Sciweavers

473 search results - page 8 / 95
» The Case for Quantum Key Distribution
Sort
View
TCC
2007
Springer
104views Cryptology» more  TCC 2007»
14 years 1 months ago
Unifying Classical and Quantum Key Distillation
Assume that two distant parties, Alice and Bob, as well as an adversary, Eve, have access to (quantum) systems prepared jointly according to a tripartite state ρABE. In addition, ...
Matthias Christandl, Artur Ekert, Michal Horodecki...
IACR
2011
133views more  IACR 2011»
12 years 7 months ago
Compact McEliece keys based on Quasi-Dyadic Srivastava codes
The McEliece cryptosystem is one of the few systems to be considered secure against attacks by Quantum computers. The original scheme is built upon Goppa codes and produces very l...
Edoardo Persichetti
CRYPTO
2011
Springer
245views Cryptology» more  CRYPTO 2011»
12 years 7 months ago
Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages
We present a somewhat homomorphic encryption scheme that is both very simple to describe and analyze, and whose security (quantumly) reduces to the worst-case hardness of problems ...
Zvika Brakerski, Vinod Vaikuntanathan
EUROCRYPT
2000
Springer
13 years 11 months ago
Security Aspects of Practical Quantum Cryptography
The use of quantum bits (qubits) in cryptography holds the promise of secure cryptographic quantum key distribution schemes. Unfortunately, the implemented schemes are often operat...
Gilles Brassard, Norbert Lütkenhaus, Tal Mor,...
ASAP
2006
IEEE
109views Hardware» more  ASAP 2006»
14 years 1 months ago
Describing Quantum Circuits with Systolic Arrays
In the simulation of quantum circuits the matrices and vectors used to represent unitary operations and qubit states grow exponentially as the number of qubits increase. For insta...
Aasavari Bhave, Eurípides Montagne, Edgar G...