David Santos - Academia.edu (original) (raw)

David Santos

Related Authors

Bob Jessop

Steffen  Boehm

Armando Marques-Guedes

Jodi Dean

J.-C. Spender

Javier Marín-López

Cosmin Sebastian Cercel

Timothy Morton

Deniz Gokturk

Paulo Castagna

Paulo Castagna

Universidade Estadual Paulista "Júlio de Mesquita Filho"

Uploads

Papers by David Santos

Research paper thumbnail of The maximal stimulation and facial nerve conduction latency tests: Predicting the outcome of bell's palsy

The Laryngoscope, 1994

Page 1. The Maximal Stimulation and Facial Nerve Conduction Latency Tests: Predicting the Outcome... more Page 1. The Maximal Stimulation and Facial Nerve Conduction Latency Tests: Predicting the Outcome of Bell's Palsy John M. Ruboyianes, MD; Kedar K. Adour, MD; David Q Santos, MD; Peter G. Von Doersten, MD To test the ...

Research paper thumbnail of Ecodraga: evitando dañar al medio ambiente en los procesos de dragado

Research paper thumbnail of Qubit authentication

Physical Review A, 2002

Secure communication requires message authentication. In this paper we address the problem of how... more Secure communication requires message authentication. In this paper we address the problem of how to authenticate quantum information sent through a quantum channel between two communicating parties with the minimum amount of resources. Specifically, our objective is to determine whether one elementary quantum message (a qubit) can be authenticated with a key of minimum length. We show that, unlike the case of classical-message quantum authentication, this is not possible.

Research paper thumbnail of Quantum authentication of classical messages

Physical Review A, 2001

Although key distribution is arguably the most studied context on which to apply quantum cryptogr... more Although key distribution is arguably the most studied context on which to apply quantum cryptographic techniques, message authentication, i.e., certifying the identity of the message originator and the integrity of the message sent, can also benefit from the use of quantum resources. Classically, message authentication can be performed by techniques based on hash functions. However, the security of the resulting protocols depends on the selection of appropriate hash functions, and on the use of long authentication keys. In this paper we propose a quantum authentication procedure that, making use of just one qubit as the authentication key, allows the authentication of binary classical messages in a secure manner.

Research paper thumbnail of Quantum authentication with unitary coding sets

Journal of Modern Optics, 2003

Research paper thumbnail of The maximal stimulation and facial nerve conduction latency tests: Predicting the outcome of bell's palsy

The Laryngoscope, 1994

Page 1. The Maximal Stimulation and Facial Nerve Conduction Latency Tests: Predicting the Outcome... more Page 1. The Maximal Stimulation and Facial Nerve Conduction Latency Tests: Predicting the Outcome of Bell's Palsy John M. Ruboyianes, MD; Kedar K. Adour, MD; David Q Santos, MD; Peter G. Von Doersten, MD To test the ...

Research paper thumbnail of Ecodraga: evitando dañar al medio ambiente en los procesos de dragado

Research paper thumbnail of Qubit authentication

Physical Review A, 2002

Secure communication requires message authentication. In this paper we address the problem of how... more Secure communication requires message authentication. In this paper we address the problem of how to authenticate quantum information sent through a quantum channel between two communicating parties with the minimum amount of resources. Specifically, our objective is to determine whether one elementary quantum message (a qubit) can be authenticated with a key of minimum length. We show that, unlike the case of classical-message quantum authentication, this is not possible.

Research paper thumbnail of Quantum authentication of classical messages

Physical Review A, 2001

Although key distribution is arguably the most studied context on which to apply quantum cryptogr... more Although key distribution is arguably the most studied context on which to apply quantum cryptographic techniques, message authentication, i.e., certifying the identity of the message originator and the integrity of the message sent, can also benefit from the use of quantum resources. Classically, message authentication can be performed by techniques based on hash functions. However, the security of the resulting protocols depends on the selection of appropriate hash functions, and on the use of long authentication keys. In this paper we propose a quantum authentication procedure that, making use of just one qubit as the authentication key, allows the authentication of binary classical messages in a secure manner.

Research paper thumbnail of Quantum authentication with unitary coding sets

Journal of Modern Optics, 2003

Log In