Quantum Cryptography and Authentication

dc.contributor.advisorKovács, Zita
dc.contributor.authorEl Sharnouby, Yassine Mohamed Ahmed
dc.contributor.departmentDE--Informatikai Karhu_HU
dc.date.accessioned2020-05-12T12:46:16Z
dc.date.available2020-05-12T12:46:16Z
dc.date.created2020
dc.description.abstractThis paper discusses quantum theories, protocols that are currently being readied for practical use and unproven concepts that might breakthrough at some point in the future. It will discuss Quantum Key Distribution and several of its protocols and applications, authentication methods and protocols, and unconditional security. Moreover, it takes and in-depth look at key recycling, quantum digital signatures (QDS), quantum fingerprinting – which is basically the quantum equivalent of a hashing process, and finally, entity authentication and whether it is achievable via entanglement.hu_HU
dc.description.courseComputer Science MSc.hu_HU
dc.description.degreeegységes, osztatlanhu_HU
dc.format.extent39hu_HU
dc.identifier.urihttp://hdl.handle.net/2437/286946
dc.language.isoenhu_HU
dc.subjectInformation Securityhu_HU
dc.subjectCryptographyhu_HU
dc.subjectAuthenticationhu_HU
dc.subjectSecurityhu_HU
dc.subjectQuantumhu_HU
dc.subject.dspaceDEENK Témalista::Informatikahu_HU
dc.titleQuantum Cryptography and Authenticationhu_HU
Fájlok
Gyűjtemények