Introduction to quantum cryptography / Thomas Vidick, Stephanie Wehner.
Material type:
- 9781009026208
- 005.824 23 VID
Item type | Current library | Collection | Call number | Status | Barcode | |
---|---|---|---|---|---|---|
![]() |
CUTN Central Library Generalia | Non-fiction | 005.824 VID (Browse shelf(Opens below)) | Available | 54566 |
Browsing CUTN Central Library shelves, Shelving location: Generalia, Collection: Non-fiction Close shelf browser (Hides shelf browser)
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
005.82 TRA Introduction to Cryptography With Coding Theory | 005.82 TRA Introduction to Cryptography With Coding Theory | 005.82 YAS Cryptography : | 005.824 VID Introduction to quantum cryptography / | 005.84 AYC Computer viruses and malware / | 005.84 SHA Dictionary of computer viruses / | 005.84 SHA Dictionary of computer viruses / |
Frontmatter
1 - Background Material
pp 1-39
2 - Quantum Tools and a First Protocol
pp 40-77
3 - Quantum Money
pp 78-98
4 - The Power of Entanglement
pp 99-124
5 - Quantifying Information
pp 125-152
6 - From Imperfect Information to (Near) Perfect Security
pp 153-175
7 - Distributing Keys
pp 176-193
8 - Quantum Key Distribution Protocols
pp 194-217
9 - Quantum Cryptography Using Untrusted Devices
pp 218-240
10 - Quantum Cryptography beyond Key Distribution
pp 241-269
11 - Security from Physical Assumptions
pp 270-283
12 - Further Topics around Encryption
pp 284-301
13 - Delegated Computation
pp 302-326
Index
pp 327-328
Access restricted to subscribing institutions.
This book offers an accessible and engaging introduction to quantum cryptography, assuming no prior knowledge in quantum computing. Essential background theory and mathematical techniques are introduced and applied in the analysis and design of quantum cryptographic protocols. The title explores several important applications such as quantum key distribution, quantum money, and delegated quantum computation, while also serving as a self-contained introduction to the field of quantum computing. With frequent illustrations and simple examples relevant to quantum cryptography, this title focuses on building intuition and challenges readers to understand the basis of cryptographic security. Frequent worked examples and mid-chapter exercises allow readers to extend their understanding, and in-text quizzes, end-of-chapter homework problems, and recommended further reading reinforce and broaden understanding. Online resources available to instructors include interactive computational problems in Julia, videos, lecture slides, and a fully worked solutions manual.
There are no comments on this title.