Quantum Cryptography for Nuclear Command and Control
نویسندگان
چکیده
منابع مشابه
Alternative COA Selection Methodologies: The Quantum Command and Control Theory
Purpose This briefing provides an introduction to alternative COA selection methodologies Several alternative COA methodologies are presented that offer the commander quantitative alternatives that eliminate some of the drawbacks with the standard WNC methodology This briefing also provides an introduction to Quantum C2 Theory. While clearly there is an art component of C2, there is a nee...
متن کاملQuantum Computing and Quantum Cryptography
Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries. Entrust is a registered trademark of Entrust Limited in Canada. All other Entrust product names and service names are trademarks or registered trademarks of Entrust, Inc or Entrust Limited. All other company and product names are trademarks or registered trademarks of their respective owners.
متن کاملQuantum and Post Quantum Cryptography
Public key cryptography is widely used for signing contracts, electronic voting, encryption, and to secure transactions over the Internet. The discovery by Peter Shor, in 1994, of an efficient algorithm based on quantum mechanics for factoring large integers and computing discrete logarithms undermined the security assumptions upon which currently used public key cryptographic algorithms are ba...
متن کاملQuantum relays for long distance quantum cryptography
Quantum cryptography is on the verge of commercial application. One of its greatest limitations is over long distance—secret key rates are low and the longest fibre over which any key has been exchanged is currently 100 km. We investigate the quantum relay, which can increase the maximum distance at which quantum cryptography is possible. The relay splits the channel into sections and sends a d...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computer and Information Science
سال: 2020
ISSN: 1913-8997,1913-8989
DOI: 10.5539/cis.v13n1p72