NORM 发表于 2025-3-23 11:30:27

http://reply.papertrans.cn/87/8634/863319/863319_11.png

dowagers-hump 发表于 2025-3-23 14:27:26

Security Analysis of Quantum Cryptographic Protocolsattack, participant attack, and implementation attack. Also, we introduce some general security analysis methods, such as BAN logic, random oracle model, and quantum-accessible random oracle model. These methods for classical cryptographic protocols can provide effective tools for quantum cryptograp

乞讨 发表于 2025-3-23 21:33:31

http://reply.papertrans.cn/87/8634/863319/863319_13.png

门窗的侧柱 发表于 2025-3-23 22:24:29

Security Analysis Based on Quantum Random Oracle Model the attempts of constructing a quantum random oracle (QRO) have been made, such as quantum-accessible random oracle for post-quantum cryptography and quantum random oracle for quantum cryptography. To facilitate the security analysis of quantum cryptographic protocols, we introduce quantum random o

纵火 发表于 2025-3-24 03:32:16

Security Analysis of Quantum Obfuscationwith other terms in quantum cryptography, quantum obfuscation attracts less attention and is still in its infancy due to its difficulty in implementation and application. In this chapter, we provide a positive result of quantum obfuscation. To analyze the obfuscatability of quantum point functions,

Factorable 发表于 2025-3-24 07:29:59

http://reply.papertrans.cn/87/8634/863319/863319_16.png

讨人喜欢 发表于 2025-3-24 13:59:07

http://reply.papertrans.cn/87/8634/863319/863319_17.png

受辱 发表于 2025-3-24 17:43:05

http://reply.papertrans.cn/87/8634/863319/863319_18.png

gustation 发表于 2025-3-24 20:37:27

http://reply.papertrans.cn/87/8634/863319/863319_19.png

竖琴 发表于 2025-3-25 00:43:59

http://reply.papertrans.cn/87/8634/863319/863319_20.png
页: 1 [2] 3 4 5 6
查看完整版本: Titlebook: Secure Quantum Network Coding Theory; Tao Shang,Jianwei Liu Book 2020 Springer Nature Singapore Pte Ltd. 2020 Quantum network coding.Oppor