First Page | Document Content | |
---|---|---|
Date: 2011-04-04 06:52:20Secure two-party computation Information-theoretic security Homomorphic encryption Public-key cryptography Quantum cryptography Cryptographic primitive Noisy-storage model Universal composability Cryptography Cryptographic protocols Secure multi-party computation | Add to Reading ListSource URL: u.cs.biu.ac.ilDownload Document from Source WebsiteFile Size: 144,24 KBShare Document on Facebook |
Programm_Qrypt2011_A5.inddDocID: 1rmsV - View Document | |
Continuous-Variable Protocols in the Noisy-Quantum-Storage Model Fabian Furrer,1, 2 Christian Schaffner,3, 4 and Stephanie Wehner5 1) NTT Basic Research Laboratories, NTT Corporation, 3-1 Morinosato-Wakamiya, Atsugi, KanDocID: 1lbyz - View Document | |
Relativistic quantum cryptography Jed Kaniewski Centre for Quantum Technologies, NUS QuTech, TU Delft 23 March 2015DocID: 19AbQ - View Document | |
Beating cyber criminals with quantum solutionsDocID: 114oo - View Document | |
A High Speed Quantum Communication TestbedDocID: CWoD - View Document |