First Page | Document Content | |
---|---|---|
Date: 2012-06-18 20:01:55Applied mathematics Quantum information science Kish cypher Quantum key distribution Quantum computer Key size Information-theoretic security Man-in-the-middle attack Noisy-storage model Cryptography Quantum cryptography Theoretical computer science | Add to Reading ListSource URL: arxiv.orgDownload Document from Source WebsiteFile Size: 547,01 KBShare Document on Facebook |