Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Quantum Cryptography and Secret-Key Distillation

Buy
This book aims at giving an introduction to the principles and techniques of quantum cryptography, including secret-key distillation, as well as some more advanced topics. As quantum cryptography is now becoming a practical reality with products available commercially, it is important to focus not only on the theory of quantum cryptography but also on practical issues. For instance, what kind of security does quantum cryptography offer? How can the raw key produced by quantum cryptography be efficiently processed to obtain a usable secret key? What can safely be done with this key? Many challenges remain before these questions can be answered in their full generality. Yet quantum cryptography is mature enough to make these questions relevant and worth discussing.

The content of this book is based on my Ph.D. thesis [174], which initially focused on continuous-variable quantum cryptography protocols. When I decided to write this book, it was essential to include discrete-variable protocols so as to make its coverage more balanced. In all cases, the continuous and discrete-variable protocols share many aspects in common, which makes it interesting to discuss about them both in the same manuscript.

Quantum cryptography is a multi-disciplinary subject and, in this respect, it may interest readers with different backgrounds. Cryptography, quantum physics and information theory are all necessary ingredients to make quantum cryptography work. The introductory material in each of these fields should make the book self-contained. If necessary, references are given for further readings.

Quantum cryptography (or quantum key distribution) is a state-of-the-art technique that exploits properties of quantum mechanics to guarantee the secure exchange of secret keys. This 2006 text introduces the principles and techniques of quantum cryptography, setting it in the wider context of cryptography and security, with specific focus on secret-key distillation. The book starts with an overview chapter, progressing to classical cryptography, information theory (classical and quantum), and applications of quantum cryptography. The discussion moves to secret-key distillation, privacy amplification and reconciliation techniques, concluding with the security principles of quantum cryptography. The author explains the physical implementation and security of these systems, enabling engineers to gauge the suitability of quantum cryptography for securing transmission in their particular application. With its blend of fundamental theory, implementation techniques, and details of recent protocols, this book will be of interest to graduate students, researchers, and practitioners in electrical engineering, physics, and computer science.

(HTML tags aren't allowed.)

Professional Xcode 3 (Wrox Programmer to Programmer)
Professional Xcode 3 (Wrox Programmer to Programmer)

A solid guide that responds to the active interest in Apple's Xcode tools

Apple's Xcode tools are a collection of applications and frameworks that are used to develop, test, and optimize applications primarily written for Mac OS X or the iPhone. The steady increase in sales of Apple computers has triggered a strong interest...

iPhone User Interface Design Projects
iPhone User Interface Design Projects

With over 100,000 iPhone applications and 125,000 registered iPhone developers, is it still possible to create a top-selling app that stands apart from the six-figure crowd? Of course, but you’ll need more than a great idea and flawless code—an eye-catching and functional user interface design is essential. With this book,...

Nonlinear Computer Modeling of Chemical and Biochemical Data
Nonlinear Computer Modeling of Chemical and Biochemical Data

Assuming only background knowledge of algebra and elementary calculus, and access to a modern personal computer, Nonlinear Computer Modeling of Chemical and Biochemical Data presents the fundamental basis and procedures of data modeling by computer using nonlinear regression analysis. Bypassing the need for intermediary analytical...


Linux Security Cookbook
Linux Security Cookbook
f you run a Linux machine, you must think about security. Consider this story told by Scott, a system administrator we know:

In early 2001, I was asked to build two Linux servers for a client. They just wanted the machines installed and put online. I asked my boss if I should secure them, and he said no, the...

JavaScript For Kids For Dummies (For Dummies (Computers))
JavaScript For Kids For Dummies (For Dummies (Computers))

Have big dreams? Kick start them with JavaScript!

If we've learned one thing from the Millennial generation, it's that no one is too young to make history online. JavaScript For Kids For Dummies introduces pre-teens and early teens alike to the world of JavaScript, which is an integral programming language...

Calculus For Dummies
Calculus For Dummies

Calculus For Dummies, 2nd Edition (9781118791295) is now being published as Calculus For Dummies, 2nd Edition (9781119293491). While this version features an older Dummies cover and design, the content is the same as the new release and should not be considered a different product.

Slay the calculus monster with...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy