Home
/
Books
/
cryptography&mathematics
/
quantum cryptography
File Name
Size
Date
..
—
—
Complete Insecurity of Quantum Protocols for Classical Two-Party Computation (2012) - Buhrman, Christandl, Schaffner.pdf.gz
414.41KB
04-07-2024 16:33:20
Increasing Complexity with Quantum Physics (2011) - Anders, Wiesner.pdf.gz
444.84KB
04-07-2024 16:33:21
Information Networks Secured by the Laws of Physics (2011) - Kish, Peper.pdf.gz
578.66KB
04-07-2024 16:33:20
Post-Selection Technique for Quantum Channels with Applications to Quantum Cryptography (2003) - Christand.pdf.gz
109.72KB
04-07-2024 16:33:21
Quantum Fourier Sampling, Code Equivalence, and the quantum security of the McEliece and Sidelnikov cryptosystems (2011) - Dihn et. al.pdf.gz
42.09KB
04-07-2024 16:33:20
Quantum public-key cryptosystems based on induced trapdoor one-way transformations (2011) - Yanga, Lianga, Lia, Hua, Fengb.pdf.gz
160.74KB
04-07-2024 16:33:20
Why quantum computing is hard – and quantum cryptography is not provably secure (2013) - Anderson, Brady.pdf.gz
204.79KB
04-07-2024 16:33:20
iAQC The Intensity-Aware Quantum Cryptography Protocol (2012) - Kak, Chen, Verma.pdf.gz
353.53KB
04-07-2024 16:33:20
10" >