Cryptography Reference
In-Depth Information
References
1. Bennett, C.H., Shor, P.W.: Privacy in a quantum world. Science 284(5415), 747-
748 (1999)
2. Paterson, K.G., Piper, F., Schack, R.: Quantum cryptography: a practical informa-
tion security perspective. In: Zukowski, M., Kilin, S., Kowalik, J. (eds.) Quantum
Communication and Security (2007)
3. Alleaume, R., Bouda, J., Branciard, C., Debuisschert, T., Dianati, M., Gisin, N.,
Godfrey, M., Grangier, P., Langer, T., Leverrier, A., Lutkenhaus, N., Painchault,
P., Peev, M., Poppe, A., Pornin, T., Rarity, J., Renner, R., Ribordy, G., Riguidel,
M., Salvail, L., Shields, A., Weinfurter, H., Zeilinger, A.: Secoqc white paper on
quantum key distribution and cryptography, arXiv:quant-ph/0701168 (2007)
4. Stebila, D., Mosca, M., Lutkenhaus, N.: The case for quantum key distribution.
In: Zukowski, M., Kilin, S., Kowalik, J. (eds.) Proceedings of QuantumComm 2009
Workshop on Quantum and Classical Information Security, vol. 36 (2009)
5. Bernstein, D.: Cost-benefit analysis of quantum cryptography. In: Workshop on
Classical and Quantum Information Assurance Foundations and Practice, Schloss
Dagstuhl (July 2009),
http://www.dagstuhl.de/Materials/index.en.phtml?09311
6. Lutkenhaus, N., Shields, A.J.: Focus on quantum cryptography: Theory and prac-
tice. New Journal of Physics 11(4), 045005
7. Goldreich, O.: Foundations of cryptography (Volume I): Basic tools. Cambridge
University Press, Cambridge (2001)
8. Goldreich, O.: Foundations of cryptography (Volume II): Basic applications. Cam-
bridge University Press, Cambridge (2004)
9. Bellare, M., Rogaway, P.: Entity Authentication and Key Distribution. In: Stinson,
D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 232-249. Springer, Heidelberg
(1994)
10. Canetti, R., Krawczyk, H.: Analysis of key-exchange protocols and their use for
building secure channels. Cryptology ePrint Archive, Report 2001/040 (2001),
http://eprint.iacr.org/2001/040
11. Menezes, A.J., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography.
CRC Press LLC, Boca Raton (1996)
12. Bennett, C.H., Brassard, G.: Quantum cryptography: Public key distribution and
coin tossing. In: Proceedings of IEEE International Conference on Computers,
Systems and Signal Processing, pp. 175-179. IEEE Press, New York (1984)
13. Ekert, A.K.: Quantum cryptography based on Bell's theorem. Phys. Rev.
Lett. 67(6), 661-663 (1991)
14. Muller-Quade, J., Renner, R.: Composability in quantum cryptography. New Jour-
nal of Physics 11(8), 085006
15. Canetti, R.: Universally composable security: A new paradigm for cryptographic
protocols. Cryptology ePrint Archive, Report 2000/067 (2000),
http://eprint.iacr.org/
16. Nielsen, M., Chuang, I.: Quantum Computation and Quantum Information. Cam-
bridge University Press, Cambridge (2000)
17. Stinson, D.R.: Cryptography: Theory and Practice. CRC Press LLC, Boca Raton
(1995)
18. LaMacchia, B.A., Lauter, K., Mityagin, A.: Stronger security of authenticated key
exchange. In: Susilo, W., Liu, J.K., Mu, Y. (eds.) ProvSec 2007. LNCS, vol. 4784,
pp. 1-16. Springer, Heidelberg (2007)
 
Search WWH ::




Custom Search