O trudoemkosti perebora v kvantovoy kriptografii s teoretiko-informatsionno stoykoy autentifikatsiey
- Authors: Kulik S.P1, Molotkov S.N1
-
Affiliations:
- Issue: Vol 121, No 5-6 (2025)
- Pages: 503-512
- Section: Articles
- URL: https://journals.rcsi.science/0370-274X/article/view/286597
- DOI: https://doi.org/10.31857/S0370274X25030234
- EDN: https://elibrary.ru/RDSOJG
- ID: 286597
Cite item
Abstract
References
- C. H. Bennett and G. Brassard, Quantum cryptography: public key distribution and coin tossing, in Proceedings of IEEE International Conference on Computers7, Systems and Signal Processing, Bangalore, India (1984), p. 175.
- H. P. Yuen, Phys. Rev. A 82, 062304 (2010).
- H. P. Yuen, arXiv:1109.1051 [quant-ph].
- H. P. Yuen, arXiv:1109.2675 [quant-ph].
- H. P. Yuen, arXiv:1109.1066 [quant-ph].
- R. Renner, 1209.2423 [quant-ph].
- И. М. Арбеков, С. Н. Молотков, ЖЭТФ 152(1(7)), 62 (2017).
- И. М. Арбеков, Математические вопросы криптографии 7(1), 39 (2016).
- С. Н. Молотков, ЖЭТФ 150(5(11)), 903 (2016).
- A. Abidin and J.-˚ A. Larsson, Int. J. Quantum Inf. 7(5), 1047 (2009).
- M. Peev, C. Pacher, T. Lor¨unser, M. N¨olle, A. Poppe, O. Maurhart, M. Suda, A. Fedrizzi, R. Ursin, and A. Zeilinger, Int. J. Quantum Inf. 7, 1401 (2009).
- C. Pacher, A. Abidin, T. Lornser, M. Peev, R. Ursin, A. Zeilinger, and J-˚ A. Larsson, Quantum Information Processing 15(1), 327 (2012); arXiv:1209.0365.
- S. N. Molotkov, Laser Phys. 34, 045202 (2024).
- R. Renner, Security of Quantum Key Distribution, PhD Thesis, ETH Z¨urich, Dec. (2005).
- G. Simmons, Proc. IEEE 76(5), 603 (1988).
- M. N. Wegman and L. Carter, J. Comput. Syst. Sci., 22, 265 (1981).
- M. Atici and D. R. Stinson, Universal hashing and multiple authentication, in N. Koblitz (editor), CRYPTO 96. LNCS, Springer, Berlin (1996), v. 1109, p. 16.
- J. Bierbrauer, T. Johansson, G. Kabatianskii, and B. Smeets, On families of hash functions via geometric codes and concatenation, in D. Stinson (editor), CRYPTO ’93. LNCS, Springer, Berlin (1994), v. 773, p. 331.
- B. den Boer, J. Comput. Security 2, 65 (1993).
- H. Krawczyk, LFSR-based hashing and authentication, in Y. Desmedt (editor), CRYPTO 94. LNCS, Springer, Berlin (1994), v. 839, p. 129.
- H. Krawczyk, New hash functions formessage authentication, in L. C. Guillou and J. J. Quisquater (editors), EUROCRYPT 95. LNCS, Springer, Berlin (1995), v. 921, p. 301.
- D. R. Stinson, Universal hashing and authentication codes, in J. Feigenbaum (editor), CRYPTO 91. LNCS, Springer, Berlin (1992), v. 576, p. 74.
- D. R. Stinson, J. Comput. Syst. Sci. 48, 337 (1994).
- D. R. Stinson, Congr. Numer. 114, 7 (1996).
- D. R. Stinson, J. Combin. Math. Combin. Comput. 42, 3 (2002).
- A. Abidin and J-˚ A. Larsson, New universal hash functions, in S. Lucks and F. Armknecht (editors), WEWoRC 2011. LNCS, Springer, Berlin (2012), v. 7242, p. 99.
- P. Rogaway, J. Cryptol. 12(2), 91 (1999).
- A. Abidin and J-˚ A. Larsson, Quantum Inf. Process. 13, 2155 (2014).
- Ch. Portmann, IEEE Trans. Inform. Theory 60(7), 4383 (2014).
- M. M. Wilde, arXiv:1106.1445v6 [quant-ph] 2 Dec 2015.
- T. M. Cover and J. A. Thomas, Elements of Information Theory, Second Edition, A. J. Wiley & Sons, Inc., Publication, Hoboken, New Jersey (2006).
Supplementary files
