![[ICO]](/icons/blank.gif) | Name | Last modified | Size | Description |
|
![[PARENTDIR]](/icons/back.gif) | Parent Directory | | - | |
![[ ]](/icons/layout.gif) | Complete Insecurity of Quantum Protocols for Classical Two-Party Computation (2012) - Buhrman, Christandl, Schaffner.pdf | 2023-08-25 22:25 | 477K | |
![[ ]](/icons/layout.gif) | Increasing Complexity with Quantum Physics (2011) - Anders, Wiesner.pdf | 2023-08-25 22:25 | 521K | |
![[ ]](/icons/layout.gif) | Information Networks Secured by the Laws of Physics (2011) - Kish, Peper.pdf | 2023-08-25 22:25 | 653K | |
![[ ]](/icons/layout.gif) | Post-Selection Technique for Quantum Channels with Applications to Quantum Cryptography (2003) - Christand.pdf | 2023-08-25 22:25 | 134K | |
![[ ]](/icons/layout.gif) | Quantum Fourier Sampling, Code Equivalence, and the quantum security of the McEliece and Sidelnikov cryptosystems (2011) - Dihn et. al.pdf | 2023-08-25 22:25 | 59K | |
![[ ]](/icons/layout.gif) | Quantum public-key cryptosystems based on induced trapdoor one-way transformations (2011) - Yanga, Lianga, Lia, Hua, Fengb.pdf | 2023-08-25 22:25 | 199K | |
![[ ]](/icons/layout.gif) | Why quantum computing is hard – and quantum cryptography is not provably secure (2013) - Anderson, Brady.pdf | 2023-08-25 22:25 | 231K | |
![[ ]](/icons/layout.gif) | iAQC The Intensity-Aware Quantum Cryptography Protocol (2012) - Kak, Chen, Verma.pdf | 2023-08-25 22:25 | 384K | |
|