Useful Links
Computer Science
Cybersecurity
Quantum Cryptography and Post-Quantum Cryptography
1. Foundations of Modern Cryptography
2. Quantum Computing Fundamentals
3. Quantum Cryptography Principles
4. Quantum Key Distribution
5. QKD Implementation and Technology
6. QKD Security Analysis
7. Advanced Quantum Cryptographic Protocols
8. Post-Quantum Cryptography Foundations
9. Lattice-Based Cryptography
10. Code-Based Cryptography
11. Hash-Based Cryptography
12. Multivariate Cryptography
13. Isogeny-Based Cryptography
14. NIST Post-Quantum Cryptography Standardization
15. PQC Implementation and Deployment
16. Cryptanalysis of Post-Quantum Schemes
17. Quantum-Classical Cryptographic Integration
18. Quantum Networks and Infrastructure
19. Future Directions and Emerging Technologies
Quantum Cryptography Principles
Fundamental Concepts
Information-Theoretic Security
Definition and Significance
Perfect Secrecy
Contrast with Computational Security
Quantum Security Advantages
Exploiting Measurement Disturbance
Exploiting No-Cloning Theorem
Eavesdropping Detection
Quantum vs Classical Information
Quantum Information Properties
Classical Information Extraction
Information Disturbance Trade-offs
Quantum Communication Channels
Quantum Channel Models
Noiseless Quantum Channels
Noisy Quantum Channels
Channel Capacity
Photonic Implementation
Photon Polarization States
Photon Path States
Phase Encoding
Time-Bin Encoding
Channel Security Analysis
Eavesdropping Models
Channel Authentication
Man-in-the-Middle Prevention
Previous
2. Quantum Computing Fundamentals
Go to top
Next
4. Quantum Key Distribution