-18 20:01:55
Applied mathematics
Quantum information science
Kish cypher
Quantum key distribution
Quantum computer
Key size
Information-theoretic security
Man-in-the-middle attack
Noisy-storage model
Cryptography
Quantum cryptography
Theoretical computer science

Add to Reading List

Source URL: arxiv.org

Download Document from Source Website

File Size: 547,01 KB

Share Document on Facebook

Similar Documents

Experimental Decoy State Quantum Key Distribution with Unconditional Security Incorporating Finite Statistics Jun Hasegawa ERATO-SORST, JST

DocID: 1u5WD - View Document

Institutionen för systemteknik Department of Electrical Engineering Examensarbete Quantum Key Distribution - current state of the technology and prospects in the near future.

DocID: 1tp0D - View Document

Authentication in Quantum Key Distribution: Security Proof and Universal Hash Functions

DocID: 1tgQg - View Document

Summary of the Theory Component of Quantum Key Distribution and Quantum Cryptography

DocID: 1sHBk - View Document

Summary of Implementation Schemes for Quantum Key Distribution and Quantum Cryptography

DocID: 1rArg - View Document