Logo

A brief introduction of quantum cryptography for engineers

Small book cover: A brief introduction of quantum cryptography for engineers

A brief introduction of quantum cryptography for engineers
by

Publisher: arXiv
Number of pages: 36

Description:
We present the fundamental principles behind quantum key distribution and discuss a few well-known QKD protocols. Bearing in mind that the majority of our readers are from engineering and experimental optics, we focus more on the experimental implementation of various QKD protocols rather than security analysis. Another important topic that is covered here is the study of the security of practical QKD systems.

Home page url

Download or read it online for free here:
Download link
(640KB, PDF)

Similar books

Book cover: Foundations of CryptographyFoundations of Cryptography
by - Cambridge University Press
The book gives the mathematical underpinnings for cryptography; this includes one-way functions, pseudorandom generators, and zero-knowledge proofs. Throughout, definitions are complete and detailed; proofs are rigorous and given in full.
(16272 views)
Book cover: Cryptography, A Study on Secret WritingsCryptography, A Study on Secret Writings
by - Aegean Park Press
A classic in cryptographic literature. Text is divided into parts: Descriptions of the principal systems of cryptography; Examples of deciphering (cryptanalysis); Lists and tables with bibliography; plus a section titled 'The Playfair Cipher'.
(20960 views)
Book cover: Military CryptanalysisMilitary Cryptanalysis
by - NSA
One of the most well-respected publications on cryptanalysis, as was written by William F. Friedman, one of the true experts in the field. Now declassified by the NSA, this book is key in helping individuals understand and solve cipher systems.
(16419 views)
Book cover: Public-Key Cryptography: Theory and PracticePublic-Key Cryptography: Theory and Practice
by - TU Darmstadt
Multiple aspects of public-key cryptography are examined. The author covers the theory of provably secure public-key cryptography and the implementation of exponentiation and multi-exponentiation. An introduction to provable security is provided.
(13156 views)