Abstract is: Quantum cryptography is the science of exploiting quantum mechanical properties to perform cryptographic tasks. The best known example of quantum cryptography is quantum key distribution which offers an information-theoretically secure solution to the key exchange problem. The advantage of quantum cryptography lies in the fact that it allows the completion of various cryptographic tasks that are proven or conjectured to be impossible using only classical (i.e. non-quantum) communication. For example, it is impossible to copy data encoded in a quantum state. If one attempts to read the encoded data, the quantum state will be changed due to wave function collapse (no-cloning theorem). This could be used to detect eavesdropping in quantum key distribution (QKD).
branch of science | Q2465832 |
P508 | BNCF Thesaurus ID | 41294 |
P10565 | Encyclopedia of China (Third Edition) ID | 34292 |
506356 | ||
P1417 | Encyclopædia Britannica Online ID | topic/quantum-cryptography |
P646 | Freebase ID | /m/0dnwx |
P7502 | Golden ID | Quantum_cryptography-XDJ8E6 |
P11514 | Great Russian Encyclopedia portal ID | kvantovaia-kriptografiia-5a1937 |
P3827 | JSTOR topic ID (archived) | quantum-cryptography |
P8408 | KBpedia ID | QuantumCryptography |
P6366 | Microsoft Academic ID | 144901912 |
P349 | NDL Authority ID | 01164705 |
P10283 | OpenAlex ID | C144901912 |
P3417 | Quora topic ID | Quantum-Cryptography |
P10376 | ScienceDirect topic ID | engineering/quantum-cryptography |
computer-science/quantum-cryptography | ||
physics-and-astronomy/quantum-cryptography | ||
P9775 | Treccani's Lessico del XXI Secolo ID | crittografia-quantistica |
P5064 | World of Physics ID | QuantumCryptography |
P3553 | Zhihu topic ID | 20747420 |
P1889 | different from | post-quantum cryptography | Q7233576 |
P361 | part of | cryptography | Q8789 |
P443 | pronunciation audio | Audio pronunciation file from the Lingua Libre project. License: CC0 Artists:
This work is copyrighted. | |
P910 | topic's main category | Category:Quantum cryptography | Q8614210 |
Q114844768 | A Mathematical Perspective on Post-Quantum Cryptography |
Q114847244 | A Modified Key Sifting Scheme With Artificial Neural Network Based Key Reconciliation Analysis in Quantum Cryptography |
Q59468097 | A NOVEL PROTOCOL-AUTHENTICATION ALGORITHM RULING OUT A MAN-IN-THE MIDDLE ATTACK IN QUANTUM CRYPTOGRAPHY |
Q114849586 | A Novel Classical and Quantum Cryptographic Scheme for Data Encryption |
Q114923028 | A Quantum Cryptography Protocol for Access Control in Big Data |
Q114844699 | A System-on-a-Chip Implementation of a Post-Quantum Cryptography Scheme for Smart Meter Data Communications |
Q61051052 | A Three-Stage Quantum Cryptography Protocol |
Q60026406 | A monogamy-of-entanglement game with applications to device-independent quantum cryptography |
Q66669298 | A phase modulated QKD system with two quantum cryptography protocols |
Q50083532 | Advanced active quenching circuit for ultra-fast quantum cryptography |
Q114844811 | An Experimental Study of Building Blocks of Lattice-Based NIST Post-Quantum Cryptographic Algorithms |
Q66672708 | An analysis of the model of the error bits of quantum cryptography protocol |
Q114847141 | Analysis of the NTRU Post-Quantum Cryptographic Scheme in Constrained IoT Edge Devices |
Q115058263 | Attack trees in Isabelle extended with probabilities for quantum cryptography |
Q51633012 | Beating the photon-number-splitting attack in practical quantum cryptography. |
Q39802699 | Biased decoy-state measurement-device-independent quantum cryptographic conferencing with finite resources |
Q115038232 | Big Data Security Issues Based on Quantum Cryptography and Privacy with Authentication for Mobile Data Center |
Q114923303 | Big Data Security Issues and Quantum Cryptography for Cloud Computing |
Q114847567 | Bit commitment as an introduction to quantum cryptography |
Q62537950 | Bridging the gap between theory and practice in quantum cryptography |
Q27963718 | Brief History of Quantum Cryptography: A Personal Perspective |
Q62097216 | CODES FOR KEY GENERATION IN QUANTUM CRYPTOGRAPHY |
Q59524808 | Categorical quantum cryptography for access control in cloud computing |
Q62113702 | Characterization of Collective Gaussian Attacks and Security of Coherent-State Quantum Cryptography |
Q62097217 | Coherent eavesdropping attacks in tomographic quantum cryptography: Nonequivalence of quantum and classical key distillation |
Q59458916 | Coherent eavesdropping strategies for the four state quantum cryptography protocol |
Q74571654 | Comment on "Quantum Cryptography with Orthogonal States?" |
Q114846596 | Comments on the Paper “Are There Enough Decoy States to Ensure Key Secrecy in Quantum Cryptography?” by S. N. Molotkov, K. S. Kravtsov, and M. I. Ryzhkin and on the Erratum to This Paper |
Q80121856 | Compact transmission system using single-sideband modulation of light for quantum cryptography |
Q58923766 | Continuous Variable Quantum Cryptography: Beating the 3 dB Loss Limit |
Q62606030 | Continuous Variable Quantum Cryptography: Post-Selection with Thermal Noise |
Q52045760 | Continuous variable quantum cryptography using coherent states. |
Q76398765 | Continuous-variable quantum cryptography is secure against non-Gaussian attacks |
Q62113706 | Continuous-variable quantum cryptography using two-way quantum communication |
Q62113664 | Continuous-variable quantum cryptography with an untrusted relay: Detailed security analysis of the symmetric configuration |
Q83994580 | Counterfactual quantum cryptography |
Q114845822 | Current Status and Future Development of Quantum Cryptographic Protocols |
Q114846983 | DPCrypto: Acceleration of Post-Quantum Cryptography Using Dot-Product Instructions on GPUs |
Q51836958 | De Finetti representation theorem for infinite-dimensional quantum systems and applications to quantum cryptography. |
Q61833351 | Decoy state protocols for quantum cryptography with parametric down conversion sources |
Q80696274 | Defense frontier analysis of quantum cryptographic systems |
Q114846023 | Design and Validation of Quantum Key Management System for Construction of KREONET Quantum Cryptography Communication |
Q114848991 | Design of Polynomial NTT and INTT Accelerator for Post-Quantum Cryptography CRYSTALS-Kyber |
Q59059816 | Deterministic and efficient quantum cryptography based on Bell’s theorem |
Q114923094 | Development of Mechanism for Enhancing Data Security in Quantum Cryptography |
Q50942703 | Device-independent security of quantum cryptography against collective attacks. |
Q62109868 | Distinguishability of Gaussian states in quantum cryptography using postselection |
Q62472918 | Double entanglement and quantum cryptography |
Q91007671 | Eavesdropping and countermeasures for backflash side channel in quantum cryptography |
Q62113698 | Eavesdropping of Two-Way Coherent-State Quantum Cryptography via Gaussian Quantum Cloning Machines |
Q113806116 | Efficient Hardware Arithmetic for Inverted Binary Ring-LWE Based Post-Quantum Cryptography |
Q42292891 | Efficient multiuser quantum cryptography network based on entanglement |
Q62106495 | Efficient solid state memories for quantum cryptography |
Q62470460 | Eighty kilometre transmission experiment using an InGaAs/InP SPAD-based quantum cryptography receiver operating at 1.55 km |
Q114847337 | Energy Efficiency Analysis of Post-Quantum Cryptographic Algorithms |
Q46714710 | Enhanced autocompensating quantum cryptography system |
Q114109837 | Enhancing quantum cryptography with quantum dot single-photon sources |
Q59429968 | Entangled State Quantum Cryptography: Eavesdropping on the Ekert Protocol |
Q62592770 | Entanglement witnessing and quantum cryptography with nonideal ferromagnetic detectors |
Q96431913 | Entanglement-based secure quantum cryptography over 1,120 kilometres |
Q114924259 | Entropy Security in Quantum Cryptography |
Q59423998 | Erratum: Quantum Privacy Amplification and the Security of Quantum Cryptography over Noisy Channels [Phys. Rev. Lett. 77, 2818 (1996)] |
Q114845647 | Evaluation of the influence of the probability of erasing binary symbols «0» on the probability of erroneous data registration in a quantum-cryptographic communication channel |
Q61757828 | Event-by-Event Simulation of Quantum Cryptography Protocols |
Q47702114 | Examination of China's performance and thematic evolution in quantum cryptography research using quantitative and computational techniques |
Q59437087 | Experimental Quantum Secret Sharing and Third-Man Quantum Cryptography |
Q55882573 | Experimental quantum cryptography |
Q62049071 | Experimental quantum cryptography scheme based on orthogonal states: preliminary results |
Q62109697 | Experimental quantum cryptography with qutrits |
Q60033588 | Experimental quantum-cryptography scheme based on orthogonal states |
Q62049055 | Experimental realization of counterfactual quantum cryptography |
Q62270833 | Experimental realization of quantum cryptography communication in free space |
Q114847551 | Experimental resources needed to implement photon number splitting attack in quantum cryptography |
Q83735117 | Experiments on long wavelength (1550 nm) "plug and play" quantum cryptography systems |
Q58620649 | FEASIBILITY OF THE INTERLOCK PROTOCOL AGAINST MAN-IN-THE-MIDDLE ATTACKS ON QUANTUM CRYPTOGRAPHY |
Q81319087 | Faraday-Michelson system for quantum cryptography |
Q33559908 | Fast and simple high-capacity quantum cryptography with error detection |
Q55933520 | Field experiment on a robust hierarchical metropolitan quantum cryptography network |
Q59438538 | Field test of a practical secure communication network with decoy-state quantum cryptography |
Q62113659 | Finite-size analysis of measurement-device-independent quantum cryptography with continuous variables |
Q114923022 | Framework for Wireless Network Security Using Quantum Cryptography |
Q59184217 | Free-space quantum cryptography for metropolitan areas |
Q61198305 | Full-field implementation of a perfect eavesdropper on a quantum cryptography system |
Q62113660 | Gaussian two-mode attacks in one-way quantum cryptography |
Q38687501 | General immunity and superadditivity of two-way Gaussian quantum cryptography |
Q47435809 | Generalized optical angular momentum sorter and its application to high-dimensional quantum cryptography |
Q62470410 | Gigahertz quantum cryptography |
Q62470420 | Gigahertz quantum cryptography |
Q114918393 | Hardware-based computer security techniques to defeat hackers: from biometrics to quantum cryptography |
Q62387885 | High-dimensional intracity quantum cryptography with structured photons |
Q59457991 | High-dimensional quantum cryptography with twisted light |
Q62113666 | High-rate measurement-device-independent quantum cryptography |
Q30883162 | High-speed data encryption over 25 km of fiber by two-mode coherent-state quantum cryptography |
Q59434983 | Hybrid ququart-encoded quantum cryptography protected by Kochen-Specker contextuality |
Q62553804 | Hyper-entangled states and free-space quantum cryptography |
Q114843220 | Implementation of Parallel Optimization of Rejection Sampling using RST in Lattice-Based Post-Quantum Cryptography |
Q59184063 | Information leakage via side channels in freespace BB84 quantum cryptography |
Q77873441 | Information-theoretic limits to quantum cryptography |
Q27350428 | Insecurity of position-based quantum-cryptography protocols against entanglement attacks |
Q114966620 | Introducing Quantum Cryptography Based Secured Encryption and Decryption Algorithms |
Q53610477 | Laser damage helps the eavesdropper in quantum cryptography. |
Q114223651 | Leveraging the hardness of dihedral coset problem for quantum cryptography |
Q59441198 | Limitations on Practical Quantum Cryptography |
Q114844901 | Logic Programming with Post-Quantum Cryptographic Primitives for Smart Contract on Quantum-Secured Blockchain |
Q59184349 | Long-distance free-space quantum cryptography |
Q84788849 | Long-distance frequency-division interferometer for communication and quantum cryptography |
Q62537962 | Loss-tolerant position-based quantum cryptography |
Q114847021 | Low-Cost Shuffling Countermeasures against Side-Channel Attacks for NTT-based Post-Quantum Cryptography |
Q114969346 | Mathematical Analysis of Public Key Encryption Algorithm and Security of Anti Quantum Cryptography |
Q62537968 | Measurement-Device-Independent Quantum Cryptography |
Q50915431 | Memory attacks on device-independent quantum cryptography. |
Q57446352 | Multi-photon implementation of three-stage quantum cryptography protocol |
Q114844452 | Multilevel Identification Friend or Foe of Objects and Analysis of the Applicability of Post-Quantum Cryptographic Algorithms for Information Security |
Q114224608 | Multimedia security based on quantum cryptography and blockchain |
Q51641400 | Multiphoton entanglement concentration and quantum cryptography. |
