Cryptography and encryption aren't just for geeks and spies-they're also part of our daily lives. This book enlightens you with the basics of digital cryptography and covers the must-do practices organizations need to implement when it comes to fending off data theft and eavesdroppers. You will uncover the concepts of digital encryption and examine key digital encryption algorithms and their va…
Table of Contents 1. Introduction 2. Elements of Quantum Information Theory 3. Introducing Quantum Key Distribution 4. Quantum Conference Key Agreement 5. Quantum Key Distribution with Imperfect Devices 6. Beyond Point-to-Point Quantum Key Distribution 7. Device-Independent Quantum Cryptography 8. Conclusion and Outlook
Contents: Part I Introduction 1 Concepts in quantum shannon theory 2 Classical shannon theory Part II The quantum theory 3 The quantum theory 4 The noisy quantum theory 5 The purified quantum theory Part III Unit quantum protocols 6 Three unit quantum protocols 7 Coherent protocols 8 Unit resource capacity region Part IV Tools of quantum Shannon theory 9 Distance m…