menu
{ "item_title" : "Performance Analysis and Optimization of the Winnow Secret Key Reconciliation Protocol", "item_author" : [" Kevin C. Lustic "], "item_description" : "Currently, private communications in public and government sectors rely on methods of cryptographic key distribution that will likely be rendered obsolete the moment a full-scale quantum computer is realized, or efficient classical methods of factoring are discovered. There are alternative methods for distributing secret key material in a post-quantum era. One example of a system capable of securely distributing cryptographic key material, known as Quantum Key Distribution (QKD), is secure against quantum factorization techniques as its security rests on generally accepted laws of quantum physics. QKD protocols typically include a phase called Error Reconciliation, a clear-text classical-channel discussion between legitimate parties of a QKD protocol by which errors introduced in the quantum channel are corrected and the legitimate parties ensure they share identical key material.", "item_img_path" : "https://covers1.booksamillion.com/covers/bam/1/28/833/135/1288331355_b.jpg", "price_data" : { "retail_price" : "17.95", "online_price" : "17.95", "our_price" : "17.95", "club_price" : "17.95", "savings_pct" : "0", "savings_amt" : "0.00", "club_savings_pct" : "0", "club_savings_amt" : "0.00", "discount_pct" : "10", "store_price" : "" } }
Performance Analysis and Optimization of the Winnow Secret Key Reconciliation Protocol|Kevin C. Lustic

Performance Analysis and Optimization of the Winnow Secret Key Reconciliation Protocol

local_shippingShip to Me
In Stock.
FREE Shipping for Club Members help

Overview

Currently, private communications in public and government sectors rely on methods of cryptographic key distribution that will likely be rendered obsolete the moment a full-scale quantum computer is realized, or efficient classical methods of factoring are discovered. There are alternative methods for distributing secret key material in a "post-quantum" era. One example of a system capable of securely distributing cryptographic key material, known as Quantum Key Distribution (QKD), is secure against quantum factorization techniques as its security rests on generally accepted laws of quantum physics. QKD protocols typically include a phase called "Error Reconciliation", a clear-text classical-channel discussion between legitimate parties of a QKD protocol by which errors introduced in the quantum channel are corrected and the legitimate parties ensure they share identical key material.

This item is Non-Returnable

Details

  • ISBN-13: 9781288331352
  • ISBN-10: 1288331355
  • Publisher: Biblioscholar
  • Publish Date: November 2012
  • Dimensions: 9.21 x 6.14 x 0.25 inches
  • Shipping Weight: 0.39 pounds
  • Page Count: 118

Related Categories

You May Also Like...

    1

BAM Customer Reviews