Q114847058 | NIST’s Post-Quantum Cryptography Standards Competition |
Q58620587 | Non-contextual chocolate balls versus value indefinite quantum cryptography |
Q114086167 | Novel Low-Complexity Polynomial Multiplication Over Hybrid Fields for Efficient Implementation of Binary Ring-LWE Post-Quantum Cryptography |
Q114228113 | On the equivalence of two post-quantum cryptographic families |
Q114847550 | On the robustness of information-theoretic authentication in quantum cryptography |
Q59435414 | Optimal receiver for quantum cryptography with two coherent states |
Q79418718 | Optimality of Gaussian attacks in continuous-variable quantum cryptography |
Q77890503 | Parity bit in quantum cryptography |
Q114847438 | Phase-Matching Quantum Cryptographic Conferencing |
Q80176345 | Phase-modulation transmission system for quantum cryptography |
Q59436345 | Photon-number-splitting versus cloning attacks in practical implementations of the Bennett-Brassard 1984 protocol for quantum cryptography |
Q114844878 | Physical-Layer Security, Quantum Key Distribution, and Post-Quantum Cryptography |
Q34216738 | Physics. Refining quantum cryptography |
Q59163660 | Polarized single photon emission for quantum cryptography based on colloidal nanocrystals |
Q57310994 | Position-Based Quantum Cryptography: Impossibility and Constructions |
Q114845081 | Post Quantum Cryptographic Keys Generated with Physical Unclonable Functions |
Q47687794 | Post-quantum cryptography |
Q114848743 | Post-quantum cryptography Algorithm's standardization and performance analysis |
Q114845845 | Post-quantum cryptography-driven security framework for cloud computing |
Q51849803 | Postselection technique for quantum channels with applications to quantum cryptography. |
Q47554014 | Practical device-independent quantum cryptography via entropy accumulation |
Q79939910 | Practical limitation for continuous-variable quantum cryptography using coherent States |
Q62045706 | Practical position-based quantum cryptography |
Q27350192 | Practical quantum cryptography based on two-photon interferometry |
Q61878713 | Practical realization of a quantum cryptography protocol exploiting polarization encoding in qutrits |
Q104742738 | Provably Secure Symmetric Private Information Retrieval with Quantum Cryptography |
Q62579595 | QSpace Project: Quantum Cryptography in Space |
Q81003887 | QUANTUM CRYPTOGRAPHY: Single Photons |
Q114948449 | Quantum Cryptography - The Issue of Security in Selected Quantum Protocols and the Issue of Data Credibility |
Q62113692 | Quantum Cryptography Approaching the Classical Limit |
Q74570307 | Quantum Cryptography Based on Two Mixed States |
Q62037281 | Quantum Cryptography Based on the Deutsch-Jozsa Algorithm |
Q40235134 | Quantum Cryptography II: How to re-use a one-time pad safely even if P=NP. |
Q115020545 | Quantum Cryptography Latest: Promises to Boost Security Within a Decade, but Won’t End the Arms Race |
Q114257646 | Quantum Cryptography Research: A Scientometric Assessment of Global Publications during 1992-2019 |
Q28060508 | Quantum Cryptography Using Any Two Nonorthogonal States |
Q59441246 | Quantum Cryptography Via Parametric Downconversion |
Q57703481 | Quantum Cryptography Without Switching |
Q114844415 | Quantum Cryptography and its Application |
Q62124826 | Quantum Cryptography as a Retrodiction Problem |
Q59441016 | Quantum Cryptography for Information-Theoretic Security |
Q59184442 | Quantum Cryptography with Entangled Photons |
Q62554309 | Quantum Cryptography, Quantum Communication, and Quantum Computing in a Noisy Environment |
Q114847302 | Quantum Cryptography-as-a-Service for Secure UAV Communication: Applications, Challenges, and Case Study |
Q28039390 | Quantum Cryptography: Public Key Distribution and Coin Tossing |
Q28039430 | Quantum Cryptography: Public Key Distribution and Coin Tossing |
Q28060534 | Quantum Cryptography: Uncertainty in the Service of Privacy |
Q114844740 | Quantum Cryptography—A Simplified Undergraduate Experiment and Simulation |
Q55032841 | Quantum Privacy Amplification and the Security of Quantum Cryptography over Noisy Channels. |
Q114846804 | Quantum Sampling for Finite Key Rates in High Dimensional Quantum Cryptography |
