Login / Signup
Leftover hashing from quantum error correction: Unifying the two approaches to the security proof of quantum key distribution.
Toyohiro Tsurumaru
Published in:
CoRR (2018)
Keyphrases
</>
error correction
key distribution
key management
key exchange
private key
error detection
data hiding
access control
security protocols
ad hoc networks
authentication protocol
fault tolerant
information security
group communication
diffie hellman
query processing
key management scheme