Publisher
Springer Science and Business Media LLC
Reference23 articles.
1. Bennett, C., Brassard, G.: Quantum cryptography: public key cryptography and coin tossing. In: Proceedings of International Conference on Computers, Systems & Signal Processing, Bangalore, India, pp. 175–179. (1984)
2. Zhang, H., Ji, Z., Wang, H., Wu, W.: Survey on quantum information security. China Commun. 16(10), 1–36 (2019). https://doi.org/10.23919/JCC.2019.10.001
3. Kumar, A., Garhwal, S.: State-of-the-art survey of quantum cryptography. Arch. Comput. Methods Eng. 28, 3831–3868 (2021)
4. Yao, A.C.: Protocols for secure computations. In: 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982), pp. 160–164. IEEE (1982)
5. Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game, or a completeness theorem for protocols with honest majority. In: Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali, pp. 307–328 (2019)