quantum cryptography

the science of exploiting quantum mechanical properties to perform cryptographic tasks

DBpedia resource is: http://dbpedia.org/resource/Quantum_cryptography

Abstract is: Quantum cryptography is the science of exploiting quantum mechanical properties to perform cryptographic tasks. The best known example of quantum cryptography is quantum key distribution which offers an information-theoretically secure solution to the key exchange problem. The advantage of quantum cryptography lies in the fact that it allows the completion of various cryptographic tasks that are proven or conjectured to be impossible using only classical (i.e. non-quantum) communication. For example, it is impossible to copy data encoded in a quantum state. If one attempts to read the encoded data, the quantum state will be changed due to wave function collapse (no-cloning theorem). This could be used to detect eavesdropping in quantum key distribution (QKD).

Wikimedia Commons category is Quantum cryptography

quantum cryptography is …
instance of (P31):
branch of scienceQ2465832

External links are
P508BNCF Thesaurus ID41294
P10565Encyclopedia of China (Third Edition) ID34292
506356
P1417Encyclopædia Britannica Online IDtopic/quantum-cryptography
P646Freebase ID/m/0dnwx
P7502Golden IDQuantum_cryptography-XDJ8E6
P11514Great Russian Encyclopedia portal IDkvantovaia-kriptografiia-5a1937
P3827JSTOR topic ID (archived)quantum-cryptography
P8408KBpedia IDQuantumCryptography
P6366Microsoft Academic ID144901912
P349NDL Authority ID01164705
P10283OpenAlex IDC144901912
P3417Quora topic IDQuantum-Cryptography
P10376ScienceDirect topic IDengineering/quantum-cryptography
computer-science/quantum-cryptography
physics-and-astronomy/quantum-cryptography
P9775Treccani's Lessico del XXI Secolo IDcrittografia-quantistica
P5064World of Physics IDQuantumCryptography
P3553Zhihu topic ID20747420

P1889different frompost-quantum cryptographyQ7233576
P361part ofcryptographyQ8789
P443pronunciation audioAudio pronunciation file from the Lingua Libre Lingua Libre project.
License: CC0
Artists:
This work is copyrighted.
P910topic's main categoryCategory:Quantum cryptographyQ8614210

Reverse relations

field of work (P101)
Q66459178Adriana Marais
Q92938Gilles Brassard
Q95376102Mathematics and quantum information

