Academic literature on the topic 'Quantum security definitions'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Quantum security definitions.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Quantum security definitions"
Arapinis, Myrto, Nikolaos Lamprou, Elham Kashefi, and Anna Pappa. "Definitions and Security of Quantum Electronic Voting." ACM Transactions on Quantum Computing 2, no. 1 (April 2021): 1–33. http://dx.doi.org/10.1145/3450144.
Full textArrazola, Juan Miguel, Petros Wallden, and Erika Andersson. "Multiparty quantum signature schemes." Quantum Information and Computation 16, no. 5&6 (April 2016): 435–64. http://dx.doi.org/10.26421/qic16.5-6-3.
Full textRENNER, RENATO. "SECURITY OF QUANTUM KEY DISTRIBUTION." International Journal of Quantum Information 06, no. 01 (February 2008): 1–127. http://dx.doi.org/10.1142/s0219749908003256.
Full textSchanck, John M., William Whyte, and Zhenfei Zhang. "Circuit-extension handshakes for Tor achieving forward secrecy in a quantum world." Proceedings on Privacy Enhancing Technologies 2016, no. 4 (October 1, 2016): 219–36. http://dx.doi.org/10.1515/popets-2016-0037.
Full textAlagic, Gorjan, Tommaso Gagliardoni, and Christian Majenz. "Can you sign a quantum state?" Quantum 5 (December 16, 2021): 603. http://dx.doi.org/10.22331/q-2021-12-16-603.
Full textKent, Adrian. "S-money: virtual tokens for a relativistic economy." Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences 475, no. 2225 (May 2019): 20190170. http://dx.doi.org/10.1098/rspa.2019.0170.
Full textXin, Xiangjun, Qinglan Yang, and Fagen Li. "Quantum proxy signature with provable security." Modern Physics Letters A 35, no. 24 (June 23, 2020): 2050197. http://dx.doi.org/10.1142/s0217732320501977.
Full textChen, F. L., and Z. F. Han. "Quantum group signature scheme based on controlled quantum teleportation." International Journal of Quantum Information 14, no. 08 (December 2016): 1650041. http://dx.doi.org/10.1142/s0219749916500416.
Full textPachankis, Y. "Theory on Extremal Nucleon Heuristics to Psychiatry." European Psychiatry 66, S1 (March 2023): S282. http://dx.doi.org/10.1192/j.eurpsy.2023.637.
Full textZhang, Hongliang, Dongxiao Quan, Changhua Zhu, and Zhigang Li. "A Quantum Cryptography Communication Network Based on Software Defined Network." ITM Web of Conferences 17 (2018): 01008. http://dx.doi.org/10.1051/itmconf/20181701008.
Full textDissertations / Theses on the topic "Quantum security definitions"
Van, de Graaf Jeroen. "Towards a formal definition of security for quantum protocols." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1998. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp03/NQ35648.pdf.
Full textPuria, Shravan Kumar Parshuram. "Signcryption in a Quantum World." Thesis, 2019. https://etd.iisc.ac.in/handle/2005/5063.
Full textBook chapters on the topic "Quantum security definitions"
Haque, Abida, and Alessandra Scafuro. "Threshold Ring Signatures: New Definitions and Post-quantum Security." In Lecture Notes in Computer Science, 423–52. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-45388-6_15.
Full text