Skip to search formSkip to main content>Semantic Scholar Semantic Scholar's Logo

Search

You are currently offline. Some features of the site may not work correctly.

Semantic Scholar uses AI to extract papers important to this topic.

Review

2019

Review

2019

The National Institute of Standards and Technology is in the process of selecting one or more public-key cryptographic algorithms… Expand

Review

2018

Review

2018

Quantum computers are available to use over the cloud, but the recent explosion of quantum software platforms can be overwhelming… Expand

Review

2018

Review

2018

Quantum computers promise to efficiently solve not only problems believed to be intractable for classical computers, but also… Expand

Review

2017

Review

2017

This paper gives an overview of the different types of quantum-resistant algorithms for public key encryption and signature… Expand

Highly Cited

2014

Highly Cited

2014

When elementary quantum systems, such as polarized photons, are used to transmit digital information, the uncertainty principle… Expand

Highly Cited

2010

Highly Cited

2010

By using bright pulses of light to ‘blind’ the avalanche photodiode detectors used in quantum cryptography equipment, scientists… Expand

Highly Cited

2005

Highly Cited

2005

Quantum Cryptography was born in the early seventies when Stephen Wiesner wrote “Conjugate Coding”, which unfortunately took more… Expand

Highly Cited

2001

Highly Cited

2001

II A beautiful idea 2 A The intuition . . . . . . . . . . . . . . . 2 B Classical cryptography . . . . . . . . . 3 1 Asymmetrical… Expand

Highly Cited

2001

Highly Cited

2001

Basic techniques to prove the unconditional security of quantum crypto graphy are described. They are applied to a quantum key… Expand

Highly Cited

1990

Highly Cited

1990

We describe initial results from an apparatus and protocol designed to implement quantum public key distribution, by which two… Expand