This book provides a comprehensive introduction to quantum cryptography for advanced undergraduate and graduate students in computer science, physics, engineering and applied mathematics. Requiring no background in quantum computing, this title includes discussion of both background theory and key, modern applications of quantum cryptography.
This book provides a comprehensive introduction to quantum cryptography for advanced undergraduate and graduate students in computer science, physics, engineering and applied mathematics. Requiring no background in quantum computing, this title includes discussion of both background theory and key, modern applications of quantum cryptography.Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Thomas Vidick is Professor in the Department Computer Science and Applied Mathematics at the Weizmann Institute of Science in Israel. He received his Ph.D. from UC Berkeley in 2011, followed by two years of postdoctoral research at the Massachusetts Institute of Technology, where he worked on quantum complexity and cryptography. He joined the Computer Science Faculty at the California Institute of Technology in 2014, and became Professor in 2018. In 2022 he took a leave from CalTech to start his current position at the Weizmann Institute. Professor Vidick is best known for his research on device-independence, including the first security proof of device-independent quantum key distribution. In 2019 he received a Presidential Early-Career Award, and in 2021 was named a Simons Investigator at CalTech. In 2023 he received the Michael and Sheila Held prize from the National Academy of Sciences for his work in quantum cryptography and quantum complexity.
Inhaltsangabe
Preface 1. Background material 2. Quantum tools and a first protocol 3. Quantum money 4. The power of entanglement 5. Quantifying information 6. From imperfect information to (near) perfect security 7. Distributing keys 8. Quantum key distribution protocols 9. Quantum cryptography using untrusted devices 10. Quantum cryptography beyond key distribution 11. Security from physical assumptions 12. Further topics around encryption 13. Delegated computation References Index.
Preface 1. Background material 2. Quantum tools and a first protocol 3. Quantum money 4. The power of entanglement 5. Quantifying information 6. From imperfect information to (near) perfect security 7. Distributing keys 8. Quantum key distribution protocols 9. Quantum cryptography using untrusted devices 10. Quantum cryptography beyond key distribution 11. Security from physical assumptions 12. Further topics around encryption 13. Delegated computation References Index.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497