Mathematical Research Data Initiative
Main page
Recent changes
Random page
Help about MediaWiki
Create a new Item
Create a new Property
Merge two items
In other projects
Discussion
View source
View history
Purge
English
Log in

scientific article

From MaRDI portal
Publication:3522455
Jump to:navigation, search

zbMath1152.81724arXivquant-ph/0210062MaRDI QIDQ3522455

No author found.

Publication date: 3 September 2008

Full work available at URL: https://arxiv.org/abs/quant-ph/0210062

Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.


Mathematics Subject Classification ID

Quantum computation (81P68) Cryptography (94A60)


Related Items (12)

Hidden cosets and applications to unclonable cryptography ⋮ Two-way unclonable encryption with a vulnerable sender ⋮ On the feasibility of unclonable encryption, and more ⋮ Cloning games: a general framework for unclonable primitives ⋮ Cryptography with certified deletion ⋮ Quantum cryptography beyond quantum key distribution ⋮ Secure software leasing without assumptions ⋮ Unclonable encryption, revisited ⋮ Optimal attacks on qubit-based quantum key recycling ⋮ Secure software leasing ⋮ Quantum Authentication with Key Recycling ⋮ Quantum Key Recycling with 8-state encoding (The Quantum One-Time Pad is more interesting than we thought)







This page was built for publication:

Retrieved from "https://portal.mardi4nfdi.de/w/index.php?title=Publication:3522455&oldid=16887698"
Tools
What links here
Related changes
Special pages
Printable version
Permanent link
Page information
MaRDI portal item
This page was last edited on 4 February 2024, at 23:50.
Privacy policy
About MaRDI portal
Disclaimers
Imprint
Powered by MediaWiki