The interlock protocol cannot save quantum cryptography from man-in-the-middle attacks

Type: Article

Publication Date: 2005-01-12

Citations: 2

Locations

  • arXiv (Cornell University) - View

Similar Works

Action Title Year Authors
+ Feasibility of the interlock protocol against man-in-the-middle attacks on quantum cryptography 2005 Karl Svozil
+ PDF Chat FEASIBILITY OF THE INTERLOCK PROTOCOL AGAINST MAN-IN-THE-MIDDLE ATTACKS ON QUANTUM CRYPTOGRAPHY 2005 Karl Svozil
+ PDF Chat A New Spin on Quantum Cryptography: Avoiding Trapdoors and Embracing Public Keys 2011 Lawrence M. Ioannou
Michele Mosca
+ Post-Quantum Cryptography: tomorrow’s security 2018 Jean-Christophe Deneuville
+ PDF Chat Insider-Proof Encryption with Applications for Quantum Key Distribution 2014 Matthew McKague
Lana Sheridan
+ Algorithmic Security is Insufficient: A Comprehensive Survey on Implementation Attacks Haunting Post-Quantum Security 2023 Alvaro Cintas Canto
Jasmin Kaur
Mehran Mozaffari Kermani
Reza Azarderakhsh
+ A Novel Protocol-Authentication Algorithm Ruling Out a Man-in-the-Middle Attack in Quantum Cryptography 2004 Momtchil Peev
Michael Nölle
O. Maurhardt
Thomas Lorünser
Martin Suda
Andreas Poppe
Rupert Ursin
Alessandro Fedrizzi
Anton Zeilinger
+ PDF Chat A NOVEL PROTOCOL-AUTHENTICATION ALGORITHM RULING OUT A MAN-IN-THE MIDDLE ATTACK IN QUANTUM CRYPTOGRAPHY 2004 Momtchil Peev
Michael Nölle
O. Maurhardt
Thomas Lorünser
Martin Suda
Andreas Poppe
Rupert Ursin
Alessandro Fedrizzi
A. Zeilinger
+ PDF Chat Quantum Authentication with Key Recycling 2017 Christopher Portmann
+ PDF Chat Quantum Authentication and Encryption with Key Recycling 2017 Serge Fehr
Louis Salvail
+ Breaking the Unbreakable: Exploiting Loopholes in Bell’s Theorem to Hack Quantum Cryptography 2017 Jonathan Jogenfors
+ Envisioning the Future of Cyber Security in Post-Quantum Era: A Survey on PQ Standardization, Applications, Challenges and Opportunities 2023 Saleh Darzi
Kasra Ahmadi
Saeed Aghapour
Attila A. Yavuz
Mehran Mozaffari Kermani
+ Quantum Cryptography: from Theory to Practice 2007 Hoi‐Kwong Lo
Norbert Lütkenhaus
+ PDF Chat Decoherence can help quantum cryptographic security 2018 Vishal Sharma
U. Shrikant
R. Srikanth
Subhashish Banerjee
+ PDF Chat Sharing a quantum secret without a trusted party 2010 Qin Li
Dong Yang Long
Wai Hong Chan
Daowen Qiu
+ PDF Chat Semi-quantum cryptography 2020 Hasan Iqbal
Walter O. Krawec
+ Quantum Cryptography - securing our future society 2017 Mikio Fujiwara
+ PDF Chat Quantum Non-malleability and Authentication 2017 Gorjan Alagic
Christian Majenz
+ PDF Chat Insecurity of imperfect quantum bit seal 2006 H. F. Chau
+ PDF Chat Post-quantum Cryptography: Code-Based Signatures 2010 Pierre-Louis Cayrel
Mohammed Meziani

Works That Cite This (1)

Action Title Year Authors
+ PDF Chat A Three-Stage Quantum Cryptography Protocol 2006 Subhash Kak

Works Cited by This (0)

Action Title Year Authors