Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Quantum cryptography

Known as: Quantum Secure Direct Communication, Quantum cryptology, Quantum encription 
Quantum cryptography is the science of exploiting quantum mechanicalproperties to perform cryptographic tasks. The best known example of quantum… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2019
Review
2019
The National Institute of Standards and Technology is in the process of selecting one or more public-key cryptographic algorithms… Expand
Review
2018
Review
2018
Quantum computers are available to use over the cloud, but the recent explosion of quantum software platforms can be overwhelming… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Review
2018
Review
2018
Quantum computers promise to efficiently solve not only problems believed to be intractable for classical computers, but also… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Review
2017
Review
2017
This paper gives an overview of the different types of quantum-resistant algorithms for public key encryption and signature… Expand
  • table 1
  • figure 1
Highly Cited
2014
Highly Cited
2014
When elementary quantum systems, such as polarized photons, are used to transmit digital information, the uncertainty principle… Expand
Highly Cited
2010
Highly Cited
2010
By using bright pulses of light to ‘blind’ the avalanche photodiode detectors used in quantum cryptography equipment, scientists… Expand
  • figure 2
  • figure 1
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2005
Highly Cited
2005
Quantum Cryptography was born in the early seventies when Stephen Wiesner wrote “Conjugate Coding”, which unfortunately took more… Expand
  • figure 2.3
  • figure 2.4
Highly Cited
2001
Highly Cited
2001
II A beautiful idea 2 A The intuition . . . . . . . . . . . . . . . 2 B Classical cryptography . . . . . . . . . 3 1 Asymmetrical… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2001
Highly Cited
2001
Basic techniques to prove the unconditional security of quantum crypto graphy are described. They are applied to a quantum key… Expand
  • figure 1
Highly Cited
1990
Highly Cited
1990
We describe initial results from an apparatus and protocol designed to implement quantum public key distribution, by which two… Expand