On the security of αη: Response to 'some attacks on quantum-based cryptographic protocols'

被引:0
|
作者
Yuen, Horace P. [1 ]
Nair, Ranjith [1 ]
Corndorf, Eric [1 ]
Kanter, Gregory S. [1 ]
Kumar, Prem [1 ]
机构
[1] Center for Photonic Communication and Computing, Department of Electrical Engineering and Computer Science, Northwestern University, Evanston, IL 60208, United States
来源
Quantum Information and Computation | 2006年 / 6卷 / 07期
关键词
26;
D O I
10.26421/qic6.7-1
中图分类号
学科分类号
摘要
引用
收藏
页码:561 / 582
相关论文
共 50 条
  • [41] Algebra model and security analysis for cryptographic protocols
    Jinpeng Huai
    Xianxian Li
    Science in China Series F: Information Sciences, 2004, 47 : 199 - 220
  • [42] Security Evaluation Over Lightweight Cryptographic Protocols
    Ghoreishi, Seyed-Mohsen
    Razak, Shukor Abd
    Isnin, Ismail Fauzi
    Chizari, Hassan
    2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), 2014, : 171 - 175
  • [43] A NEW METHOD FOR ANALYZING THE SECURITY OF CRYPTOGRAPHIC PROTOCOLS
    TOUSSAINT, MJ
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1993, 11 (05) : 702 - 714
  • [44] Quantum-based refinement
    Waller, Mark
    ABSTRACTS OF PAPERS OF THE AMERICAN CHEMICAL SOCIETY, 2017, 254
  • [45] A New Security Proof of Practical Cryptographic Devices Based on Hardware, Software and Protocols
    Wang, An
    Li, Zheng
    Yang, Xianwen
    Yu, Yanyan
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, 2011, 6672 : 386 - 400
  • [46] Research, Development and Simulation of Quantum Cryptographic Protocols
    Anghel, C.
    ELEKTRONIKA IR ELEKTROTECHNIKA, 2013, 19 (04) : 65 - 70
  • [47] Detecting collusion attacks in security protocols
    Chen, QF
    Chen, YPP
    Zhang, SC
    Zhang, CQ
    FRONTIERS OF WWW RESEARCH AND DEVELOPMENT - APWEB 2006, PROCEEDINGS, 2006, 3841 : 297 - 306
  • [48] Desynchronization attacks on RFID security protocols
    Deng, M. (dmlei2003@163.com), 1600, Universitas Ahmad Dahlan (11):
  • [49] Tree Automata for Detecting Attacks on Protocols with Algebraic Cryptographic Primitives
    Boichut, Yohan
    Heam, Pierre-Cyrille
    Kouchnarenko, Olga
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2009, 239 : 57 - 72
  • [50] Analyzing cryptographic protocols to strengthen HR information security
    Priya, R.
    Selvakumari, R.
    Chandrakala, K. R.
    Krithika, S.
    Rai, Hemangine
    Muthukrishnan, K. Binith
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (08): : 2495 - 2509