Pub Date : 2019-10-16DOI: 10.1002/9781119618232.ch5
{"title":"What Will a Post‐Quantum World Look Like?","authors":"","doi":"10.1002/9781119618232.ch5","DOIUrl":"https://doi.org/10.1002/9781119618232.ch5","url":null,"abstract":"","PeriodicalId":142899,"journal":{"name":"Cryptography Apocalypse","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115408825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-16DOI: 10.1002/9781119618232.ch4
{"title":"When Will the Quantum Crypto Break Happen?","authors":"","doi":"10.1002/9781119618232.ch4","DOIUrl":"https://doi.org/10.1002/9781119618232.ch4","url":null,"abstract":"","PeriodicalId":142899,"journal":{"name":"Cryptography Apocalypse","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125701784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-01-02DOI: 10.1002/9781119618232.ch7
M. Hamrick, Y. Weinstein, G. Gilbert
{"title":"Quantum Cryptography","authors":"M. Hamrick, Y. Weinstein, G. Gilbert","doi":"10.1002/9781119618232.ch7","DOIUrl":"https://doi.org/10.1002/9781119618232.ch7","url":null,"abstract":"","PeriodicalId":142899,"journal":{"name":"Cryptography Apocalypse","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115770322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-09DOI: 10.1002/9781119618232.ch8
R. V. Meter
Quantum networks build on entanglement and quantum measurement to achieve tasks that are beyond the reach of classical systems. Using quantum effects, we can detect the presence of eavesdroppers, raise the sensitivity of scientific instruments such as telescopes, or teleport quantum data from one location to another. Long-distance entanglement can be used to execute important tasks such as Byzantine agreement and leader election in fewer rounds of communication than classical systems, improving the efficiency of operations that are critical in distributed systems.
{"title":"Quantum Networking","authors":"R. V. Meter","doi":"10.1002/9781119618232.ch8","DOIUrl":"https://doi.org/10.1002/9781119618232.ch8","url":null,"abstract":"Quantum networks build on entanglement and quantum measurement to achieve tasks that are beyond the reach of classical systems. Using quantum effects, we can detect the presence of eavesdroppers, raise the sensitivity of scientific instruments such as telescopes, or teleport quantum data from one location to another. Long-distance entanglement can be used to execute important tasks such as Byzantine agreement and leader election in fewer rounds of communication than classical systems, improving the efficiency of operations that are critical in distributed systems.","PeriodicalId":142899,"journal":{"name":"Cryptography Apocalypse","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114226691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1998-11-03DOI: 10.1002/9781119618232.ch2
Christof Zalka
This is a short introduction to quantum computers, quantum algorithms and quantum error correcting codes. Familiarity with the principles of quantum theory is assumed. Emphasis is put on a concise presentation of the principles avoiding lengthy discussions.
{"title":"Introduction to Quantum Computers","authors":"Christof Zalka","doi":"10.1002/9781119618232.ch2","DOIUrl":"https://doi.org/10.1002/9781119618232.ch2","url":null,"abstract":"This is a short introduction to quantum computers, quantum algorithms and quantum error correcting codes. Familiarity with the principles of quantum theory is assumed. Emphasis is put on a concise presentation of the principles avoiding lengthy discussions.","PeriodicalId":142899,"journal":{"name":"Cryptography Apocalypse","volume":"264 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123475045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}