Implementation vulnerabilities in general quantum cryptography
نویسندگان
چکیده
منابع مشابه
Methods and implementation of quantum cryptography
Quantum mechanical properties of communication lines may be lead to new possibilities in the security of key distribution. By taking advantage of basic quantum mechanical principles, it may be possible to create secure systems that rely upon the physics of the system rather than computational or mathematical methods for security. In this paper, three possible protocols for quantum key distribut...
متن کاملGeneral immunity and superadditivity of two-way Gaussian quantum cryptography.
We consider two-way continuous-variable quantum key distribution, studying its security against general eavesdropping strategies. Assuming the asymptotic limit of many signals exchanged, we prove that two-way Gaussian protocols are immune to coherent attacks. More precisely we show the general superadditivity of the two-way security thresholds, which are proven to be higher than the correspondi...
متن کاملCryptography : General
Classification of highly nonlinear Boolean power functions with a randomised algorithm for checking normality, 2004. [6] Kelley Burgin, The nonexistence of a bijective almost perfect nonlinear function of order 16, Master's thesis,
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: New Journal of Physics
سال: 2018
ISSN: 1367-2630
DOI: 10.1088/1367-2630/aade06