A brief introduction of quantum cryptography for engineers
by Bing Qi, Li Qian, Hoi-Kwong Lo
Publisher: arXiv 2010
Number of pages: 36
Description:
We present the fundamental principles behind quantum key distribution and discuss a few well-known QKD protocols. Bearing in mind that the majority of our readers are from engineering and experimental optics, we focus more on the experimental implementation of various QKD protocols rather than security analysis. Another important topic that is covered here is the study of the security of practical QKD systems.
Download or read it online for free here:
Download link
(640KB, PDF)
Similar books
Military Cryptanalysis
by William F. Friedman - NSA
One of the most well-respected publications on cryptanalysis, as was written by William F. Friedman, one of the true experts in the field. Now declassified by the NSA, this book is key in helping individuals understand and solve cipher systems.
(17500 views)
by William F. Friedman - NSA
One of the most well-respected publications on cryptanalysis, as was written by William F. Friedman, one of the true experts in the field. Now declassified by the NSA, this book is key in helping individuals understand and solve cipher systems.
(17500 views)
Cryptography, A Study on Secret Writings
by Andre Langie - Aegean Park Press
A classic in cryptographic literature. Text is divided into parts: Descriptions of the principal systems of cryptography; Examples of deciphering (cryptanalysis); Lists and tables with bibliography; plus a section titled 'The Playfair Cipher'.
(21795 views)
by Andre Langie - Aegean Park Press
A classic in cryptographic literature. Text is divided into parts: Descriptions of the principal systems of cryptography; Examples of deciphering (cryptanalysis); Lists and tables with bibliography; plus a section titled 'The Playfair Cipher'.
(21795 views)
Visual Cryptography and Its Applications
by Jonathan Weir, WeiQi Yan - BookBoon
Visual cryptography provides a technique by which one secret can be distributed into two or more shares. When the shares are xeroxed onto transparencies and then superimposed, the original secret can be discovered without computer participation.
(11172 views)
by Jonathan Weir, WeiQi Yan - BookBoon
Visual cryptography provides a technique by which one secret can be distributed into two or more shares. When the shares are xeroxed onto transparencies and then superimposed, the original secret can be discovered without computer participation.
(11172 views)
Handbook of Applied Cryptography
by Alfred Menezes, Paul van Oorschot, Scott Vanstone - CRC-Press
This Handbook will serve as a valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography. It is a necessary and timely guide for professionals who practice the art of cryptography.
(34136 views)
by Alfred Menezes, Paul van Oorschot, Scott Vanstone - CRC-Press
This Handbook will serve as a valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography. It is a necessary and timely guide for professionals who practice the art of cryptography.
(34136 views)