main subject (P921)
Q114844768A Mathematical Perspective on Post-Quantum Cryptography
Q114847244A Modified Key Sifting Scheme With Artificial Neural Network Based Key Reconciliation Analysis in Quantum Cryptography
Q59468097A NOVEL PROTOCOL-AUTHENTICATION ALGORITHM RULING OUT A MAN-IN-THE MIDDLE ATTACK IN QUANTUM CRYPTOGRAPHY
Q114849586A Novel Classical and Quantum Cryptographic Scheme for Data Encryption
Q114923028A Quantum Cryptography Protocol for Access Control in Big Data
Q114844699A System-on-a-Chip Implementation of a Post-Quantum Cryptography Scheme for Smart Meter Data Communications
Q61051052A Three-Stage Quantum Cryptography Protocol
Q60026406A monogamy-of-entanglement game with applications to device-independent quantum cryptography
Q66669298A phase modulated QKD system with two quantum cryptography protocols
Q50083532Advanced active quenching circuit for ultra-fast quantum cryptography
Q114844811An Experimental Study of Building Blocks of Lattice-Based NIST Post-Quantum Cryptographic Algorithms
Q66672708An analysis of the model of the error bits of quantum cryptography protocol
Q114847141Analysis of the NTRU Post-Quantum Cryptographic Scheme in Constrained IoT Edge Devices
Q115058263Attack trees in Isabelle extended with probabilities for quantum cryptography
Q51633012Beating the photon-number-splitting attack in practical quantum cryptography.
Q39802699Biased decoy-state measurement-device-independent quantum cryptographic conferencing with finite resources
Q115038232Big Data Security Issues Based on Quantum Cryptography and Privacy with Authentication for Mobile Data Center
Q114923303Big Data Security Issues and Quantum Cryptography for Cloud Computing
Q114847567Bit commitment as an introduction to quantum cryptography
Q62537950Bridging the gap between theory and practice in quantum cryptography
Q27963718Brief History of Quantum Cryptography: A Personal Perspective
Q62097216CODES FOR KEY GENERATION IN QUANTUM CRYPTOGRAPHY
Q59524808Categorical quantum cryptography for access control in cloud computing
Q62113702Characterization of Collective Gaussian Attacks and Security of Coherent-State Quantum Cryptography
Q62097217Coherent eavesdropping attacks in tomographic quantum cryptography: Nonequivalence of quantum and classical key distillation
Q59458916Coherent eavesdropping strategies for the four state quantum cryptography protocol
Q74571654Comment on "Quantum Cryptography with Orthogonal States?"
Q114846596Comments on the Paper “Are There Enough Decoy States to Ensure Key Secrecy in Quantum Cryptography?” by S. N. Molotkov, K. S. Kravtsov, and M. I. Ryzhkin and on the Erratum to This Paper
Q80121856Compact transmission system using single-sideband modulation of light for quantum cryptography
Q58923766Continuous Variable Quantum Cryptography: Beating the 3 dB Loss Limit
Q62606030Continuous Variable Quantum Cryptography: Post-Selection with Thermal Noise
Q52045760Continuous variable quantum cryptography using coherent states.
Q76398765Continuous-variable quantum cryptography is secure against non-Gaussian attacks
Q62113706Continuous-variable quantum cryptography using two-way quantum communication
Q62113664Continuous-variable quantum cryptography with an untrusted relay: Detailed security analysis of the symmetric configuration
Q83994580Counterfactual quantum cryptography
Q114845822Current Status and Future Development of Quantum Cryptographic Protocols
Q114846983DPCrypto: Acceleration of Post-Quantum Cryptography Using Dot-Product Instructions on GPUs
Q51836958De Finetti representation theorem for infinite-dimensional quantum systems and applications to quantum cryptography.
Q61833351Decoy state protocols for quantum cryptography with parametric down conversion sources
Q80696274Defense frontier analysis of quantum cryptographic systems
Q114846023Design and Validation of Quantum Key Management System for Construction of KREONET Quantum Cryptography Communication
Q114848991Design of Polynomial NTT and INTT Accelerator for Post-Quantum Cryptography CRYSTALS-Kyber
Q59059816Deterministic and efficient quantum cryptography based on Bell’s theorem
Q114923094Development of Mechanism for Enhancing Data Security in Quantum Cryptography
Q50942703Device-independent security of quantum cryptography against collective attacks.
Q62109868Distinguishability of Gaussian states in quantum cryptography using postselection
Q62472918Double entanglement and quantum cryptography
Q91007671Eavesdropping and countermeasures for backflash side channel in quantum cryptography
Q62113698Eavesdropping of Two-Way Coherent-State Quantum Cryptography via Gaussian Quantum Cloning Machines
Q113806116Efficient Hardware Arithmetic for Inverted Binary Ring-LWE Based Post-Quantum Cryptography
Q42292891Efficient multiuser quantum cryptography network based on entanglement
Q62106495Efficient solid state memories for quantum cryptography
Q62470460Eighty kilometre transmission experiment using an InGaAs/InP SPAD-based quantum cryptography receiver operating at 1.55 km
Q114847337Energy Efficiency Analysis of Post-Quantum Cryptographic Algorithms
Q46714710Enhanced autocompensating quantum cryptography system
Q114109837Enhancing quantum cryptography with quantum dot single-photon sources
Q59429968Entangled State Quantum Cryptography: Eavesdropping on the Ekert Protocol
Q62592770Entanglement witnessing and quantum cryptography with nonideal ferromagnetic detectors
Q96431913Entanglement-based secure quantum cryptography over 1,120 kilometres
