Quantum Cryptography and Post-Quantum Cryptography

  1. QKD Security Analysis
    1. Security Proofs
      1. Information-Theoretic Security Proofs
        1. Unconditional Security Conditions
          1. Security Parameter Calculation
            1. Finite-Key Security Analysis
            2. Eavesdropping Strategies
              1. Individual Attacks
                1. Intercept-Resend Attack
                  1. Optimal Individual Attacks
                  2. Collective Attacks
                    1. Coherent Attacks
                      1. Entangling Probe Attacks
                      2. Coherent Attacks
                        1. General Attack Model
                          1. Security Against Coherent Attacks
                        2. Practical Security Considerations
                          1. Photon Number Splitting Attacks
                            1. Attack Mechanism
                              1. Decoy State Countermeasures
                              2. Trojan Horse Attacks
                                1. Attack Description
                                  1. Detection Methods
                                  2. Side-Channel Attacks
                                    1. Detector Blinding
                                      1. Timing Attacks
                                        1. Power Analysis
                                          1. Countermeasures
                                          2. Implementation Security
                                            1. Device Characterization
                                              1. Security Certification
                                                1. Trusted Device Assumptions