منابع مشابه
Limitations on practical quantum cryptography
We provide limits to practical quantum key distribution, taking into account channel losses, a realistic detection process, and imperfections in the "qubits" sent from the sender to the receiver. As we show, even quantum key distribution with perfect qubits might not be achievable over long distances when the other imperfections are taken into account. Furthermore, existing experimental schemes...
متن کاملOn Classical and Quantum Cryptography
Lectures on classical and quantum cryptography. Contents: Private key cryp-tosystems. Elements of number theory. Public key cryptography and RSA cryp-tosystem. Shannon's entropy and mutual information. Entropic uncertainty relations. The no cloning theorem. The BB84 quantum cryptographic protocol. Security proofs. Bell's theorem. The EPRBE quantum cryptographic protocol.
متن کاملQuantum cryptography
This is a chapter on quantum cryptography for the book “A Multidisciplinary Introduction to Information Security” to be published by CRC Press in 2011/2012. The chapter aims to introduce the topic to undergraduate-level and continuing-education students specializing in information and communication technology.
متن کاملQuantum Cryptography
Quantum Cryptography was born in the early seventies when Stephen Wiesner wrote “Conjugate Coding”, which unfortunately took more than ten years to see the light of print [50]. In the mean time, Charles H. Bennett (who knew of Wiesner’s idea) and Gilles Brassard picked up the subject and brought it to fruition in a series of papers that culminated with the demonstration of an experimental proto...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ЖУРНАЛ ЗА БЕЗБЈЕДНОСТ И КРИМИНАЛИСТИКУ
سال: 2019
ISSN: 2637-3076
DOI: 10.7251/zbk1901043j