???????? ??????????? ??????????? ?????????????? ?????????????? ??????: ???? ? ??????
???????????? ???????? ???????????????? ????? ???????? ?????????? ????????. ?????? ?????????? ???????????? ????????? Quantum GIS. ????????????? ?????????????? ???????? ???????????????? ?????????????? ?????????????? ?????? ? ?? ????????????? ????????.
Подобные документы
The principle of quantum cryptography. Quantum no-cloning theorem. State detection and random number generator. Verify assumptions used in a security proof. Quantum hacking and countermeasures from this. Introduction of cryptography for engineers.
?????, добавлен 08.03.2014Classical and quantum physics and information theory. Von Neumann entropy and relevant measures. Accessible classical and quantum information. Data processing. Real-life applications of information theory. A commercial quantum cryptographic device.
?????, добавлен 15.09.2012Classical cryptography and quantum computation, as well as the signature scheme to the security of Merkle. Challenges in quantum cryptography and the authentication path computation. Basic designs and variations of multivariate public-key cryptography.
????????? ???????????, добавлен 08.03.2014Mathematical model of transformation of stochastic and fuzzy information in quantum information in the form of multiplication of unitary operators from not commutative von Neumann group. Theoretical basis of information technologies of quantum-logic.
??????, добавлен 29.01.2016Cryptanalysis of countermeasures proposed for repairing. Security analysis of the gennaro-halevi-rabin signature scheme. Authenticated key exchange secure against dictionary attacks. The modern security aspects of practical quantum cryptography.
???? ??????, добавлен 08.03.2014The recent application of the principles of quantum mechanics to cryptography. Now possible to construct cryptographic communication systems which detect unauthorized eavesdropping should it occur, and which give a guarantee of no eavesdropping.
??????? ???????, добавлен 15.09.2012Error correction and the cascade protocol. Individual attacks in an realistic environment. Dynamic initial block-size. Statistical analysis of QKD networks in real-life environment. Quantum-cryptographic networks from a prototype to the citizen.
?????, добавлен 08.03.2014Crypto applications of combinatorial group theory. Generating rooted trees of nodes uniformly at random. Designs, strongly regular graphs and codes constructed from some primitive groups. Quantum jump codes and some related combinatorial designs.
??????? ???????, добавлен 08.03.2014Faster explicit formulas for computing pairings over ordinary curves. Secure authentication from a weak key, without leaking information. Towards a game theoretic view of secure computation. Concurrent composition in the bounded quantum storage model.
?????, добавлен 08.03.2014?????????? ??????? ????????? ??????????? ?????? ?????????????????? ????????? "quantum computing". ?????????????????? ??????? ????????? ?????? ???????????? ??????? ?????????? ???????? "Travelling Is Simple". ?????? ?? ?????? ?? ??????????? ???????.
???????? ??????, добавлен 24.03.2016A new general mathematical problem, suitable for public-key cryptosystems, is proposed: morphism computation in a category of Abelian groups. The problem seems to be hard for solving with a quantum computer. A demonstrative example of encryption.
??????, добавлен 15.09.2012Steganographic communication with quantum information. Software integrity checking expressions for robust tamper detection. Exposing digital forgeries through specular highlights on the eye. Imaging sensor noise as digital X-ray for revealing forgeries.
???? ??????, добавлен 08.03.2014