<--- Back to Details
First PageDocument Content
Applied mathematics / Decoy state / Quantum key distribution / ETSI Satellite Digital Radio / Information-theoretic security / Man-in-the-middle attack / European Telecommunications Standards Institute / Security parameter / Cryptographic protocol / Quantum cryptography / Cryptography / Quantum information science
Date: 2010-12-09 09:45:52
Applied mathematics
Decoy state
Quantum key distribution
ETSI Satellite Digital Radio
Information-theoretic security
Man-in-the-middle attack
European Telecommunications Standards Institute
Security parameter
Cryptographic protocol
Quantum cryptography
Cryptography
Quantum information science

GS QKD[removed]V1[removed]Quantum Key Distribution (QKD); Security Proofs

Add to Reading List

Source URL: www.etsi.org

Download Document from Source Website

File Size: 137,48 KB

Share Document on Facebook

Similar Documents

Information-Theoretic Security Analysis of Physical Uncloneable Functions  c, S. Stallinga, A.H.M. Akkermans, W. Ophey P. Tuyls, B. Skori Philips Research Laboratories, Prof. Holstlaan 4,

DocID: 1ujMY - View Document

Secure or Insure? A Game-Theoretic Analysis of Information Security Games Jens Grossklags Nicolas Christin

DocID: 1rBzP - View Document

Cryptography / Key management / Public-key cryptography / Public key infrastructure / DiffieHellman key exchange / Key-agreement protocol / Information-theoretic security / IEEE 802.11 / RSA / Key generation / Key distribution / Secure channel

Random Channel Hopping Schemes for Key Agreement in Wireless Networks Bin Zan Marco Gruteser

DocID: 1r3wb - View Document

Cryptography / Cryptographic protocols / Secure multi-party computation / Public-key cryptography / Oblivious transfer / Information-theoretic security / Secure two-party computation / Commitment scheme

ETH Zurich, Department of Computer Science FS 2015 Prof. Dr. Ueli Maurer Dr. Martin Hirt Sandro Coretti

DocID: 1qUxu - View Document

Cryptography / Wireless networking / Vehicle telematics / Public-key cryptography / Emerging technologies / Driving / Vehicle-to-vehicle / Vehicular communication systems / Information-theoretic security / Dedicated short-range communications / IEEE 802.11 / Key distribution

C:/Users/Bin/Documents/proposal/proposalTex/security/secretKeyNew/final_for_TVT/BinZanTVT.dvi

DocID: 1qGUn - View Document