Pages that link to "Item:Q265393"
From MaRDI portal
The following pages link to Attacks on quantum key distribution protocols that employ non-ITS authentication (Q265393):
Displaying 15 items.
- A note on quantum related-key attacks (Q458382) (← links)
- Direct proof of security of Wegman-Carter authentication with partially known key (Q479440) (← links)
- Detecting relay attacks on RFID communication systems using quantum bits (Q513456) (← links)
- Cryptanalysis and improvement of a quantum private set intersection protocol (Q1701936) (← links)
- Attacks on beyond-birthday-bound MACs in the quantum setting (Q2118560) (← links)
- Trojan horse attack free fault-tolerant quantum key distribution protocols (Q2454235) (← links)
- Key-leakage evaluation of authentication in quantum key distribution with finite resources (Q2454246) (← links)
- Quantum key distribution with PRF(Hash, Nonce) achieves everlasting security (Q2690521) (← links)
- Frequency shift attack on ‘plug-and-play’ quantum key distribution systems (Q2962792) (← links)
- (Q3522416) (← links)
- (Q3522507) (← links)
- Sifting attacks in finite-size quantum key distribution (Q5855042) (← links)
- Cascading attack on trusted-relay quantum key distribution networks (Q6055363) (← links)
- Quantum attacks on beyond-birthday-bound MACs (Q6167739) (← links)
- Quantum Key Recovery Attacks on 3-Round Feistel-2 Structure Without Quantum Encryption Oracles (Q6487415) (← links)