20 research outputs found

    Post-Quantum Key Exchange Protocols

    Full text link
    If an eavesdropper Eve is equipped with quantum computers, she can easily break the public key exchange protocols used today. In this paper we will discuss the post-quantum Diffie-Hellman key exchange and private key exchange protocols.Comment: 11 pages, 2 figures. Submitted to SPIE DSS 2006; v2 citation typos fixed; v3 appendix typos correcte

    Introduction to cryptography with coding theory, second edition

    No full text

    Reducing medical errors using secure RFID technology

    No full text

    A Framework on Collaboration: an Interdisciplinary Project across Multiple Colleges

    No full text
    The order of complexity in carrying out collaborative research at multiple campuses poses a challenge to standard knowledge management systems. In this paper, we present a collaboration framework in which computer science students work in partnership with computer scientists, mathematicians and physicists on an emerging field of research, quantum information science. We first develop a few heuristic criteria to determine the rationale that makes project a successful one. We then demonstrate that our knowledge management systems produce publishable results and grant proposals within our framework
    corecore