Q114924259Entropy Security in Quantum Cryptography
Q59423998Erratum: Quantum Privacy Amplification and the Security of Quantum Cryptography over Noisy Channels [Phys. Rev. Lett. 77, 2818 (1996)]
Q114845647Evaluation of the influence of the probability of erasing binary symbols «0» on the probability of erroneous data registration in a quantum-cryptographic communication channel
Q61757828Event-by-Event Simulation of Quantum Cryptography Protocols
Q47702114Examination of China's performance and thematic evolution in quantum cryptography research using quantitative and computational techniques
Q59437087Experimental Quantum Secret Sharing and Third-Man Quantum Cryptography
Q55882573Experimental quantum cryptography
Q62049071Experimental quantum cryptography scheme based on orthogonal states: preliminary results
Q62109697Experimental quantum cryptography with qutrits
Q60033588Experimental quantum-cryptography scheme based on orthogonal states
Q62049055Experimental realization of counterfactual quantum cryptography
Q62270833Experimental realization of quantum cryptography communication in free space
Q114847551Experimental resources needed to implement photon number splitting attack in quantum cryptography
Q83735117Experiments on long wavelength (1550 nm) "plug and play" quantum cryptography systems
Q58620649FEASIBILITY OF THE INTERLOCK PROTOCOL AGAINST MAN-IN-THE-MIDDLE ATTACKS ON QUANTUM CRYPTOGRAPHY
Q81319087Faraday-Michelson system for quantum cryptography
Q33559908Fast and simple high-capacity quantum cryptography with error detection
Q55933520Field experiment on a robust hierarchical metropolitan quantum cryptography network
Q59438538Field test of a practical secure communication network with decoy-state quantum cryptography
Q62113659Finite-size analysis of measurement-device-independent quantum cryptography with continuous variables
Q114923022Framework for Wireless Network Security Using Quantum Cryptography
Q59184217Free-space quantum cryptography for metropolitan areas
Q61198305Full-field implementation of a perfect eavesdropper on a quantum cryptography system
Q62113660Gaussian two-mode attacks in one-way quantum cryptography
Q38687501General immunity and superadditivity of two-way Gaussian quantum cryptography
Q47435809Generalized optical angular momentum sorter and its application to high-dimensional quantum cryptography
Q62470410Gigahertz quantum cryptography
Q62470420Gigahertz quantum cryptography
Q114918393Hardware-based computer security techniques to defeat hackers: from biometrics to quantum cryptography
Q62387885High-dimensional intracity quantum cryptography with structured photons
Q59457991High-dimensional quantum cryptography with twisted light
Q62113666High-rate measurement-device-independent quantum cryptography
Q30883162High-speed data encryption over 25 km of fiber by two-mode coherent-state quantum cryptography
Q59434983Hybrid ququart-encoded quantum cryptography protected by Kochen-Specker contextuality
Q62553804Hyper-entangled states and free-space quantum cryptography
Q114843220Implementation of Parallel Optimization of Rejection Sampling using RST in Lattice-Based Post-Quantum Cryptography
Q59184063Information leakage via side channels in freespace BB84 quantum cryptography
Q77873441Information-theoretic limits to quantum cryptography
Q27350428Insecurity of position-based quantum-cryptography protocols against entanglement attacks
Q114966620Introducing Quantum Cryptography Based Secured Encryption and Decryption Algorithms
Q53610477Laser damage helps the eavesdropper in quantum cryptography.
Q114223651Leveraging the hardness of dihedral coset problem for quantum cryptography
Q59441198Limitations on Practical Quantum Cryptography
Q114844901Logic Programming with Post-Quantum Cryptographic Primitives for Smart Contract on Quantum-Secured Blockchain
Q59184349Long-distance free-space quantum cryptography
Q84788849Long-distance frequency-division interferometer for communication and quantum cryptography
Q62537962Loss-tolerant position-based quantum cryptography
Q114847021Low-Cost Shuffling Countermeasures against Side-Channel Attacks for NTT-based Post-Quantum Cryptography
Q114969346Mathematical Analysis of Public Key Encryption Algorithm and Security of Anti Quantum Cryptography
Q62537968Measurement-Device-Independent Quantum Cryptography
Q50915431Memory attacks on device-independent quantum cryptography.
Q57446352Multi-photon implementation of three-stage quantum cryptography protocol
Q114844452Multilevel Identification Friend or Foe of Objects and Analysis of the Applicability of Post-Quantum Cryptographic Algorithms for Information Security
Q114224608Multimedia security based on quantum cryptography and blockchain
Q51641400Multiphoton entanglement concentration and quantum cryptography.
Q114847058NIST’s Post-Quantum Cryptography Standards Competition
Q58620587Non-contextual chocolate balls versus value indefinite quantum cryptography
Q114086167Novel Low-Complexity Polynomial Multiplication Over Hybrid Fields for Efficient Implementation of Binary Ring-LWE Post-Quantum Cryptography
Q114228113On the equivalence of two post-quantum cryptographic families
Q114847550On the robustness of information-theoretic authentication in quantum cryptography
Q59435414Optimal receiver for quantum cryptography with two coherent states
Q79418718Optimality of Gaussian attacks in continuous-variable quantum cryptography
Q77890503Parity bit in quantum cryptography
Q114847438Phase-Matching Quantum Cryptographic Conferencing
