Author:
Sultanow Eldar,Bauckhage Christian,Knopf Christian,Piatkowski Nico
Funder
Universitätsgesellschaft Potsdam e.V.
Publisher
Springer Fachmedien Wiesbaden GmbH
Subject
General Earth and Planetary Sciences,General Engineering,General Environmental Science
Reference34 articles.
1. Morgan, S. “Global cybercrime damages predicted to reach trillion annually by 2021,” Cybersecurity ventures. https://cybersecurityventures.com/annual-cybercrime-report-2020/ (Erstellt: 26. Okt. 2020). Zugegriffen: 28. Feb. 2022.
2. Alani, M. M. (2019). Applications of machine learning in cryptography: a survey. ICCSP ’19. : Association for Computing Machinery.
3. Liu, W., Huang, P., Peng, J., Fan, J., & Zeng, G. (2018). Integrating machine learning to achieve an automatic parameter prediction for practical continuous-variable quantum key distribution. Physical Review A, 97. https://doi.org/10.1103/PhysRevA.97.022316
4. Lau, H.-K, & Lo, H.-K. (2011). Insecurity of position-based quantum-cryptography protocols against entanglement attacks. Physical Review A. https://doi.org/10.1103/PhysRevA.83.012322
5. Beigi, R. K. S. (2011). Simplified instantaneous non-local quantum. New Journal of Physics. https://doi.org/10.1088/1367-2630/13/9/093036
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. „Steal Now, Decrypt Later“;Informatik Spektrum;2022-07-21