Q114645655 | Quantum algorithms for attacking hardness assumptions in classical and post‐quantum cryptography |
Q62049107 | Quantum and classical noise in practical quantum-cryptography systems based on polarization-entangled photons |
Q77890493 | Quantum cryptographic network based on quantum memories |
Q59472742 | Quantum cryptographic ranging |
Q114847938 | Quantum cryptographic resource distillation and entanglement |
Q56687878 | Quantum cryptography |
Q62109912 | Quantum cryptography and authentication with low key-consumption |
Q21563711 | Quantum cryptography based on Bell’s theorem |
Q74564427 | Quantum cryptography based on orthogonal states |
Q59437562 | Quantum cryptography based on qutrit Bell inequalities |
Q59465675 | Quantum cryptography beyond quantum key distribution |
Q84828656 | Quantum cryptography in free space |
Q59087922 | Quantum cryptography on multiuser optical fibre networks |
Q55038228 | Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations. |
Q114848209 | Quantum cryptography technique: A way to improve security challenges in mobile cloud computing (MCC) |
Q59450182 | Quantum cryptography using a photon source based on postselection from entangled two-photon states |
Q74321016 | Quantum cryptography using entangled photons in energy-time bell states |
Q85117856 | Quantum cryptography using optical fibers |
Q73042202 | Quantum cryptography with 3-state systems |
Q62563111 | Quantum cryptography with a single-photon source |
Q62113669 | Quantum cryptography with an ideal local relay |
Q58923890 | Quantum cryptography with bright entangled beams |
Q77882324 | Quantum cryptography with coherent states |
Q51876939 | Quantum cryptography with finite resources: unconditional security bound for discrete-variable protocols with one-way postprocessing. |
Q51463974 | Quantum cryptography with perfect multiphoton entanglement. |
Q62047326 | Quantum cryptography with structured photons through a vortex fiber |
Q62047328 | Quantum cryptography with twisted photons through an outdoor underwater channel |
Q27350107 | Quantum cryptography without Bell’s theorem |
Q77872999 | Quantum cryptography without conjugate coding |
Q56673504 | Quantum cryptography: An emerging technology in network security |
Q29011667 | Quantum cryptography: Public key distribution and coin tossing |
Q62097221 | Quantum cryptography: Security criteria reexamined |
Q61158753 | Quantum cryptography: Theoretical protocols for quantum key distribution and tests of selected commercial QKD systems in commercial fiber networks |
Q55043980 | Quantum cryptography: seeking absolute security. |
Q42984371 | Quantum discord as a resource for quantum cryptography |
Q59472104 | Quantum key distribution security constraints caused by controlled quality of dark channel for non-entangled and entangled photon quantum cryptography setups |
Q64289418 | Quantum private query: A new kind of practical quantum cryptographic protocol |
Q59430293 | Quantum relays for long distance quantum cryptography |
Q62097215 | RAW-DATA ATTACKS IN QUANTUM CRYPTOGRAPHY WITH PARTIAL TOMOGRAPHY |
Q59449225 | RESPONSE TO "VULNERABILITY OF 'A NOVEL PROTOCOL-AUTHENTICATION ALGORITHM RULING OUT A MAN-IN-THE-MIDDLE ATTACK IN QUANTUM CRYPTOGRAPHY'" |
Q114847029 | RISC-V Galois Field ISA Extension for Non-Binary Error-Correction Codes and Classical and Post-Quantum Cryptography |
Q62556601 | Reduced randomness in quantum cryptography with sequences of qubits encoded in the same basis |
Q62113670 | Reply to 'Discrete and continuous variables for measurement-device-independent quantum cryptography' |
Q59435861 | Research on Electrically Driven Single Photon Emitter by Diamond for Quantum Cryptography |
Q114847849 | Resource guide for teaching post-quantum cryptography |
Q114846277 | Secure Data Transmission Using Quantum Cryptography in Fog Computing |
Q34165878 | Secure communication: quantum cryptography with a photon turnstile. |
Q114845758 | Secured Cloud Data Storage Encryption Using Post-Quantum Cryptography |
Q77889335 | Security against eavesdropping in quantum cryptography |
Q62556620 | Security aspects of quantum cryptography with D-dimensional systems |
Q62556621 | Security aspects of quantum cryptography with d-dimensional systems |
Q58147438 | Security in Quantum Cryptography vs. Nonlocal Hidden Variables |
