Search

Search results

  1. Communication protocols between mistrustful parties

    ... generally, secure function evaluation . Category:Quantum Cryptography 6149 reads Last modified:  ...

    Wiki article - Anonymous (not verified) - 26/10/2015 - 17:56 - 0 comments

  2. Information Security in the Quantum Age

    Tags:  quantum Cryptography Post date:  Monday, September 9, ...

    Conference - Thbusch - 10/10/2019 - 02:59 - 0 comments

  3. Postdoctoral Fellowship at SUTD

    ... PostDoc 465 reads Tags:  quantum cryptography , Quantum Information and Quantum computation ...

    Position - sihuitan - 04/05/2016 - 03:57 - 0 comments

  4. ETSI / IQC Quantum Safe Workshop

    Tags:  post-quantum cryptography Post date:  Wednesday, August 30, 2017 - 12:23 151 reads Acronym:  ETSI_QSW Submitted 7 years 3 months ago by JMiszczak . Web page:  ETSI ...

    Conference - JMiszczak - 30/08/2017 - 12:27 - 0 comments

  5. Second Workshop on Theory and Realisation of Practical Quantum Key Distribution

    Tags:  quantum cryptography Post date:  Wednesday, March 3, 2010 - ...

    Conference - Marcopiani - 26/10/2015 - 17:09

  6. Postdoctoral fellowship in theoretical quantum information science at Stanford University

    Job type:  PostDoc 778 reads Tags:  quantum information theory , algorithms , fundamental physics , Cryptography Application deadline:  Friday, December 1, 2017 Employer web...

    Position - phayden - 11/10/2017 - 22:58 - 0 comments

  7. Optical Communication Engineer

    ... PostDoc Tags:  quantum communications; quantum cryptography; quantum key distribution Employer web page:  ...

    Position - Jing Yan Haw - 05/12/2019 - 10:14 - 0 comments

  8. Q+ Hangout: Scott Aaronson

    Tags:  talks seminars quantum cryptography quantum money Post date:  ...

    Conference - Mleifer - 26/10/2015 - 17:08

  9. The no-cloning theorem

    ... contrast, the no cloning theorem is a vital ingredient in quantum cryptography , as it forbids eavesdroppers from creating copies of a ... Imperfect cloning can be used as an eavesdropping attack on quantum cryptography protocols, among other uses in quantum information ...

    Wiki article - Anonymous (not verified) - 26/10/2015 - 17:56 - 0 comments

  10. Bit commitment

    ... mentioned above immediately carry over to OT. Category:Quantum Cryptography 13044 reads Last modified:  ...

    Wiki article - Anonymous (not verified) - 26/10/2015 - 17:56 - 0 comments

Pages