Index of /tech/cryptography & mathematics/quantum cryptography

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]Complete Insecurity of Quantum Protocols for Classical Two-Party Computation (2012) - Buhrman, Christandl, Schaffner.pdf2023-08-25 22:25 477K 
[   ]Increasing Complexity with Quantum Physics (2011) - Anders, Wiesner.pdf2023-08-25 22:25 521K 
[   ]Information Networks Secured by the Laws of Physics (2011) - Kish, Peper.pdf2023-08-25 22:25 653K 
[   ]Post-Selection Technique for Quantum Channels with Applications to Quantum Cryptography (2003) - Christand.pdf2023-08-25 22:25 134K 
[   ]Quantum Fourier Sampling, Code Equivalence, and the quantum security of the McEliece and Sidelnikov cryptosystems (2011) - Dihn et. al.pdf2023-08-25 22:25 59K 
[   ]Quantum public-key cryptosystems based on induced trapdoor one-way transformations (2011) - Yanga, Lianga, Lia, Hua, Fengb.pdf2023-08-25 22:25 199K 
[   ]Why quantum computing is hard – and quantum cryptography is not provably secure (2013) - Anderson, Brady.pdf2023-08-25 22:25 231K 
[   ]iAQC The Intensity-Aware Quantum Cryptography Protocol (2012) - Kak, Chen, Verma.pdf2023-08-25 22:25 384K 

Apache/2.4.59 (Debian) Server at idouzi.info Port 80