Q114847430 | Security in quantum cryptography |
Q114968252 | Security of EPR-based Quantum Cryptography |
Q60033847 | Security of a two-parameter quantum cryptography system using time-shifted states against photon-number splitting attacks |
Q62109854 | Security of continuous-variable quantum cryptography with Gaussian postselection |
Q21708958 | Security of two quantum cryptography protocols using the same four qubit states |
Q114256974 | Security proof of counterfactual quantum cryptography against general intercept-resend attacks and its vulnerability |
Q114847441 | Seismic Sensing Using Quantum Cryptography Network |
Q113869841 | Semi-automated verification of security proofs of quantum cryptographic protocols |
Q61157601 | Separating cascaded photons from a single quantum dot: Demonstration of multiplexed quantum cryptography |
Q99969820 | Signature Scheme Based on Quantum Cryptography |
Q59476692 | Single Photon Quantum Cryptography |
Q59163638 | Single colloidal quantum dots as sources of single photons for quantum cryptography |
Q62471154 | Single photon detection and quantum cryptography |
Q62109325 | Single-photon Interference over 150 km Transmission Using Silica-based Integrated-optic Interferometers for Quantum Cryptography |
Q62109329 | Single-photon interference experiment over 100 km for quantum cryptography system using balanced gated-mode photon detector |
Q44962494 | Spectral coherent-state quantum cryptography. |
Q58923889 | Squeezed light from microstructured fibres: towards free-space quantum cryptography |
Q58620642 | Staging quantum cryptography with chocolate balls |
Q113322562 | State-of-the-Art Survey of Quantum Cryptography |
Q114847432 | Stream Privacy Amplification for Quantum Cryptography |
Q66669984 | Study on quantum cryptography using orbital angular momentum states of photons |
Q62387981 | Superlinear threshold detectors in quantum cryptography |
Q114845639 | Survey of Lattice to Design Post Quantum Cryptographic Algorithm Using Lattice |
Q59436258 | TOMOGRAPHIC QUANTUM CRYPTOGRAPHY PROTOCOLS ARE REFERENCE FRAME INDEPENDENT |
Q59436239 | The black paper of quantum cryptography: Real implementation problems |
Q114738377 | The effect of multi-pair signal states in quantum cryptography with entangled photons |
Q114846460 | The long road ahead to transition to post-quantum cryptography |
Q53252233 | Thermal blinding of gated detectors in quantum cryptography. |
Q35743000 | Tight finite-key analysis for quantum cryptography |
Q56745207 | Time-polarization coding in quantum cryptography |
Q114848995 | To Secure the Communication in Powerful Internet of Things Using Innovative Post-Quantum Cryptographic Method |
Q62097226 | Tomographic Quantum Cryptography: Equivalence of Quantum and Classical Key Distillation |
Q62097225 | Tomographic quantum cryptography |
Q114844808 | Toward Quantum Secured Distributed Energy Resources: Adoption of Post-Quantum Cryptography (PQC) and Quantum Key Distribution (QKD) |
Q114021049 | Towards Post-Quantum Cryptography Using Thermal Noise Theory and True Random Numbers Generation |
Q114845760 | Towards a Scalable and Secure Blockchain Based on Post-Quantum Cryptography. |
Q59184468 | Towards practical quantum cryptography |
Q114847940 | Transitioning organizations to post-quantum cryptography |
Q56091454 | Trojan-horse attacks threaten the security of practical quantum cryptography |
Q62113672 | Two-way Gaussian quantum cryptography against coherent attacks in direct reconciliation |
Q62113674 | Two-way quantum cryptography at different wavelengths |
Q114847473 | US outlines shift to ‘post-quantum cryptography’ |
Q34404556 | Unconditionally secure commitment in position-based quantum cryptography |
Q59436324 | Upper bounds for the security of two distributed-phase reference protocols of quantum cryptography |
Q62578799 | Wigner tomography of two-qubit states and quantum cryptography |
Q7233576 | post-quantum cryptography | different from | P1889 |
Q1027298 | quantum key distribution | studied in | P2579 |
Q110877322 | quantum secret sharing | subclass of | P279 |
Q8614210 | Category:Quantum cryptography | category's main topic | P301 |
Q66369823 | relativistic quantum cryptography | part of | P361 |
Q8789 | cryptography | has part(s) | P527 |
Search more.