On the security of αη: Response to 'some attacks on quantum-based cryptographic protocols'

被引:0
|
作者
Yuen, Horace P. [1 ]
Nair, Ranjith [1 ]
Corndorf, Eric [1 ]
Kanter, Gregory S. [1 ]
Kumar, Prem [1 ]
机构
[1] Center for Photonic Communication and Computing, Department of Electrical Engineering and Computer Science, Northwestern University, Evanston, IL 60208, United States
来源
Quantum Information and Computation | 2006年 / 6卷 / 07期
关键词
26;
D O I
10.26421/qic6.7-1
中图分类号
学科分类号
摘要
引用
收藏
页码:561 / 582
相关论文
共 50 条
  • [31] Classical Cryptographic Protocols in a Quantum World
    Hallgren, Sean
    Smith, Adam
    Song, Fang
    ADVANCES IN CRYPTOLOGY - CRYPTO 2011, 2011, 6841 : 411 - 428
  • [32] Formal proofs of cryptographic security of Diffie-Hellman-based protocols
    Roy, Arnab
    Datta, Anupam
    Mitchell, John C.
    TRUSTWORTHY GLOBAL COMPUTING, 2008, 4912 : 312 - +
  • [33] Classical cryptographic protocols in a quantum world
    Hallgren, Sean
    Smith, Adam
    Song, Fang
    INTERNATIONAL JOURNAL OF QUANTUM INFORMATION, 2015, 13 (04)
  • [34] Algebra model and security analysis for cryptographic protocols
    HUAI Jinpeng & LI Xianxian School of Computer
    Science in China(Series F:Information Sciences), 2004, (02) : 199 - 220
  • [35] Algebra model and security analysis for cryptographic protocols
    Huai, JP
    Li, XX
    SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2004, 47 (02): : 199 - 220
  • [36] Automatic detection of attacks on cryptographic protocols: A case study
    Cibrario, I
    Durante, L
    Sisto, R
    Valenzano, A
    DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, PROCEEDINGS, 2005, 3548 : 69 - 84
  • [37] Studying Formal Security Proofs for Cryptographic Protocols
    Kogos, Konstantin G.
    Zapechnikov, Sergey, V
    INFORMATION SECURITY EDUCATION FOR A GLOBAL DIGITAL SOCIETY, WISE 10, 2017, 503 : 63 - 73
  • [38] On different approaches to establish the security of cryptographic protocols
    Coffey, T
    Dojen, R
    Flanagan, T
    SAM'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, VOLS 1 AND 2, 2003, : 637 - 643
  • [39] Security Threats and Cryptographic Protocols for Medical Wearables
    Hernandez-Alvarez, Luis
    Bullon Perez, Juan Jose
    Kristel Batista, Farrah
    Queiruga-Dios, Araceli
    MATHEMATICS, 2022, 10 (06)
  • [40] Cognitive and biologically cryptographic protocols for data security
    Ogiela, Lidia
    Ogiela, Urszula
    COGNITIVE SYSTEMS RESEARCH, 2019, 56 : 1 - 6