Skip to main content
Graph
Search
fr
|
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Lecture
Quantum Key Distribution: Security and Applications
Graph Chatbot
Related lectures (32)
Previous
Page 1 of 4
Next
Quantum Key Distribution: Security and Implementation
Explores Device Independent Quantum Key Distribution (DIQKD) principles, security proofs, and experimental demonstrations against quantum computer threats.
Quantum and Nanocomputing
Explores quantum computing fundamentals, quantum Fourier transform, RSA encryption, Shor's algorithm, and experimental implementations.
Quantum Random Number Generation
Explores quantum random number generation, discussing the challenges and implementations of generating good randomness using quantum devices.
Quantum Key Distribution
Covers the BB84 Quantum Key Distribution protocol for secure key establishment.
Quantum Cryptography: Building Security in a Quantum World
Explores quantum computing's impact on cryptography, focusing on vulnerabilities, proof systems, and future research directions.
Asymmetric Cryptography: RSA, Elliptic Curves, Lattices
Explores RSA, elliptic curves, and lattice-based cryptography for secure communication.
Public-Key Cryptography: Post-Quantum and Access Control
Explores public-key cryptography, post-quantum systems, and access control mechanisms in depth.
Quantum Entanglement: From Einstein to Bell
Delves into the journey from Einstein and Bell's debates to the practical applications of quantum entanglement, including quantum teleportation and key distribution.
Public-Key Cryptography: Key Exchange and Signatures
Explores public-key cryptography, key exchange, and digital signatures, discussing practical applications and security mechanisms.
Quantum Cryptography: Key Generation Protocol
Explores quantum cryptography, emphasizing key generation using the one-time pad protocol and the role of Eve in intercepting communication.