Information about Test

  1. Quantum cryptography

    Quantum cryptography is the science of exploiting quantum mechanical properties to perform cryptographic tasks. The best known example of quantum cryptography

  2. Post-quantum cryptography

    Post-quantum cryptography (sometimes referred to as quantum-proof, quantum-safe or quantum-resistant) refers to cryptographic algorithms (usually public-key

  3. Quantum computing

    Post-quantum cryptography Quantum annealing Quantum bus Quantum cognition Quantum cryptography Quantum logic gate Quantum machine learning Quantum threshold

  4. Quantum key distribution

    Quantum key distribution (QKD) is a secure communication method which implements a cryptographic protocol involving components of quantum mechanics. It

  5. Elliptic-curve cryptography

    Elliptic-curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. ECC

  6. Public-key cryptography

    Public-key cryptography, or asymmetric cryptography, is a cryptographic system that uses pairs of keys: public keys, which may be disseminated widely,

  7. Post-Quantum Cryptography Standardization

    Post-Quantum Cryptography Standardization is a project by NIST to standardize post-quantum cryptography. 23 signature schemes were submitted, 59 encryption/KEM

  8. Relativistic quantum cryptography

    Relativistic quantum cryptography is a sub-field of quantum cryptography, in which in addition to exploiting the principles of quantum physics, the no-superluminal

  9. The Code Book

    The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography is a book by Simon Singh, published in New York in 1999 by Doubleday.

  10. Device-independent quantum cryptography

    A quantum cryptographic protocol is device-independent if its security does not rely on trusting that the quantum devices used are truthful. Thus the