UsefulLinks
Computer Science
Cybersecurity
Quantum Cryptography and Post-Quantum Cryptography
1. Foundations of Modern Cryptography
2. Quantum Computing Fundamentals
3. Quantum Cryptography Principles
4. Quantum Key Distribution
5. QKD Implementation and Technology
6. QKD Security Analysis
7. Advanced Quantum Cryptographic Protocols
8. Post-Quantum Cryptography Foundations
9. Lattice-Based Cryptography
10. Code-Based Cryptography
11. Hash-Based Cryptography
12. Multivariate Cryptography
13. Isogeny-Based Cryptography
14. NIST Post-Quantum Cryptography Standardization
15. PQC Implementation and Deployment
16. Cryptanalysis of Post-Quantum Schemes
17. Quantum-Classical Cryptographic Integration
18. Quantum Networks and Infrastructure
19. Future Directions and Emerging Technologies
3.
Quantum Cryptography Principles
3.1.
Fundamental Concepts
3.1.1.
Information-Theoretic Security
3.1.1.1.
Definition and Significance
3.1.1.2.
Perfect Secrecy
3.1.1.3.
Contrast with Computational Security
3.1.2.
Quantum Security Advantages
3.1.2.1.
Exploiting Measurement Disturbance
3.1.2.2.
Exploiting No-Cloning Theorem
3.1.2.3.
Eavesdropping Detection
3.1.3.
Quantum vs Classical Information
3.1.3.1.
Quantum Information Properties
3.1.3.2.
Classical Information Extraction
3.1.3.3.
Information Disturbance Trade-offs
3.2.
Quantum Communication Channels
3.2.1.
Quantum Channel Models
3.2.1.1.
Noiseless Quantum Channels
3.2.1.2.
Noisy Quantum Channels
3.2.1.3.
Channel Capacity
3.2.2.
Photonic Implementation
3.2.2.1.
Photon Polarization States
3.2.2.2.
Photon Path States
3.2.2.3.
Phase Encoding
3.2.2.4.
Time-Bin Encoding
3.2.3.
Channel Security Analysis
3.2.3.1.
Eavesdropping Models
3.2.3.2.
Channel Authentication
3.2.3.3.
Man-in-the-Middle Prevention
Previous
2. Quantum Computing Fundamentals
Go to top
Next
4. Quantum Key Distribution