A brief introduction of quantum cryptography for engineers
by Bing Qi, Li Qian, Hoi-Kwong Lo
Publisher: arXiv 2010
Number of pages: 36
Description:
We present the fundamental principles behind quantum key distribution and discuss a few well-known QKD protocols. Bearing in mind that the majority of our readers are from engineering and experimental optics, we focus more on the experimental implementation of various QKD protocols rather than security analysis. Another important topic that is covered here is the study of the security of practical QKD systems.
Download or read it online for free here:
Download link
(640KB, PDF)
Similar books
Foundations of Cryptography
by Oded Goldreich - Cambridge University Press
The book gives the mathematical underpinnings for cryptography; this includes one-way functions, pseudorandom generators, and zero-knowledge proofs. Throughout, definitions are complete and detailed; proofs are rigorous and given in full.
(16506 views)
by Oded Goldreich - Cambridge University Press
The book gives the mathematical underpinnings for cryptography; this includes one-way functions, pseudorandom generators, and zero-knowledge proofs. Throughout, definitions are complete and detailed; proofs are rigorous and given in full.
(16506 views)
Visual Cryptography and Its Applications
by Jonathan Weir, WeiQi Yan - BookBoon
Visual cryptography provides a technique by which one secret can be distributed into two or more shares. When the shares are xeroxed onto transparencies and then superimposed, the original secret can be discovered without computer participation.
(10436 views)
by Jonathan Weir, WeiQi Yan - BookBoon
Visual cryptography provides a technique by which one secret can be distributed into two or more shares. When the shares are xeroxed onto transparencies and then superimposed, the original secret can be discovered without computer participation.
(10436 views)
An introduction to Cryptography
by Phil Zimmermann
This guide describes how to use PGP to manage your organizationâ€™s messages and data. It is an overview of the terminology and concepts of PGP products. It contains discussions of security, privacy, and the vulnerabilities inherent in PGP.
(16924 views)
by Phil Zimmermann
This guide describes how to use PGP to manage your organizationâ€™s messages and data. It is an overview of the terminology and concepts of PGP products. It contains discussions of security, privacy, and the vulnerabilities inherent in PGP.
(16924 views)
Basic Cryptanalysis
- United States Department of the Army
Introduction to cryptanalysis, monographic, polygraphic, and polyalphabetic substitution systems, transposition systems, analysis of code systems. Text also contains exhaustive material to aid in the solution of cipher systems.
(14134 views)
- United States Department of the Army
Introduction to cryptanalysis, monographic, polygraphic, and polyalphabetic substitution systems, transposition systems, analysis of code systems. Text also contains exhaustive material to aid in the solution of cipher systems.
(14134 views)