Learn More
The weakening of the widely used SHA-1 hash function has also cast doubts on the strength of the related algorithms of the SHA-2 family. The US NIST has therefore initiated the SHA-3 competition in order to select a modern hash function algorithm as a " backup " for SHA-2. This algorithm should be efficiently implementable both in software and hardware(More)
Introduction Today's society relies heavily on confidential and authenticated communication. QKD, a solution for information theoretically secure key exchange, has been subject of a rapid development since the mid 1990's. Starting from the early proof of feasibility experiments, faster and faster (with bit rates of the order of Mbits [1, 2]) and long(More)
  • 1