Implementation vulnerabilities in general quantum cryptography

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Methods and implementation of quantum cryptography

Quantum mechanical properties of communication lines may be lead to new possibilities in the security of key distribution. By taking advantage of basic quantum mechanical principles, it may be possible to create secure systems that rely upon the physics of the system rather than computational or mathematical methods for security. In this paper, three possible protocols for quantum key distribut...

متن کامل

General immunity and superadditivity of two-way Gaussian quantum cryptography.

We consider two-way continuous-variable quantum key distribution, studying its security against general eavesdropping strategies. Assuming the asymptotic limit of many signals exchanged, we prove that two-way Gaussian protocols are immune to coherent attacks. More precisely we show the general superadditivity of the two-way security thresholds, which are proven to be higher than the correspondi...

متن کامل

Cryptography : General

Classification of highly nonlinear Boolean power functions with a randomised algorithm for checking normality, 2004. [6] Kelley Burgin, The nonexistence of a bijective almost perfect nonlinear function of order 16, Master's thesis,

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: New Journal of Physics

سال: 2018

ISSN: 1367-2630

DOI: 10.1088/1367-2630/aade06