scientific article
From MaRDI portal
Publication:3522455
zbMath1152.81724arXivquant-ph/0210062MaRDI QIDQ3522455
No author found.
Publication date: 3 September 2008
Full work available at URL: https://arxiv.org/abs/quant-ph/0210062
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items (12)
Hidden cosets and applications to unclonable cryptography ⋮ Two-way unclonable encryption with a vulnerable sender ⋮ On the feasibility of unclonable encryption, and more ⋮ Cloning games: a general framework for unclonable primitives ⋮ Cryptography with certified deletion ⋮ Quantum cryptography beyond quantum key distribution ⋮ Secure software leasing without assumptions ⋮ Unclonable encryption, revisited ⋮ Optimal attacks on qubit-based quantum key recycling ⋮ Secure software leasing ⋮ Quantum Authentication with Key Recycling ⋮ Quantum Key Recycling with 8-state encoding (The Quantum One-Time Pad is more interesting than we thought)
This page was built for publication: