Useful Links
Computer Science
Cybersecurity
Quantum Cryptography and Post-Quantum Cryptography
1. Foundations of Modern Cryptography
2. Quantum Computing Fundamentals
3. Quantum Cryptography Principles
4. Quantum Key Distribution
5. QKD Implementation and Technology
6. QKD Security Analysis
7. Advanced Quantum Cryptographic Protocols
8. Post-Quantum Cryptography Foundations
9. Lattice-Based Cryptography
10. Code-Based Cryptography
11. Hash-Based Cryptography
12. Multivariate Cryptography
13. Isogeny-Based Cryptography
14. NIST Post-Quantum Cryptography Standardization
15. PQC Implementation and Deployment
16. Cryptanalysis of Post-Quantum Schemes
17. Quantum-Classical Cryptographic Integration
18. Quantum Networks and Infrastructure
19. Future Directions and Emerging Technologies
Quantum Key Distribution
QKD Fundamentals
Security Model and Assumptions
Threat Model
Security Definitions
Comparison to Classical Key Exchange
QKD Protocol Structure
Quantum Communication Phase
Classical Post-Processing Phase
Key Distillation Process
Prepare-and-Measure Protocols
BB84 Protocol
Protocol Overview
Photon Polarization Encoding
Rectilinear Basis
Diagonal Basis
State Preparation
Protocol Steps
Alice's State Preparation
Quantum Transmission
Bob's Measurement
Basis Reconciliation
Eavesdropping Detection
Error Rate Analysis
Security Threshold
Classical Post-Processing
Sifting Process
Error Correction
Privacy Amplification
B92 Protocol
Protocol Description
Two-State Implementation
Differences from BB84
Security Analysis
Six-State Protocol
Three-Basis Implementation
Enhanced Security Properties
Performance Trade-offs
Decoy State Protocols
Motivation and Purpose
Implementation Methods
Security Enhancement
Entanglement-Based Protocols
E91 Protocol
Protocol Overview
Entangled Photon Pair Generation
Bell State Measurements
Bell's Theorem Application
Eavesdropping Detection via Bell Inequalities
CHSH Inequality Testing
BBM92 Protocol
Protocol Description
Relationship to BB84
Entanglement Advantages
Implementation Considerations
Continuous Variable QKD
Gaussian Modulation Protocols
Coherent State Implementation
Security Analysis
Practical Advantages
Previous
3. Quantum Cryptography Principles
Go to top
Next
5. QKD Implementation and Technology