First Page | Document Content | |
---|---|---|
Date: 2012-06-18 20:01:55Applied mathematics Quantum information science Kish cypher Quantum key distribution Quantum computer Key size Information-theoretic security Man-in-the-middle attack Noisy-storage model Cryptography Quantum cryptography Theoretical computer science | Add to Reading ListSource URL: arxiv.orgDownload Document from Source WebsiteFile Size: 547,01 KBShare Document on Facebook |
Experimental Decoy State Quantum Key Distribution with Unconditional Security Incorporating Finite Statistics Jun Hasegawa ERATO-SORST, JSTDocID: 1u5WD - View Document | |
Institutionen för systemteknik Department of Electrical Engineering Examensarbete Quantum Key Distribution - current state of the technology and prospects in the near future.DocID: 1tp0D - View Document | |
Authentication in Quantum Key Distribution: Security Proof and Universal Hash FunctionsDocID: 1tgQg - View Document | |
Summary of the Theory Component of Quantum Key Distribution and Quantum CryptographyDocID: 1sHBk - View Document | |
Summary of Implementation Schemes for Quantum Key Distribution and Quantum CryptographyDocID: 1rArg - View Document |