Quantum Cryptography and Authentication
| dc.contributor.advisor | Kovács, Zita | |
| dc.contributor.author | El Sharnouby, Yassine Mohamed Ahmed | |
| dc.contributor.department | DE--Informatikai Kar | hu_HU |
| dc.date.accessioned | 2020-05-12T12:46:16Z | |
| dc.date.available | 2020-05-12T12:46:16Z | |
| dc.date.created | 2020 | |
| dc.description.abstract | This paper discusses quantum theories, protocols that are currently being readied for practical use and unproven concepts that might breakthrough at some point in the future. It will discuss Quantum Key Distribution and several of its protocols and applications, authentication methods and protocols, and unconditional security. Moreover, it takes and in-depth look at key recycling, quantum digital signatures (QDS), quantum fingerprinting – which is basically the quantum equivalent of a hashing process, and finally, entity authentication and whether it is achievable via entanglement. | hu_HU |
| dc.description.course | Computer Science MSc. | hu_HU |
| dc.description.degree | egységes, osztatlan | hu_HU |
| dc.format.extent | 39 | hu_HU |
| dc.identifier.uri | http://hdl.handle.net/2437/286946 | |
| dc.language.iso | en | hu_HU |
| dc.subject | Information Security | hu_HU |
| dc.subject | Cryptography | hu_HU |
| dc.subject | Authentication | hu_HU |
| dc.subject | Security | hu_HU |
| dc.subject | Quantum | hu_HU |
| dc.subject.dspace | DEENK Témalista::Informatika | hu_HU |
| dc.title | Quantum Cryptography and Authentication | hu_HU |