Q80176345Phase-modulation transmission system for quantum cryptography
Q59436345Photon-number-splitting versus cloning attacks in practical implementations of the Bennett-Brassard 1984 protocol for quantum cryptography
Q114844878Physical-Layer Security, Quantum Key Distribution, and Post-Quantum Cryptography
Q34216738Physics. Refining quantum cryptography
Q59163660Polarized single photon emission for quantum cryptography based on colloidal nanocrystals
Q57310994Position-Based Quantum Cryptography: Impossibility and Constructions
Q114845081Post Quantum Cryptographic Keys Generated with Physical Unclonable Functions
Q47687794Post-quantum cryptography
Q114848743Post-quantum cryptography Algorithm's standardization and performance analysis
Q114845845Post-quantum cryptography-driven security framework for cloud computing
Q51849803Postselection technique for quantum channels with applications to quantum cryptography.
Q47554014Practical device-independent quantum cryptography via entropy accumulation
Q79939910Practical limitation for continuous-variable quantum cryptography using coherent States
Q62045706Practical position-based quantum cryptography
Q27350192Practical quantum cryptography based on two-photon interferometry
Q61878713Practical realization of a quantum cryptography protocol exploiting polarization encoding in qutrits
Q104742738Provably Secure Symmetric Private Information Retrieval with Quantum Cryptography
Q62579595QSpace Project: Quantum Cryptography in Space
Q81003887QUANTUM CRYPTOGRAPHY: Single Photons
Q114948449Quantum Cryptography - The Issue of Security in Selected Quantum Protocols and the Issue of Data Credibility
Q62113692Quantum Cryptography Approaching the Classical Limit
Q74570307Quantum Cryptography Based on Two Mixed States
Q62037281Quantum Cryptography Based on the Deutsch-Jozsa Algorithm
Q40235134Quantum Cryptography II: How to re-use a one-time pad safely even if P=NP.
Q115020545Quantum Cryptography Latest: Promises to Boost Security Within a Decade, but Won’t End the Arms Race
Q114257646Quantum Cryptography Research: A Scientometric Assessment of Global Publications during 1992-2019
Q28060508Quantum Cryptography Using Any Two Nonorthogonal States
Q59441246Quantum Cryptography Via Parametric Downconversion
Q57703481Quantum Cryptography Without Switching
Q114844415Quantum Cryptography and its Application
Q62124826Quantum Cryptography as a Retrodiction Problem
Q59441016Quantum Cryptography for Information-Theoretic Security
Q59184442Quantum Cryptography with Entangled Photons
Q62554309Quantum Cryptography, Quantum Communication, and Quantum Computing in a Noisy Environment
Q114847302Quantum Cryptography-as-a-Service for Secure UAV Communication: Applications, Challenges, and Case Study
Q28039390Quantum Cryptography: Public Key Distribution and Coin Tossing
Q28039430Quantum Cryptography: Public Key Distribution and Coin Tossing
Q28060534Quantum Cryptography: Uncertainty in the Service of Privacy
Q114844740Quantum Cryptography—A Simplified Undergraduate Experiment and Simulation
Q55032841Quantum Privacy Amplification and the Security of Quantum Cryptography over Noisy Channels.
Q114846804Quantum Sampling for Finite Key Rates in High Dimensional Quantum Cryptography
Q114645655Quantum algorithms for attacking hardness assumptions in classical and post‐quantum cryptography
Q62049107Quantum and classical noise in practical quantum-cryptography systems based on polarization-entangled photons
Q77890493Quantum cryptographic network based on quantum memories
Q59472742Quantum cryptographic ranging
Q114847938Quantum cryptographic resource distillation and entanglement
Q56687878Quantum cryptography
Q62109912Quantum cryptography and authentication with low key-consumption
Q21563711Quantum cryptography based on Bell’s theorem
Q74564427Quantum cryptography based on orthogonal states
Q59437562Quantum cryptography based on qutrit Bell inequalities
Q59465675Quantum cryptography beyond quantum key distribution
Q84828656Quantum cryptography in free space
Q59087922Quantum cryptography on multiuser optical fibre networks
Q55038228Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations.
Q114848209Quantum cryptography technique: A way to improve security challenges in mobile cloud computing (MCC)
Q59450182Quantum cryptography using a photon source based on postselection from entangled two-photon states
Q74321016Quantum cryptography using entangled photons in energy-time bell states
Q85117856Quantum cryptography using optical fibers
Q73042202Quantum cryptography with 3-state systems
Q62563111Quantum cryptography with a single-photon source
Q62113669Quantum cryptography with an ideal local relay
Q58923890Quantum cryptography with bright entangled beams
Q77882324Quantum cryptography with coherent states
Q51876939Quantum cryptography with finite resources: unconditional security bound for discrete-variable protocols with one-way postprocessing.
Q51463974Quantum cryptography with perfect multiphoton entanglement.
Q62047326Quantum cryptography with structured photons through a vortex fiber
Q62047328Quantum cryptography with twisted photons through an outdoor underwater channel
Q27350107Quantum cryptography without Bell’s theorem
Q77872999Quantum cryptography without conjugate coding
Q56673504Quantum cryptography: An emerging technology in network security
Q29011667Quantum cryptography: Public key distribution and coin tossing
Q62097221Quantum cryptography: Security criteria reexamined
