
arXiv: quant-ph/0603230
If an eavesdropper Eve is equipped with quantum computers, she can easily break the public key exchange protocols used today. In this paper we will discuss the post-quantum Diffie-Hellman key exchange and private key exchange protocols.
11 pages, 2 figures. Submitted to SPIE DSS 2006; v2 citation typos fixed; v3 appendix typos corrected
Quantum Physics, FOS: Physical sciences, Quantum Physics (quant-ph)
Quantum Physics, FOS: Physical sciences, Quantum Physics (quant-ph)
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 0 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
