Home / Books / cryptography&mathematics / quantum cryptography
File Name
Size
Date
  • ..
    —
    —
  • Complete Insecurity of Quantum Protocols for Classical Two-Party Computation (2012) - Buhrman, Christandl, Schaffner.pdf.gz
    414.41KB
    04-07-2024 16:33:20
    Increasing Complexity with Quantum Physics (2011) - Anders, Wiesner.pdf.gz
    444.84KB
    04-07-2024 16:33:21
    Information Networks Secured by the Laws of Physics (2011) - Kish, Peper.pdf.gz
    578.66KB
    04-07-2024 16:33:20
    Post-Selection Technique for Quantum Channels with Applications to Quantum Cryptography (2003) - Christand.pdf.gz
    109.72KB
    04-07-2024 16:33:21
    Quantum Fourier Sampling, Code Equivalence, and the quantum security of the McEliece and Sidelnikov cryptosystems (2011) - Dihn et. al.pdf.gz
    42.09KB
    04-07-2024 16:33:20
    Quantum public-key cryptosystems based on induced trapdoor one-way transformations (2011) - Yanga, Lianga, Lia, Hua, Fengb.pdf.gz
    160.74KB
    04-07-2024 16:33:20
    Why quantum computing is hard – and quantum cryptography is not provably secure (2013) - Anderson, Brady.pdf.gz
    204.79KB
    04-07-2024 16:33:20
    iAQC The Intensity-Aware Quantum Cryptography Protocol (2012) - Kak, Chen, Verma.pdf.gz
    353.53KB
    04-07-2024 16:33:20

Powered by Kgay4all