Security Bounds for Quantum Cryptography with Finite Resources.
Valerio ScaraniRenato RennerPublished in: TQC (2008)
Keyphrases
- information security
- cellular automata
- upper bound
- encryption algorithms
- security issues
- intrusion detection
- cryptographic algorithms
- resource allocation
- lower bound
- security requirements
- elliptic curve cryptography
- key management
- computing resources
- quantum computation
- network security
- high security
- security systems
- security mechanisms
- security policies
- statistical databases
- limited resources
- resource management
- security protocols
- user authentication
- quantum mechanics
- image encryption
- computing infrastructure
- quantum computing
- error bounds
- smart card