| Name | Last modified | Size | Description |
|
| Parent Directory | | - | |
| Complete Insecurity of Quantum Protocols for Classical Two-Party Computation (2012) - Buhrman, Christandl, Schaffner.pdf | 2023-08-25 22:25 | 477K | |
| Increasing Complexity with Quantum Physics (2011) - Anders, Wiesner.pdf | 2023-08-25 22:25 | 521K | |
| Information Networks Secured by the Laws of Physics (2011) - Kish, Peper.pdf | 2023-08-25 22:25 | 653K | |
| Post-Selection Technique for Quantum Channels with Applications to Quantum Cryptography (2003) - Christand.pdf | 2023-08-25 22:25 | 134K | |
| Quantum Fourier Sampling, Code Equivalence, and the quantum security of the McEliece and Sidelnikov cryptosystems (2011) - Dihn et. al.pdf | 2023-08-25 22:25 | 59K | |
| Quantum public-key cryptosystems based on induced trapdoor one-way transformations (2011) - Yanga, Lianga, Lia, Hua, Fengb.pdf | 2023-08-25 22:25 | 199K | |
| Why quantum computing is hard – and quantum cryptography is not provably secure (2013) - Anderson, Brady.pdf | 2023-08-25 22:25 | 231K | |
| iAQC The Intensity-Aware Quantum Cryptography Protocol (2012) - Kak, Chen, Verma.pdf | 2023-08-25 22:25 | 384K | |
|