ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1409.3525
  4. Cited By
Cryptographic security of quantum key distribution

Cryptographic security of quantum key distribution

11 September 2014
Christopher Portmann
R. Renner
ArXiv (abs)PDFHTML

Papers citing "Cryptographic security of quantum key distribution"

20 / 20 papers shown
Title
Spanning-tree-packing protocol for conference key propagation in quantum networks
Spanning-tree-packing protocol for conference key propagation in quantum networks
Anton Trushechkin
Hermann Kampermann
Dagmar Bruß
62
0
0
04 Jun 2025
Establishing shared secret keys on quantum line networks: protocol and
  security
Establishing shared secret keys on quantum line networks: protocol and security
Mina Doosti
L. Hanouz
Anne Marin
E. Kashefi
M. Kaplan
33
8
0
04 Apr 2023
Optimal Second-Order Rates for Quantum Soft Covering and Privacy
  Amplification
Optimal Second-Order Rates for Quantum Soft Covering and Privacy Amplification
Yunyi Shen
Li Gao
Hao-Chung Cheng
47
19
0
23 Feb 2022
QKD parameter estimation by two-universal hashing
QKD parameter estimation by two-universal hashing
Dimiter Ostrev
21
3
0
14 Sep 2021
Impossibility of composable Oblivious Transfer in relativistic quantum
  cryptography
Impossibility of composable Oblivious Transfer in relativistic quantum cryptography
Lorenzo Laneve
L. D. Rio
38
2
0
21 Jun 2021
Categorical composable cryptography
Categorical composable cryptography
Anne Broadbent
M. Karvonen
65
7
0
12 May 2021
SPoTKD: A Protocol for Symmetric Key Distribution over Public Channels
  Using Self-Powered Timekeeping Devices
SPoTKD: A Protocol for Symmetric Key Distribution over Public Channels Using Self-Powered Timekeeping Devices
Mustafizur Rahman
Liang Zhou
S. Chakrabartty
26
3
0
09 Apr 2021
Provably-secure symmetric private information retrieval with quantum
  cryptography
Provably-secure symmetric private information retrieval with quantum cryptography
Wen Yu Kon
C. Lim
34
19
0
29 Apr 2020
Composable and Finite Computational Security of Quantum Message
  Transmission
Composable and Finite Computational Security of Quantum Message Transmission
Fabio Banfi
U. Maurer
Christopher Portmann
Jiamin Zhu
59
3
0
09 Aug 2019
Symbolic Abstractions for Quantum Protocol Verification
Symbolic Abstractions for Quantum Protocol Verification
L. Hirschi
41
1
0
08 Apr 2019
Composable, Unconditionally Secure Message Authentication without any
  Secret Key
Composable, Unconditionally Secure Message Authentication without any Secret Key
Dimiter Ostrev
16
3
0
05 Apr 2018
Security of Quantum Key Distribution from Attacker's View
Security of Quantum Key Distribution from Attacker's View
T. Iwakoshi
18
2
0
09 Nov 2017
Yuen's Criticisms on Security of Quantum Key Distribution and Onward
Yuen's Criticisms on Security of Quantum Key Distribution and Onward
T. Iwakoshi
33
1
0
09 Nov 2017
Composable security in relativistic quantum cryptography
Composable security in relativistic quantum cryptography
V. Vilasini
Christopher Portmann
L. D. Rio
70
18
0
01 Aug 2017
(Quantum) Min-Entropy Resources
(Quantum) Min-Entropy Resources
Christopher Portmann
43
2
0
30 May 2017
Quantum authentication with key recycling
Quantum authentication with key recycling
Christopher Portmann
73
42
0
11 Oct 2016
Simple and tight device-independent security proofs
Simple and tight device-independent security proofs
Rotem Arnon Friedman
R. Renner
Thomas Vidick
61
115
0
06 Jul 2016
Causal Boxes: Quantum Information-Processing Systems Closed under
  Composition
Causal Boxes: Quantum Information-Processing Systems Closed under Composition
Christopher Portmann
Christian Matt
U. Maurer
R. Renner
Björn Tackmann
72
63
0
07 Dec 2015
Towards Quantum Enigma Cipher II-A protocol based on quantum
  illumination-
Towards Quantum Enigma Cipher II-A protocol based on quantum illumination-
O. Hirota
17
2
0
07 Nov 2015
Composable security of delegated quantum computation
Composable security of delegated quantum computation
Vedran Dunjko
J. Fitzsimons
Christopher Portmann
R. Renner
95
98
0
16 Jan 2013
1