Cryptography Apocalypse最新文献

筛选
英文 中文
Appendix 附录
Cryptography Apocalypse Pub Date : 2019-10-16 DOI: 10.1002/9781119618232.app1
{"title":"Appendix","authors":"","doi":"10.1002/9781119618232.app1","DOIUrl":"https://doi.org/10.1002/9781119618232.app1","url":null,"abstract":"","PeriodicalId":142899,"journal":{"name":"Cryptography Apocalypse","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116146925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How Can Quantum Computing Break Today's Cryptography? 量子计算如何打破当今的密码学?
Cryptography Apocalypse Pub Date : 2019-10-16 DOI: 10.1002/9781119618232.ch3
{"title":"How Can Quantum Computing Break Today's Cryptography?","authors":"","doi":"10.1002/9781119618232.ch3","DOIUrl":"https://doi.org/10.1002/9781119618232.ch3","url":null,"abstract":"","PeriodicalId":142899,"journal":{"name":"Cryptography Apocalypse","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116780482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
What Will a Post‐Quantum World Look Like? 后量子世界会是什么样子?
Cryptography Apocalypse Pub Date : 2019-10-16 DOI: 10.1002/9781119618232.ch5
{"title":"What Will a Post‐Quantum World Look Like?","authors":"","doi":"10.1002/9781119618232.ch5","DOIUrl":"https://doi.org/10.1002/9781119618232.ch5","url":null,"abstract":"","PeriodicalId":142899,"journal":{"name":"Cryptography Apocalypse","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115408825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
When Will the Quantum Crypto Break Happen? 量子密码何时会被破解?
Cryptography Apocalypse Pub Date : 2019-10-16 DOI: 10.1002/9781119618232.ch4
{"title":"When Will the Quantum Crypto Break Happen?","authors":"","doi":"10.1002/9781119618232.ch4","DOIUrl":"https://doi.org/10.1002/9781119618232.ch4","url":null,"abstract":"","PeriodicalId":142899,"journal":{"name":"Cryptography Apocalypse","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125701784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Preparing Now 现在准备
Cryptography Apocalypse Pub Date : 2019-10-16 DOI: 10.1002/9781119618232.ch9
{"title":"Preparing Now","authors":"","doi":"10.1002/9781119618232.ch9","DOIUrl":"https://doi.org/10.1002/9781119618232.ch9","url":null,"abstract":"","PeriodicalId":142899,"journal":{"name":"Cryptography Apocalypse","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125888721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Index 指数
Cryptography Apocalypse Pub Date : 2019-10-16 DOI: 10.1002/9781119618232.index
{"title":"Index","authors":"","doi":"10.1002/9781119618232.index","DOIUrl":"https://doi.org/10.1002/9781119618232.index","url":null,"abstract":"","PeriodicalId":142899,"journal":{"name":"Cryptography Apocalypse","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124250424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quantum Cryptography 量子密码
Cryptography Apocalypse Pub Date : 2017-01-02 DOI: 10.1002/9781119618232.ch7
M. Hamrick, Y. Weinstein, G. Gilbert
{"title":"Quantum Cryptography","authors":"M. Hamrick, Y. Weinstein, G. Gilbert","doi":"10.1002/9781119618232.ch7","DOIUrl":"https://doi.org/10.1002/9781119618232.ch7","url":null,"abstract":"","PeriodicalId":142899,"journal":{"name":"Cryptography Apocalypse","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115770322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quantum Networking 量子网络
Cryptography Apocalypse Pub Date : 2014-05-09 DOI: 10.1002/9781119618232.ch8
R. V. Meter
{"title":"Quantum Networking","authors":"R. V. Meter","doi":"10.1002/9781119618232.ch8","DOIUrl":"https://doi.org/10.1002/9781119618232.ch8","url":null,"abstract":"Quantum networks build on entanglement and quantum measurement to achieve tasks that are beyond the reach of classical systems. Using quantum effects, we can detect the presence of eavesdroppers, raise the sensitivity of scientific instruments such as telescopes, or teleport quantum data from one location to another. Long-distance entanglement can be used to execute important tasks such as Byzantine agreement and leader election in fewer rounds of communication than classical systems, improving the efficiency of operations that are critical in distributed systems.","PeriodicalId":142899,"journal":{"name":"Cryptography Apocalypse","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114226691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 164
Introduction to Quantum Computers 量子计算机概论
Cryptography Apocalypse Pub Date : 1998-11-03 DOI: 10.1002/9781119618232.ch2
Christof Zalka
{"title":"Introduction to Quantum Computers","authors":"Christof Zalka","doi":"10.1002/9781119618232.ch2","DOIUrl":"https://doi.org/10.1002/9781119618232.ch2","url":null,"abstract":"This is a short introduction to quantum computers, quantum algorithms and quantum error correcting codes. Familiarity with the principles of quantum theory is assumed. Emphasis is put on a concise presentation of the principles avoiding lengthy discussions.","PeriodicalId":142899,"journal":{"name":"Cryptography Apocalypse","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1998-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123475045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信