Q61158753Quantum cryptography: Theoretical protocols for quantum key distribution and tests of selected commercial QKD systems in commercial fiber networks
Q55043980Quantum cryptography: seeking absolute security.
Q42984371Quantum discord as a resource for quantum cryptography
Q59472104Quantum key distribution security constraints caused by controlled quality of dark channel for non-entangled and entangled photon quantum cryptography setups
Q64289418Quantum private query: A new kind of practical quantum cryptographic protocol
Q59430293Quantum relays for long distance quantum cryptography
Q62097215RAW-DATA ATTACKS IN QUANTUM CRYPTOGRAPHY WITH PARTIAL TOMOGRAPHY
Q59449225RESPONSE TO "VULNERABILITY OF 'A NOVEL PROTOCOL-AUTHENTICATION ALGORITHM RULING OUT A MAN-IN-THE-MIDDLE ATTACK IN QUANTUM CRYPTOGRAPHY'"
Q114847029RISC-V Galois Field ISA Extension for Non-Binary Error-Correction Codes and Classical and Post-Quantum Cryptography
Q62556601Reduced randomness in quantum cryptography with sequences of qubits encoded in the same basis
Q62113670Reply to 'Discrete and continuous variables for measurement-device-independent quantum cryptography'
Q59435861Research on Electrically Driven Single Photon Emitter by Diamond for Quantum Cryptography
Q114847849Resource guide for teaching post-quantum cryptography
Q114846277Secure Data Transmission Using Quantum Cryptography in Fog Computing
Q34165878Secure communication: quantum cryptography with a photon turnstile.
Q114845758Secured Cloud Data Storage Encryption Using Post-Quantum Cryptography
Q77889335Security against eavesdropping in quantum cryptography
Q62556620Security aspects of quantum cryptography with D-dimensional systems
Q62556621Security aspects of quantum cryptography with d-dimensional systems
Q58147438Security in Quantum Cryptography vs. Nonlocal Hidden Variables
Q114847430Security in quantum cryptography
Q114968252Security of EPR-based Quantum Cryptography
Q60033847Security of a two-parameter quantum cryptography system using time-shifted states against photon-number splitting attacks
Q62109854Security of continuous-variable quantum cryptography with Gaussian postselection
Q21708958Security of two quantum cryptography protocols using the same four qubit states
Q114256974Security proof of counterfactual quantum cryptography against general intercept-resend attacks and its vulnerability
Q114847441Seismic Sensing Using Quantum Cryptography Network
Q113869841Semi-automated verification of security proofs of quantum cryptographic protocols
Q61157601Separating cascaded photons from a single quantum dot: Demonstration of multiplexed quantum cryptography
Q99969820Signature Scheme Based on Quantum Cryptography
Q59476692Single Photon Quantum Cryptography
Q59163638Single colloidal quantum dots as sources of single photons for quantum cryptography
Q62471154Single photon detection and quantum cryptography
Q62109325Single-photon Interference over 150 km Transmission Using Silica-based Integrated-optic Interferometers for Quantum Cryptography
Q62109329Single-photon interference experiment over 100 km for quantum cryptography system using balanced gated-mode photon detector
Q44962494Spectral coherent-state quantum cryptography.
Q58923889Squeezed light from microstructured fibres: towards free-space quantum cryptography
Q58620642Staging quantum cryptography with chocolate balls
Q113322562State-of-the-Art Survey of Quantum Cryptography
Q114847432Stream Privacy Amplification for Quantum Cryptography
Q66669984Study on quantum cryptography using orbital angular momentum states of photons
Q62387981Superlinear threshold detectors in quantum cryptography
Q114845639Survey of Lattice to Design Post Quantum Cryptographic Algorithm Using Lattice
Q59436258TOMOGRAPHIC QUANTUM CRYPTOGRAPHY PROTOCOLS ARE REFERENCE FRAME INDEPENDENT
Q59436239The black paper of quantum cryptography: Real implementation problems
Q114738377The effect of multi-pair signal states in quantum cryptography with entangled photons
Q114846460The long road ahead to transition to post-quantum cryptography
Q53252233Thermal blinding of gated detectors in quantum cryptography.
Q35743000Tight finite-key analysis for quantum cryptography
Q56745207Time-polarization coding in quantum cryptography
Q114848995To Secure the Communication in Powerful Internet of Things Using Innovative Post-Quantum Cryptographic Method
Q62097226Tomographic Quantum Cryptography: Equivalence of Quantum and Classical Key Distillation
Q62097225Tomographic quantum cryptography
Q114844808Toward Quantum Secured Distributed Energy Resources: Adoption of Post-Quantum Cryptography (PQC) and Quantum Key Distribution (QKD)
Q114021049Towards Post-Quantum Cryptography Using Thermal Noise Theory and True Random Numbers Generation
Q114845760Towards a Scalable and Secure Blockchain Based on Post-Quantum Cryptography.
Q59184468Towards practical quantum cryptography
Q114847940Transitioning organizations to post-quantum cryptography
Q56091454Trojan-horse attacks threaten the security of practical quantum cryptography
Q62113672Two-way Gaussian quantum cryptography against coherent attacks in direct reconciliation
Q62113674Two-way quantum cryptography at different wavelengths
Q114847473US outlines shift to ‘post-quantum cryptography’
Q34404556Unconditionally secure commitment in position-based quantum cryptography
Q59436324Upper bounds for the security of two distributed-phase reference protocols of quantum cryptography
Q62578799Wigner tomography of two-qubit states and quantum cryptography

