The bachelor thesis focuses on quantum cryptography. In the theoretical part, there is an analysis of secure key distribution in the fiber-optic infrastructure. Methods such as quantum key distribution (QKD) or physical layer secret key generation for fiber-optic networks are analyzed, including a description of the security and technical limitations of the methods. The thesis also attempts to interpret some basic principles of the optic infrastructure used in QKD. In addition to the distribution of keys, the thesis also tries to approximate the basic principles of the optic infrastructure used in QKD and, last but not least, post-quantum cryptography (including a comparison with quantum cryptography and current protocols). In the practical...
In this thesis research, a novel scheme to implement quantum key distribution based on multiphoton e...
Nowadays, widely spread encryption methods (e.g., RSA) and protocols enabling digital signatures (e....
Nowadays, widely spread encryption methods (e.g., RSA) and protocols enabling digital signatures (e....
The aim of this bachelor thesis is to create a comprehensive view of the current technology of quant...
This thesis is indirectly related to the bachelor thesis Quantum key distribution over optical fiber...
The thesis presents the basics of Quantum Key Distribution, a survey of the present techniques, a lo...
This bachelor thesis deals with the possibilities of quantum computatutions and their use in cryptan...
Bachelor's thesis analyzes quantum-based cryptography methods, specially there are described mostly ...
The aim of this masters thesis is to explain quantum key distribution (QKD) and principle of signal ...
Namen te diplomske naloge je raziskati vpliv kvantnih računalnikov na kriptografijo in razvoj post-k...
Quantum cryptography is an emerging technology in which two parties may simultaneously generated sha...
Increasing incidents of cyber attacks and evolution of quantum computing poses challenges to secure ...
Quantum Key Distribution, a fundamental component of quantum secure communication that exploits quan...
Quantum Key Distribution, a fundamental component of quantum secure communication that exploits quan...
Quantum Key Distribution, a fundamental component of quantum secure communication that exploits quan...
In this thesis research, a novel scheme to implement quantum key distribution based on multiphoton e...
Nowadays, widely spread encryption methods (e.g., RSA) and protocols enabling digital signatures (e....
Nowadays, widely spread encryption methods (e.g., RSA) and protocols enabling digital signatures (e....
The aim of this bachelor thesis is to create a comprehensive view of the current technology of quant...
This thesis is indirectly related to the bachelor thesis Quantum key distribution over optical fiber...
The thesis presents the basics of Quantum Key Distribution, a survey of the present techniques, a lo...
This bachelor thesis deals with the possibilities of quantum computatutions and their use in cryptan...
Bachelor's thesis analyzes quantum-based cryptography methods, specially there are described mostly ...
The aim of this masters thesis is to explain quantum key distribution (QKD) and principle of signal ...
Namen te diplomske naloge je raziskati vpliv kvantnih računalnikov na kriptografijo in razvoj post-k...
Quantum cryptography is an emerging technology in which two parties may simultaneously generated sha...
Increasing incidents of cyber attacks and evolution of quantum computing poses challenges to secure ...
Quantum Key Distribution, a fundamental component of quantum secure communication that exploits quan...
Quantum Key Distribution, a fundamental component of quantum secure communication that exploits quan...
Quantum Key Distribution, a fundamental component of quantum secure communication that exploits quan...
In this thesis research, a novel scheme to implement quantum key distribution based on multiphoton e...
Nowadays, widely spread encryption methods (e.g., RSA) and protocols enabling digital signatures (e....
Nowadays, widely spread encryption methods (e.g., RSA) and protocols enabling digital signatures (e....