Quantum Cryptography
by N. Gisin, G. Ribordy, W. Tittel, H. Zbinden
Publisher: arXiv 2001
Number of pages: 57
Description:
Quantum cryptography could well be the first application of quantum mechanics at the individual quanta level. The very fast progress in both theory and experiments over the recent years are reviewed, with emphasis on open questions and technological issues.
Download or read it online for free here:
Download link
(1.4MB, PDF)
Similar books
Cryptography: An Introduction
by N.P. Smart - McGraw-Hill
Nigel Smart's 'Cryptography' provides the rigorous detail required for advanced cryptographic studies, yet approaches the subject matter in an accessible style in order to gently guide new students through difficult mathematical topics.
(12525 views)
by N.P. Smart - McGraw-Hill
Nigel Smart's 'Cryptography' provides the rigorous detail required for advanced cryptographic studies, yet approaches the subject matter in an accessible style in order to gently guide new students through difficult mathematical topics.
(12525 views)
Handbook of Applied Cryptography
by Alfred Menezes, Paul van Oorschot, Scott Vanstone - CRC-Press
This Handbook will serve as a valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography. It is a necessary and timely guide for professionals who practice the art of cryptography.
(34136 views)
by Alfred Menezes, Paul van Oorschot, Scott Vanstone - CRC-Press
This Handbook will serve as a valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography. It is a necessary and timely guide for professionals who practice the art of cryptography.
(34136 views)
Visual Cryptography and Its Applications
by Jonathan Weir, WeiQi Yan - BookBoon
Visual cryptography provides a technique by which one secret can be distributed into two or more shares. When the shares are xeroxed onto transparencies and then superimposed, the original secret can be discovered without computer participation.
(11172 views)
by Jonathan Weir, WeiQi Yan - BookBoon
Visual cryptography provides a technique by which one secret can be distributed into two or more shares. When the shares are xeroxed onto transparencies and then superimposed, the original secret can be discovered without computer participation.
(11172 views)
Public-Key Cryptography: Theory and Practice
by Bodo Moeller - TU Darmstadt
Multiple aspects of public-key cryptography are examined. The author covers the theory of provably secure public-key cryptography and the implementation of exponentiation and multi-exponentiation. An introduction to provable security is provided.
(14066 views)
by Bodo Moeller - TU Darmstadt
Multiple aspects of public-key cryptography are examined. The author covers the theory of provably secure public-key cryptography and the implementation of exponentiation and multi-exponentiation. An introduction to provable security is provided.
(14066 views)