<--- Back to Details
First PageDocument Content
Quantum information science / Quantum mechanics / Theoretical computer science / Quantum computing / Physics / Emerging technologies / Teleportation / Quantum cryptography / Cavity quantum electrodynamics / Quantum error correction / Quantum teleportation / Qubit
Date: 2004-04-01 17:25:54
Quantum information science
Quantum mechanics
Theoretical computer science
Quantum computing
Physics
Emerging technologies
Teleportation
Quantum cryptography
Cavity quantum electrodynamics
Quantum error correction
Quantum teleportation
Qubit

Cavity QED Approaches to Quantum Information Processing and

Add to Reading List

Source URL: qist.lanl.gov

Download Document from Source Website

File Size: 523,22 KB

Share Document on Facebook

Similar Documents

Cryptography / Post-quantum cryptography / Public-key cryptography / Hashing / Error detection and correction / Digital signature / Hash chain / XMSS / Cryptographic hash function / Merkle tree / Hash function / Key

Hash-based signatures Joost Rijneveld Radboud University, Nijmegen, The Netherlands Post-quantum cryptography

DocID: 1xVpf - View Document

Cryptography / Emerging technologies / Quantum computing / Quantum cryptography / Theoretical computer science / Post-quantum cryptography / Applied mathematics / Mathematics

Tenth International Conference on Post-Quantum Cryptography PQCrypto 2019 Chongqing, China, May 8–10, 2019 pqcrypto2019.org

DocID: 1xVmD - View Document

Emerging technologies / Quantum computing / Theoretical computer science / Quantum cryptography / Cryptography / Quantum information science / Technology / Applied mathematics / Post-quantum cryptography / Internet of things

Implementing Post-Quantum Cryptography on the Cortex M4 Matthias Kannwischer, Joost Rijneveld, Peter Schwabe, and Ko Stoffelen Radboud University, Nijmegen, The Netherlands

DocID: 1xVaG - View Document

Cryptography / Post-quantum cryptography / Trusted Computing / Public-key cryptography / Quantum cryptography / Key size / Advanced Encryption Standard process

Practical Post-Quantum Cryptography for Trusted Computing Matthias J. Kannwischer, PhD Student Workshop on Trusted Computing and its Applications 25 January 2018

DocID: 1xTFq - View Document

F R A U N H O F E R I N S T I T U T E F O R S E C U R E I N F O R M AT I O N T E C H N O L O G Y White Paper Practical Post-Quantum Cryptography

DocID: 1vqNn - View Document