RESPONSE TO "VULNERABILITY OF 'A NOVEL PROTOCOL-AUTHENTICATION ALGORITHM RULING OUT A MAN-IN-THE-MIDDLE ATTACK IN QUANTUM CRYPTOGRAPHY'"
From MaRDI portal
Publication:3401038
DOI10.1142/S0219749909005729zbMath1182.94045OpenAlexW2056001059WikidataQ59449225 ScholiaQ59449225MaRDI QIDQ3401038
No author found.
Publication date: 28 January 2010
Published in: International Journal of Quantum Information (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1142/s0219749909005729
Cryptography (94A60) Authentication, digital signatures and secret sharing (94A62) Quantum cryptography (quantum-theoretic aspects) (81P94)
Related Items (2)
Attacks on quantum key distribution protocols that employ non-ITS authentication ⋮ An improved quantum private set intersection protocol based on Hadamard gates
Cites Work
- New hash functions and their use in authentication and set equality
- Universal classes of hash functions
- VULNERABILITY OF "A NOVEL PROTOCOL-AUTHENTICATION ALGORITHM RULING OUT A MAN-IN-THE-MIDDLE ATTACK IN QUANTUM CRYPTOGRAPHY"
- A NOVEL PROTOCOL-AUTHENTICATION ALGORITHM RULING OUT A MAN-IN-THE MIDDLE ATTACK IN QUANTUM CRYPTOGRAPHY
This page was built for publication: RESPONSE TO "VULNERABILITY OF 'A NOVEL PROTOCOL-AUTHENTICATION ALGORITHM RULING OUT A MAN-IN-THE-MIDDLE ATTACK IN QUANTUM CRYPTOGRAPHY'"