CORE
CO
nnecting
RE
positories
Services
Services overview
Explore all CORE services
Access to raw data
API
Dataset
FastSync
Content discovery
Recommender
Discovery
OAI identifiers
OAI Resolver
Managing content
Dashboard
Bespoke contracts
Consultancy services
Support us
Support us
Membership
Sponsorship
Research partnership
About
About
About us
Our mission
Team
Blog
FAQs
Contact us
Community governance
Governance
Advisory Board
Board of supporters
Research network
Innovations
Our research
Labs
research
Security of Quantum Key Distribution
Authors
Abdulbast Abushgra
Khaled M. Elleithy
Publication date
30 April 2015
Publisher
ASEE
Abstract
© ASEE 2015Every day, the world looks on more of security analysis needs that are based on the enormous and sensitive information. This datum is shared by different systems around the world, which are considered at risk of attack at any time. Many scientists and researchers have brought up another cryptographic subject in Quantum Computing that is so-called Quantum Key Distribution (QKD) protocol. The first QKD is BB84 that was presented by Charles Bennett and Gilles Brassard in 1984. After that, several protocols were created sequentially with the same or different mechanism and with some abilities of these protocols to stand against well-known quantum attacks. This paper studies these protocols deeply and compares them to find the strong and weak points in each considered protocols
Similar works
Full text
Open in the Core reader
Download PDF
Available Versions
UB ScholarWorks
See this paper in CORE
Go to the repository landing page
Download from data provider
oai:scholarworks.bridgeport.ed...
Last time updated on 12/11/2016
UB ScholarWorks
See this paper in CORE
Go to the repository landing page
Download from data provider
oai:https://scholarworks.bridg...
Last time updated on 07/09/2024