Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Lecture
Quantum Key Distribution: Security and Applications
Graph Chatbot
Related lectures (32)
Quantum Key Distribution: Security and Implementation
Explores Device Independent Quantum Key Distribution (DIQKD) principles, security proofs, and experimental demonstrations against quantum computer threats.
Quantum and Nanocomputing
Explores quantum computing fundamentals, quantum Fourier transform, RSA encryption, Shor's algorithm, and experimental implementations.
Quantum Random Number Generation
Explores quantum random number generation, discussing the challenges and implementations of generating good randomness using quantum devices.
Quantum Key Distribution
Covers the BB84 Quantum Key Distribution protocol for secure key establishment.
Quantum Cryptography: Building Security in a Quantum World
Explores quantum computing's impact on cryptography, focusing on vulnerabilities, proof systems, and future research directions.
Asymmetric Cryptography: RSA, Elliptic Curves, Lattices
Explores RSA, elliptic curves, and lattice-based cryptography for secure communication.
Public-Key Cryptography: Post-Quantum and Access Control
Explores public-key cryptography, post-quantum systems, and access control mechanisms in depth.
Quantum Entanglement: From Einstein to Bell
Delves into the journey from Einstein and Bell's debates to the practical applications of quantum entanglement, including quantum teleportation and key distribution.
Public-Key Cryptography: Key Exchange and Signatures
Explores public-key cryptography, key exchange, and digital signatures, discussing practical applications and security mechanisms.
Quantum Cryptography: Key Generation Protocol
Explores quantum cryptography, emphasizing key generation using the one-time pad protocol and the role of Eve in intercepting communication.
Cryptography basics: Quantum Systems
Covers the basics of cryptography, encryption, decryption, error detection, and the impact of quantum computing.
Quantum Computing: Introduction
Covers quantum computing basics, quantum algorithms, error correction, and quantum bit manipulation.
Quantum Computational Advantage: Recent Progress and Next Steps
Explores recent progress in quantum computational advantage and discusses the challenges in achieving quantum supremacy.
Cryptography Basics
Covers authentication, authorization, encryption techniques, vulnerabilities, and the impact of quantum computing on cryptography.
Quantum Cryptography: Optical Qubits and Teleportation
Explores quantum cryptography, focusing on optical qubits, entanglement, and teleportation principles.
Quantum Key Distribution
Covers Quantum Key Distribution protocols for generating a common secret using quantum channels and one-time pads.
Quantum Information: Security Testing
Covers security testing in quantum communication, emphasizing the importance of rigorous verification and testing protocols.
Quantum Communication
Covers the fundamentals of quantum communication protocols and their applications.
Quantum Entanglement: Bell Test Protocols and Results
Covers the implementation of a Bell test protocol using superconducting qubits to demonstrate quantum entanglement over a distance of 30 meters.
Quantum Metrology: Fundamentals and Applications
Explores quantum metrology fundamentals, applications, and technologies like quantum ghost imaging, computing, and key distribution.
Previous
Page 1 of 2
Next