Two-party Quantum Cryptography
Cryptography from Post-Quantum Assumptions
79
A Simple Security Proof for Entanglement Based Quantum Key Distribution
8
Fidelity of quantum strategies with applications to cryptography
20
Quantum Cryptography Beyond Quantum Key Distribution
45
Authentication using key distribution protocol with cryptography
5
Communication through Photon Using Quantum Cryptography: A Survey
6
Secure Certification of Mixed Quantum States with Application to Two-Party Randomness Generation
33
Two secure non symmetric role Key Agreement Protocols
6
Security against eavesdropping in quantum cryptography
11
A Novel Approach for Simple Quantum Digital signature based on Asymmetric Quantum Cryptography
5
Pairing Free Two Party Authenticated Protocols for Cryptography
6
Emerging Paradigms in Quantum Error Correction and Quantum Cryptography
135
Towards a quantum network with atomic ensembles
279
Entropy Security in Quantum Cryptography
6
Review Article on Quantum Cryptography
6
Benchmarking Post-Quantum Cryptography in TLS
21
Pre- and post-quantum Diffie--Hellman from groups, actions, and isogenies
40
Comment on Quantum Cryptography---Which is More Important, Signal Security, Information Security or Communication Reliability
7
Florida: Party Activists in a Two-Party System
18
Louisiana: Two-Party Growth and Increasing Party Polarization
16