Q7233576post-quantum cryptographydifferent fromP1889
Q1027298quantum key distributionstudied inP2579
Q110877322quantum secret sharingsubclass ofP279
Q8614210Category:Quantum cryptographycategory's main topicP301
Q66369823relativistic quantum cryptographypart ofP361
Q8789cryptographyhas part(s)P527

The articles in Wikimedia projects and languages

Arabic (ar / Q13955)تعمية كموميةwikipedia
bnকোয়ান্টাম তথ্যগুপ্তিবিদ্যাwikipedia
Catalan (ca / Q7026)Criptografia quànticawikipedia
      Kvantová kryptografiewikipedia
      Quantenkryptographiewikipedia
      Quantum cryptographywikipedia
      Criptografía cuánticawikipedia
      Kvantkrüptograafiawikipedia
Basque language (eu / Q8752)Kriptografia kuantikowikipedia
Persian (fa / Q9168)رمزنگاری کوانتومیwikipedia
      Kvanttisalauswikipedia
      Cryptographie quantiquewikipedia
      הצפנה קוונטיתwikipedia
      Kvantna kriptografijawikipedia
      Kvantumkriptográfiawikipedia
      Crittografia quantisticawikipedia
      量子暗号wikipedia
      양자 암호wikipedia
lmoCrittografia quantistegawikipedia
      Kvantinė kriptografijawikipedia
nbKvantekryptografiwikipedia
      Kwantumcryptografiewikipedia
paਕੁਆਂਟਮ ਕ੍ਰਿਪਟੋਗ੍ਰਾਫੀwikipedia
      Kryptologia kwantowawikipedia
      Criptografia quânticawikipedia
      Criptare cuanticăwikipedia
      Квантовая криптографияwikipedia
      Kvantna kriptografijawikipedia
      Kvantkrypteringwikipedia
taதுளிம மறைப்பியல்wikipedia
      Kuantum kriptografiwikipedia
      Квантова криптографіяwikipedia
      Mật mã lượng tửwikipedia
yue量子密碼學wikipedia
      量子密碼學wikipedia

Search more.