Quantum cryptography
| Main Author: | Messikh, Azeddin |
|---|---|
| Format: | Book Chapter |
| Language: | English |
| Published: |
IIUM Press
2011
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/20673/ http://irep.iium.edu.my/20673/1/Chpter_23.pdf |
Similar Items
Method for use in quantum cryptography
by: Sellami , Ali, et al.
Published: (2010)
by: Sellami , Ali, et al.
Published: (2010)
Cryptography as a Service (CaaS): Quantum cryptography for secure cloud computing
by: Olanrewaju, Rashidah Funke, et al.
Published: (2017)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2017)
Theory of quantum cryptography
by: Ali, Sellami, et al.
Published: (2011)
by: Ali, Sellami, et al.
Published: (2011)
Quantum Cryptography Experiment using Optical Devices
by: Azahari, Nur Shahirah, et al.
Published: (2023)
by: Azahari, Nur Shahirah, et al.
Published: (2023)
Quantum Cryptography Experiment using Optical Devices
by: Azahar, Nur Shahirah, et al.
Published: (2023)
by: Azahar, Nur Shahirah, et al.
Published: (2023)
Quantum Cryptography Experiment using Optical Devices
by: Azahari, Nur Shahirah, et al.
Published: (2023)
by: Azahari, Nur Shahirah, et al.
Published: (2023)
Quantum Cryptography Experiment using Opticalb Devices
by: Azahari, Nur Shahirah, et al.
Published: (2023)
by: Azahari, Nur Shahirah, et al.
Published: (2023)
Quantum Cryptography Experiment using Optical Devices
by: Azahari, Nur Shahirah, et al.
Published: (2023)
by: Azahari, Nur Shahirah, et al.
Published: (2023)
Quantum-Elliptic curve Cryptography for Multihop Communication in 5G Networks
by: Khan, A.S., et al.
Published: (2017)
by: Khan, A.S., et al.
Published: (2017)
Quantum Chaotic Cryptography : A New Approach
by: Akhshani, Afshin
Published: (2015)
by: Akhshani, Afshin
Published: (2015)
Quantum Cryptography Experiment using Optical Devices
by: Azahari, Nur Shahirah, et al.
Published: (2023)
by: Azahari, Nur Shahirah, et al.
Published: (2023)
Communications cryptography
by: Khalifa, Othman Omran, et al.
Published: (2004)
by: Khalifa, Othman Omran, et al.
Published: (2004)
QuCCs: an experimental of quantum key distribution using quantum cryptography and communication simulator
by: Ahmad Zukarnain, Zuriati, et al.
Published: (2019)
by: Ahmad Zukarnain, Zuriati, et al.
Published: (2019)
Finite key size analysis of two-way quantum cryptography
by: Shamsul Shaari, Jesni, et al.
Published: (2015)
by: Shamsul Shaari, Jesni, et al.
Published: (2015)
Multipartite Gaussian steering: monogamy constraints and quantum cryptography applications
by: Xiang, Yu, et al.
Published: (2017)
by: Xiang, Yu, et al.
Published: (2017)
Machine based cryptography
by: Makarin, Rusydi Hasan, et al.
Published: (2011)
by: Makarin, Rusydi Hasan, et al.
Published: (2011)
Cryptography: past, present and future
Published: (2011)
Published: (2011)
Coding, cryptography, information security and OFDM
Published: (2011)
Published: (2011)
Chaos Based Cryptography An Alternative to Algebraic Cryptography
by: Kamel Ariffin, Muhammad Rezal
Published: (2008)
by: Kamel Ariffin, Muhammad Rezal
Published: (2008)
Secured single stage multiphoton approach for quantum cryptography protocol in free space optic
by: Harun, Nur Ziadah
Published: (2019)
by: Harun, Nur Ziadah
Published: (2019)
Effect of dephasing on single-qubit rotation gates
by: Issoufa, Youssouf Hamidou, et al.
Published: (2010)
by: Issoufa, Youssouf Hamidou, et al.
Published: (2010)
Trigonometric functions and Linear Transformations
by: Messikh, Azeddin
Published: (2011)
by: Messikh, Azeddin
Published: (2011)
Detecting eve in communication with continuous-variable Einstein-Podolsky-Rosen correlations
by: Messikh, Azeddin
Published: (2007)
by: Messikh, Azeddin
Published: (2007)
Implementation of hashed cryptography algorithm based on cryptography message syntax
by: Ali, Mohammed Ahnaf
Published: (2019)
by: Ali, Mohammed Ahnaf
Published: (2019)
Basics of security and cryptography
by: Pathan, Al-Sakib Khan
Published: (2014)
by: Pathan, Al-Sakib Khan
Published: (2014)
Implementing cryptography in database
by: Kwan, Shong Hann
Published: (2010)
by: Kwan, Shong Hann
Published: (2010)
Preliminaries
by: Azram, Mohammad, et al.
Published: (2011)
by: Azram, Mohammad, et al.
Published: (2011)
Large Integer Arithmetic in GPU for Cryptography
by: Lee, Wen Dick
Published: (2017)
by: Lee, Wen Dick
Published: (2017)
Use of Cryptography in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2013)
by: Jaber, Aws Naser, et al.
Published: (2013)
Extention and cryptanalysis of golden cryptography
by: Sharabyan, Mohammad Tahghighi
Published: (2015)
by: Sharabyan, Mohammad Tahghighi
Published: (2015)
Number theoretical foundations in cryptography
by: Mohd Atan, Kamel Ariffin
Published: (2016)
by: Mohd Atan, Kamel Ariffin
Published: (2016)
Study of localized solutions of the nonlinear discrete model for dipolar BEC in an optical lattice by the homoclinic orbit method
by: Messikh, Azeddin, et al.
Published: (2013)
by: Messikh, Azeddin, et al.
Published: (2013)
Study of localized solutions of the nonlinear discrete model for dipolar Bose-Einstein condensate in an optical lattice by the homoclinic orbit method
by: Messikh, Azeddin, et al.
Published: (2012)
by: Messikh, Azeddin, et al.
Published: (2012)
Superadiabatic STIRAP: population transfer and quantum rotation gates
by: Youssouf, Hamidou Issoufa, et al.
Published: (2016)
by: Youssouf, Hamidou Issoufa, et al.
Published: (2016)
Physics and applications: Quantum optics
by: Messikh, Az Eddine, et al.
Published: (2012)
by: Messikh, Az Eddine, et al.
Published: (2012)
An e-voting application using cryptography technology
by: Chin, Hsin Tien
Published: (2020)
by: Chin, Hsin Tien
Published: (2020)
Public key cryptography in resource-constrained WSN
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
A review on multimedia communications cryptography
by: Salem, Yasser, et al.
Published: (2011)
by: Salem, Yasser, et al.
Published: (2011)
Topics in coding, cryptography and information security
Published: (2011)
Published: (2011)
A survey on elliptic curve cryptography
by: Mohamed, Mohamad Afendee
Published: (2014)
by: Mohamed, Mohamad Afendee
Published: (2014)
Similar Items
-
Method for use in quantum cryptography
by: Sellami , Ali, et al.
Published: (2010) -
Cryptography as a Service (CaaS): Quantum cryptography for secure cloud computing
by: Olanrewaju, Rashidah Funke, et al.
Published: (2017) -
Theory of quantum cryptography
by: Ali, Sellami, et al.
Published: (2011) -
Quantum Cryptography Experiment using Optical Devices
by: Azahari, Nur Shahirah, et al.
Published: (2023) -
Quantum Cryptography Experiment using Optical Devices
by: Azahar, Nur Shahirah, et al.
Published: (2023)