• No results found

;)

N/A
N/A
Protected

Academic year: 2021

Share ";)"

Copied!
1
0
0

Loading.... (view fulltext now)

Full text

(1)

Authentication in Quantum Key Distribution:

Security Proof and Universal Hash Functions

Linköping Studies in Science and Technology

Dissertations. No. 1517

Linköping Studies in Science and Technology. Dissertation No. 1517, 2013

Division of Information Coding

Department of Electrical Engineering, Linköping University

SE-581 83 Linköping, Sweden

www.liu.se

A

ysajan A

bidin

A

uthentication in QKD: S

ecurity Proof and Universal H

ash F

unctions

2013

Link¨oping Studies in Science and Technology. Dissertations.

No. 1517

Authentication in Quantum Key Distribution:

Security Proof and Universal Hash Functions

Aysajan Abidin

 

Aysajan Abidin

Previous Dissertations at Division of Information Coding

Kronander, T: Some aspects of perception based image coding, Link¨oping Studies in Science and Technology, Dissertation No. 203, 1989

Li, H.: Low Bitrate Image Sequence Coding, Link¨oping Studies in Science and Technology, Disser-tation No. 318, 1993

Nohre, R.: Some Topics in Descriptive Compexity, Link¨oping Studies in Science and Technology, Dissertation No. 330, 1994

Novak, M.: Fractal Methods for Greyscale Image Data Compression, Link¨oping Studies in Science and Technology, Dissertation No. 481, 1997

Lundmark, A.: Hierarchical Structures and Extended Motion Information for Video Coding, Link¨oping Studies in Science and Technology, Dissertation No. 683, 2001

Wadstr¨omer, N.: Coding of Fractal Binary Images with Contractive Set Mappings Composed of

Affine Transformations, Link¨oping Studies in Science and Technology, Dissertation No. 700, 2001

Str¨om, J.: Model-Based Head Tracking and Coding, Link¨oping Studies in Science and Technology, Dissertation No. 733, 2002

Ahlberg, J.: Model-Based Coding - Extraction, Coding, and Evaluation of Face Model Parameters, Link¨oping Studies in Science and Technology, Dissertation No. 761, 2002

Klas´en, L.: Image Sequence Analysis of Complex Objects, Link¨oping Studies in Science and Tech-nology, Dissertation No. 762, 2002

Bergstr¨om, P.: Eye-Movement Controlled Image Coding, Link¨oping Studies in Science and Tech-nology, Dissertation No. 831, 2003

Linderhed, A.: Adaptive Image Compression with Wavelet Packets and Empirical Mode

Decompo-sition, Link¨oping Studies in Science and Technology, Dissertation No. 909, 2004

Viksten, F.: Local Features for Range and Vision-Based Robotic Automation, Link¨oping Studies in Science and Technology, Dissertation No. 1325, 2010

Link¨oping Studies in Science and Technology. Dissertations. No. 1517 Division of Information Coding

Department of Electrical Engineering, Link¨oping University SE-58183 Link¨oping, Sweden

www.liu.se Link¨oping, 2013

Link¨oping Studies in Science and Technology. Dissertations. No. 1517

Authentication in Quantum Key Distribution:

Security Proof and Universal Hash Functions

Aysajan Abidin

References

Related documents

However, an area is a composition of di↵erent zones (tracking, download and pre-cached), and the user can be detected to be in more than one zone, as it is illustrated in Figure 19..

Könens isärhållande leder inte bara till en asymmetri, utan oundvikligen till en hierarki där det manliga (i det här fallet småpojkar) placeras överst och där det

The mechanism of the coupling between the mass and charge transfer in electrochemical systems, and particularly in conductive polymer based system, is highly

Linköping Studies in Science and Technology Dissertation

Most of these cases however, stem from large enterprises or IT-intensive small or medium-sized enterprises (SME). The current ontology development methodologies are not tailored

SAA , intracheally injected with both 1) 4 million alveolar macrophages loaded with commercial BaSO4 contrast agent for CT or 2) 2 million alveolar macrophages loaded with GdNP as

Lärande i miljö för hållbar utveckling med naturvetenskaplig utgångspunkt En longitudinell studie i grundskolans tidigare årskurser?.

This means that the key consumption rate of authentication using SU 2 hash functions is high, because, in most well known examples of SU 2 hash function families, the key length