Article Finite Key Size Analysis of Two-Way Quantum Cryptography (original) (raw)
Related papers
Practical quantum cryptography
SPIE Proceedings, 2004
2014 Index IEEE Journal of Quantum Electronics Vol. 50
IEEE Journal of Quantum Electronics, 2014
An Overview of Quantum Cryptography
Information Security Management Handbook, 6th Edition , 2007
Implementation of two way Quantum Key Distribution protocol with decoy state
Optics Communications, 2012
Applied Physics B, 1982
Practical Aspects of Quantum Cryptographic Key Distribution
Journal of Cryptology, 2000
Quantum digital signatures with quantum-key-distribution components
Physical Review A, 2015
Chinique de Armas et al. 2022b JASREP
An overview of Quantum Cryptography and Shor’s Algorithm
Ugochukwu Orji, Chikodili Ugwuishiwu
International Journal of Advanced Trends in Computer Science and Engineering, 2020
Annals of Physics, 1992
2009
Measurement-device-independent quantum digital signatures
Physical review, 2016
Secure quantum signatures using insecure quantum channels
Physical review, 2016
arXiv (Cornell University), 2017
Lecture notes on quantum statistics
2000
Special Issue: Quantum structures in computer science: Language, semantics, retrieval
Theoretical Computer Science, 2018
Introduction to the Theory of Quantum Information Processing
Graduate Texts in Physics, 2013
Fundamentals of Quantum Computation and Quantum Information
NMR Quantum Information Processing, 2007
Vulnerability of blockchain technologies to quantum attacks
Array, 2021
Annual Reviews of Computational Physics VI, 1999
Experimental measurement-device-independent quantum digital signatures
Nature Communications, 2017
Secure Communication via Key Generation with Quantum Measurement Advantage in the Telecom Band
2013
2016
Quantum direct communication with mutual authentication
arXiv (Cornell University), 2009
Ayo and Kundam 334 Article Text
Multi-Stage Quantum Secure Direct Communication Using Secure Shared Authentication Key
Symmetry, 2020
Quantum Digital Signatures without Quantum Memory
Physical Review Letters, 2014
Search for New Quantum Algorithms
Article Anna Tchintcharauli JKGE
New Model of Ekert Protocol in Quantum Key Distribution
Unconditional security through quantum uncertainty
International Journal of Critical Infrastructure Protection, 2017