Login / Signup
Study on the security of the authentication scheme with key recycling in QKD.
Qiong Li
Qiang Zhao
Dan Le
Xiamu Niu
Published in:
Quantum Inf. Process. (2016)
Keyphrases
</>
authentication scheme
high security
image encryption
information systems
security policies
security analysis
security flaws
access control
elliptic curve cryptography