000 | 02793nam a22003491i 4500 | ||
---|---|---|---|
003 | UkCbUP | ||
005 | 20251013123157.0 | ||
008 | 201127s2024 enk o ||1 0|eng|d | ||
020 | _a9781009026208 | ||
020 | _z9781316515655 | ||
041 | _aEnglish | ||
082 | 0 | 4 |
_a005.824 _223 _bVID |
100 | 1 | _aVidick, Thomas, | |
100 | 1 | _eauthor. | |
245 | 1 | 0 |
_aIntroduction to quantum cryptography / _cThomas Vidick, Stephanie Wehner. |
260 |
_aNew Delhi : _bCambridge University Press, _c2024. |
||
300 | _axiv, 327 pages : | ||
505 | _tFrontmatter 1 - Background Material pp 1-39 2 - Quantum Tools and a First Protocol pp 40-77 3 - Quantum Money pp 78-98 4 - The Power of Entanglement pp 99-124 5 - Quantifying Information pp 125-152 6 - From Imperfect Information to (Near) Perfect Security pp 153-175 7 - Distributing Keys pp 176-193 8 - Quantum Key Distribution Protocols pp 194-217 9 - Quantum Cryptography Using Untrusted Devices pp 218-240 10 - Quantum Cryptography beyond Key Distribution pp 241-269 11 - Security from Physical Assumptions pp 270-283 12 - Further Topics around Encryption pp 284-301 13 - Delegated Computation pp 302-326 Index pp 327-328 | ||
506 | _aAccess restricted to subscribing institutions. | ||
520 | _aThis book offers an accessible and engaging introduction to quantum cryptography, assuming no prior knowledge in quantum computing. Essential background theory and mathematical techniques are introduced and applied in the analysis and design of quantum cryptographic protocols. The title explores several important applications such as quantum key distribution, quantum money, and delegated quantum computation, while also serving as a self-contained introduction to the field of quantum computing. With frequent illustrations and simple examples relevant to quantum cryptography, this title focuses on building intuition and challenges readers to understand the basis of cryptographic security. Frequent worked examples and mid-chapter exercises allow readers to extend their understanding, and in-text quizzes, end-of-chapter homework problems, and recommended further reading reinforce and broaden understanding. Online resources available to instructors include interactive computational problems in Julia, videos, lecture slides, and a fully worked solutions manual. | ||
650 | 0 | _aQuantum cryptography | |
650 | 0 | _aQuantum computing | |
650 | 0 | _xMathematics. | |
650 | 0 | _xSecurity measures. | |
700 | 1 | _aWehner, Stephanie, | |
700 | 1 | _eauthor. | |
776 | 0 | 8 |
_iPrint version: _z9781316515655. |
856 | 4 | 0 | _uhttps://ezproxy.lib.gla.ac.uk/login?url=https://doi.org/10.1017/9781009026208 |
856 | 4 | 0 | _zConnect to resource |
907 | _a.b41064689 | ||
942 |
_2ddc _cBOOKS |
||
999 |
_c45911 _d45911 |