The Case for Quantum Key Distribution
From MaRDI portal
Publication:3064339
DOI10.1007/978-3-642-11731-2_35zbMath1205.81075arXiv0902.2839OpenAlexW1546992648MaRDI QIDQ3064339
Douglas Stebila, Norbert Lütkenhaus, Michele Mosca
Publication date: 21 December 2010
Published in: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/0902.2839
Related Items (5)
Secure keys data distribution based user-storage-transit server authentication process model using mathematical post-quantum cryptography methodology ⋮ Quantum key distribution with PRF(Hash, Nonce) achieves everlasting security ⋮ Quantum cryptography beyond quantum key distribution ⋮ Composable security against collective attacks of a modified BB84 QKD protocol with information only in one basis ⋮ Towards Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Using quantum key distribution for cryptographic purposes: a survey
- New hash functions and their use in authentication and set equality
- A NOVEL PROTOCOL-AUTHENTICATION ALGORITHM RULING OUT A MAN-IN-THE MIDDLE ATTACK IN QUANTUM CRYPTOGRAPHY
- Distributed Relay Protocol for Probabilistic Information-Theoretic Security in a Randomly-Compromised Network
This page was built for publication: The Case for Quantum Key Distribution