Sign in

Study on the security of the authentication scheme with key recycling in QKD.

Qiong LiQiang ZhaoDan LeXiamu Niu
Published in: Quantum Inf. Process. (2016)
Keyphrases
  • authentication scheme
  • high security
  • image encryption
  • information systems
  • security policies
  • security analysis
  • security flaws
  • access control
  • elliptic curve cryptography