000 02793nam a22003491i 4500
003 UkCbUP
005 20251013123157.0
008 201127s2024 enk o ||1 0|eng|d
020 _a9781009026208
020 _z9781316515655
041 _aEnglish
082 0 4 _a005.824
_223
_bVID
100 1 _aVidick, Thomas,
100 1 _eauthor.
245 1 0 _aIntroduction to quantum cryptography /
_cThomas Vidick, Stephanie Wehner.
260 _aNew Delhi :
_bCambridge University Press,
_c2024.
300 _axiv, 327 pages :
505 _tFrontmatter 1 - Background Material pp 1-39 2 - Quantum Tools and a First Protocol pp 40-77 3 - Quantum Money pp 78-98 4 - The Power of Entanglement pp 99-124 5 - Quantifying Information pp 125-152 6 - From Imperfect Information to (Near) Perfect Security pp 153-175 7 - Distributing Keys pp 176-193 8 - Quantum Key Distribution Protocols pp 194-217 9 - Quantum Cryptography Using Untrusted Devices pp 218-240 10 - Quantum Cryptography beyond Key Distribution pp 241-269 11 - Security from Physical Assumptions pp 270-283 12 - Further Topics around Encryption pp 284-301 13 - Delegated Computation pp 302-326 Index pp 327-328
506 _aAccess restricted to subscribing institutions.
520 _aThis book offers an accessible and engaging introduction to quantum cryptography, assuming no prior knowledge in quantum computing. Essential background theory and mathematical techniques are introduced and applied in the analysis and design of quantum cryptographic protocols. The title explores several important applications such as quantum key distribution, quantum money, and delegated quantum computation, while also serving as a self-contained introduction to the field of quantum computing. With frequent illustrations and simple examples relevant to quantum cryptography, this title focuses on building intuition and challenges readers to understand the basis of cryptographic security. Frequent worked examples and mid-chapter exercises allow readers to extend their understanding, and in-text quizzes, end-of-chapter homework problems, and recommended further reading reinforce and broaden understanding. Online resources available to instructors include interactive computational problems in Julia, videos, lecture slides, and a fully worked solutions manual.
650 0 _aQuantum cryptography
650 0 _aQuantum computing
650 0 _xMathematics.
650 0 _xSecurity measures.
700 1 _aWehner, Stephanie,
700 1 _eauthor.
776 0 8 _iPrint version:
_z9781316515655.
856 4 0 _uhttps://ezproxy.lib.gla.ac.uk/login?url=https://doi.org/10.1017/9781009026208
856 4 0 _zConnect to resource
907 _a.b41064689
942 _2ddc
_cBOOKS
999 _c45911
_d45911