Back to Results
First PageMeta Content
Applied mathematics / Quantum information science / Kish cypher / Quantum key distribution / Quantum computer / Key size / Information-theoretic security / Man-in-the-middle attack / Noisy-storage model / Cryptography / Quantum cryptography / Theoretical computer science


Document Date: 2012-06-18 20:01:55


Open Document

File Size: 547,01 KB

Share Result on Facebook

City

Kobe / College Station / Albuquerque / Changsha / San Diego / /

Company

Sandia National Laboratories / Ångström Laboratory / /

Country

Hungary / Japan / United States / China / Sweden / /

Currency

EUR / /

Facility

Texas A&M University / Hunan University / Ångström Laboratory / Uppsala University / University of Szeged / National Institute of Information / Naval Warfare Systems Center / /

IndustryTerm

secure key exchange protocol / integer-number-based key exchange protocols / computing / quantum computing / energy / /

NaturalFeature

Alice Bob Information channel / /

Organization

Hunan University / Department of Technical Informatics / National Institute of Information and Communication Technology / Texas A&M University / Space and Naval Warfare Systems Center / Uppsala University / Department of Engineering Sciences / University of Szeged / /

Person

Alice / John Johnson / Alice Bob / Vadim Makarov / Harry Nyquist / /

Position

DRIVER / /

ProvinceOrState

Texas / New Mexico / Hunan / California / /

Technology

encryption / KLJN secure key exchange protocol / Thermodynamics / quantum encryption / KLJN protocols / cryptography system / 3 existing integer-number-based key exchange protocols / simulation / Communication Technology / /

URL

http /

SocialTag