A brief introduction of quantum cryptography for engineers
by Bing Qi, Li Qian, Hoi-Kwong Lo
Publisher: arXiv 2010
Number of pages: 36
Description:
We present the fundamental principles behind quantum key distribution and discuss a few well-known QKD protocols. Bearing in mind that the majority of our readers are from engineering and experimental optics, we focus more on the experimental implementation of various QKD protocols rather than security analysis. Another important topic that is covered here is the study of the security of practical QKD systems.
Download or read it online for free here:
Download link
(640KB, PDF)
Similar books
Elementary Cryptanalysis
by Helen Fouche Gaines - American Photographic Publishing Co.
A classic introduction to codebreaking, focusing on techniques for deciphering simple ciphers. It covers substitution and transposition ciphers and methods to analyze encrypted messages, offering both theoretical insights and practical examples.
(159 views)
by Helen Fouche Gaines - American Photographic Publishing Co.
A classic introduction to codebreaking, focusing on techniques for deciphering simple ciphers. It covers substitution and transposition ciphers and methods to analyze encrypted messages, offering both theoretical insights and practical examples.
(159 views)
Cracking Codes with Python
by Al Sweigart - inventwithpython.com
The book teaches complete beginners how to program in the Python programming language. It features the source code to several ciphers and hacking programs for these ciphers. The final chapters cover the modern RSA cipher and public key cryptography.
(12297 views)
by Al Sweigart - inventwithpython.com
The book teaches complete beginners how to program in the Python programming language. It features the source code to several ciphers and hacking programs for these ciphers. The final chapters cover the modern RSA cipher and public key cryptography.
(12297 views)
Introduction to Modern Cryptography
by Mihir Bellare, Phillip Rogaway - University of California at Davis
The viewpoint taken throughout these notes is to emphasize the theory of cryptography as it can be applied to practice. This is an approach that the authors have pursued in the research, and it seems to be a pedagogically desirable approach as well.
(16779 views)
by Mihir Bellare, Phillip Rogaway - University of California at Davis
The viewpoint taken throughout these notes is to emphasize the theory of cryptography as it can be applied to practice. This is an approach that the authors have pursued in the research, and it seems to be a pedagogically desirable approach as well.
(16779 views)
An introduction to Cryptography
by Phil Zimmermann
This guide describes how to use PGP to manage your organization’s messages and data. It is an overview of the terminology and concepts of PGP products. It contains discussions of security, privacy, and the vulnerabilities inherent in PGP.
(17653 views)
by Phil Zimmermann
This guide describes how to use PGP to manage your organization’s messages and data. It is an overview of the terminology and concepts of PGP products. It contains discussions of security, privacy, and the vulnerabilities inherent in PGP.
(17653 views)