Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Quantum Cryptography and Secret-Key Distillation

Buy
This book aims at giving an introduction to the principles and techniques of quantum cryptography, including secret-key distillation, as well as some more advanced topics. As quantum cryptography is now becoming a practical reality with products available commercially, it is important to focus not only on the theory of quantum cryptography but also on practical issues. For instance, what kind of security does quantum cryptography offer? How can the raw key produced by quantum cryptography be efficiently processed to obtain a usable secret key? What can safely be done with this key? Many challenges remain before these questions can be answered in their full generality. Yet quantum cryptography is mature enough to make these questions relevant and worth discussing.

The content of this book is based on my Ph.D. thesis [174], which initially focused on continuous-variable quantum cryptography protocols. When I decided to write this book, it was essential to include discrete-variable protocols so as to make its coverage more balanced. In all cases, the continuous and discrete-variable protocols share many aspects in common, which makes it interesting to discuss about them both in the same manuscript.

Quantum cryptography is a multi-disciplinary subject and, in this respect, it may interest readers with different backgrounds. Cryptography, quantum physics and information theory are all necessary ingredients to make quantum cryptography work. The introductory material in each of these fields should make the book self-contained. If necessary, references are given for further readings.

Quantum cryptography (or quantum key distribution) is a state-of-the-art technique that exploits properties of quantum mechanics to guarantee the secure exchange of secret keys. This 2006 text introduces the principles and techniques of quantum cryptography, setting it in the wider context of cryptography and security, with specific focus on secret-key distillation. The book starts with an overview chapter, progressing to classical cryptography, information theory (classical and quantum), and applications of quantum cryptography. The discussion moves to secret-key distillation, privacy amplification and reconciliation techniques, concluding with the security principles of quantum cryptography. The author explains the physical implementation and security of these systems, enabling engineers to gauge the suitability of quantum cryptography for securing transmission in their particular application. With its blend of fundamental theory, implementation techniques, and details of recent protocols, this book will be of interest to graduate students, researchers, and practitioners in electrical engineering, physics, and computer science.

(HTML tags aren't allowed.)

Death Scene Investigation: A Field Guide
Death Scene Investigation: A Field Guide
Each and every death scene presents new challenges to even the most seasoned professional. This handy field guide provides easy direction for the death scene investigator. Organized in an accessible outline format, it covers protocols and guidelines, assessment and examination, medical history and records, and autopsy and death certificates....
Expert One-on-One Visual Basic .NET Business Objects
Expert One-on-One Visual Basic .NET Business Objects

Whether you've already made the move to Visual Basic .NET, or you want to know what's in it for you when you do, Expert One-on-One Visual Basic .NET Business Objects will show you the kinds of opportunities that .NET makes available. It will allow you to make clear, informed decisions about the right way to develop your projects,...

Raising Capital: Get The Money You Need To Grow Your Business
Raising Capital: Get The Money You Need To Grow Your Business
Whether your business is just a gleam in your eye, a newly launched operation, or a full-fledged firm that's humming right along, you'll never experience real growth without a substantial infusion of cash. Long gone are the days when venture capital groups seemed to pour millions into every "next big thing." Now it's clear that there is...

Practical Bot Development: Designing and Building Bots with Node.js and Microsoft Bot Framework
Practical Bot Development: Designing and Building Bots with Node.js and Microsoft Bot Framework
Explore the concept of bots and discover the motivation behind working with these new apps with messaging platforms. This book is an accessible resource teaching the basic concepts behind bot design and implementation. Each chapter builds on previous topics and, where appropriate, real working code is shown that implements the concepts. By...
An Introduction to Linear Programming and Game Theory
An Introduction to Linear Programming and Game Theory

Praise for the Second Edition:

"This is quite a well-done book: very tightly organized, better-than-average exposition, and numerous examples, illustrations, and applications."
—Mathematical Reviews of the American Mathematical Society

An Introduction to Linear Programming and...

Beginning Apache Pig: Big Data Processing Made Easy
Beginning Apache Pig: Big Data Processing Made Easy
Learn to use Apache Pig to develop lightweight big data applications easily and quickly. This book shows you many optimization techniques and covers every context where Pig is used in big data analytics. Beginning Apache Pig shows you how Pig is easy to learn and requires relatively little time to develop big data...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy