Sciweavers

234 search results - page 3 / 47
» Security Aspects of the Authentication Used in Quantum Crypt...
Sort
View
ICC
2007
IEEE
108views Communications» more  ICC 2007»
14 years 20 days ago
Quantum Cryptography For Secure Optical Networks
Dense Wavelength Division Multiplexing optical networks transport a huge aggregate traffic exceeding Tbps per single fiber, and passive optical network technology has been extended...
Stamatios V. Kartalopoulos
FOCS
2005
IEEE
13 years 12 months ago
Cryptography In the Bounded Quantum-Storage Model
We initiate the study of two-party cryptographic primitives with unconditional security, assuming that the adversary’s quantum memory is of bounded size. We show that oblivious ...
Ivan Damgård, Serge Fehr, Louis Salvail, Chr...
IDTRUST
2009
ACM
14 years 1 months ago
Quantum resistant public key cryptography: a survey
Public key cryptography is widely used to secure transactions over the Internet. However, advances in quantum computers threaten to undermine the security assumptions upon which c...
Ray A. Perlner, David A. Cooper
ACNS
2008
Springer
147views Cryptology» more  ACNS 2008»
14 years 21 days ago
Multi-factor Authenticated Key Exchange
Abstract. In order to increase the security for authenticated key exchange protocols, various authentication means can be used together. In this paper, we introduce a security mode...
David Pointcheval, Sébastien Zimmer
STOC
2002
ACM
130views Algorithms» more  STOC 2002»
14 years 6 months ago
Secure multi-party quantum computation
Secure multi-party computing, also called secure function evaluation, has been extensively studied in classical cryptography. We consider the extension of this task to computation...
Claude Crépeau, Daniel Gottesman, Adam Smit...