• 量子保密通信
  • 量子保密通信
  • 量子保密通信
  • 量子保密通信
  • 量子保密通信
  • 量子保密通信
  • 量子保密通信
  • 量子保密通信
  • 量子保密通信
  • 量子保密通信
21年品牌 40万+商家 超1.5亿件商品

量子保密通信

精装内页干净外品如图细看

10 1.7折 59 九品

仅1件

北京顺义
认证卖家担保交易快速发货售后保障

作者曾贵华 著

出版社高等教育出版社

出版时间2010-01

版次1

装帧精装

货号K8

上书时间2024-06-25

慧源书社

七年老店
已实名 已认证 进店 收藏店铺

   商品详情   

品相描述:九品
图书标准信息
  • 作者 曾贵华 著
  • 出版社 高等教育出版社
  • 出版时间 2010-01
  • 版次 1
  • ISBN 9787040254792
  • 定价 59.00元
  • 装帧 精装
  • 开本 16开
  • 纸张 胶版纸
  • 页数 368页
  • 字数 450千字
  • 正文语种 英语
  • 丛书 信息安全系列丛书
【内容简介】
QuantumPrivateCommunicationcoversthefundamentalsoftheareasofsecurecommunication,quantumcryptography,quantumcommunication,andtheirphysicalimplementationwithapplications.Thebookappearsinatimelymannerforanemergingfieldatthecrossroadofclassicprivatecommunicationandquantumphysics.
Graduatestudentsandscientistsalikeincommunicationengineering,computerscience,electronicengineering,physicsandmathematicswillbenefitfromthebook.
【作者简介】
ProfessorGuihuaZengteachesandconductsresearchattheDepartmentofElectronicEngineeringofShanghaiJiaoTongUniversityandspentanAlexandervonHumboldtFellowshipattheUniversityofFreiburg,Germany.
【目录】
1Introduction
1.1SecurityRequirementsofCommunication
1.2OverviewofQuantumPrivateCommunication
1.3PrivateCommunicationModels
1.3.1ClassicSecureCommunicationModel
1.3.2QuantumPrivateCommunicationModel
1.4HistoryofQuantumPrivateCommunication
1.5RelationshipwithOtherSubjects
1.6NotationsandConventions
1.6.1RandomVariables
1.6.2CryptosystemandCipher
References

2QuantumSecurityTheory
2.1Introduction
2.2MathematicalBackground
2.2.1HilbertSpace
2.2.2PropertiesofHilbertSpace
2.2.3Operators
2.2.4SeveralImportantOperators
2.2.5MatricesDecomposition
2.3IntroductiontoQuantumMechanics
2.3.1QuantumSystems
2.3.2DynamicCharacteristicsofQuantumSystems
2.3.3InformationRetrievalofQuantumSystems
2.3.4FundamentofQuantumOptics
2.4IntroductiontoInformationTheory
2.4.1Entropy
2.4.2MutualInformation
2.4.3QuantumFanoInequality
2.5IntroductiontoComplexityTheory
2.5.1TuringMachine
2.5.2ClassicComplexity
2.5.3QuantumComplexity
2.6SecurityModel
2.6.1Information-theoreticSecurity
2.6.2ComputationalSecurity
2.6.3AttackStrategyAnalysis
References

3QuantumBits
3.1ClassicBits
3.2QuantumBitDefinition
3.2.1BinaryQubit
3.2.2P-aryQubit
3.2.3CompositeQubit
3.3QuantumBitTransformation
3.3.1QuantumLogicGates
3.3.2QuantumCircuits
3.4MathematicalProperty
3.4.1BlochSphere
3.4.2OrthogonalityofOppositePoints
3.4.3RotationsonBlochSphere
3.5PhysicalProperty
3.5.1Superposition
3.5.2Entanglement
3.5.3Distinguishability
3.5.4QuantumNo-cloning
3.6InformationProperty
3.6.1SingleQubitInformation
3.6.2NonorthogonalQubitsInformation
References

4QuantumKeyDistribution
4.1IntuitiononQKD
4.2StandardQKDSchemes
4.2.1BB84Protocol
4.2.2B92Protocol
4.3QuantumCommunicationModelforQKD
4.3.1QuantumSource
4.3.2QuantumChannel
4.3.3QuantumSink
4.4Reconciliation
4.4.1ReconciliationModel
4.4.2BinaryReconciliationProtocol
4.4.3Non-BinaryReconciliationProtocol
4.5PrivacyAmplification
4.5.1PrivacyAmplificationPrinciple
4.5.2PrivacyAmplificationTechniques
4.6SecurityModelforQKD
4.6.1SecurityTheory
4.6.2TypicalAttackStrategies
References

5QuantumCryptosystem
5.1Introduction
5.2QKD-basedCryptosystem
5.3QuantumVernamCipher
5.3.1ClassicVernamAlgorithm
5.3.2QuantumVernamCipher
5.3.3PrivateQuantumChannel
5.3.4SecurityModel
5.4TypicalQuantumVernamCiphers
5.4.1Classic-key-basedQuantumVernamCipher
5.4.2Bell-key-basedQuantumVernamCipher
5.4.3TeleportationasQuantumVernamCipher
5.5QuantumBlockCipher
5.5.1TheoreticalModel
5.5.2QuantumBlockAlgorithmforBinaryBits
5.6QuantumPublicKeyCryptosystem
5.7TypicalQuantumPublic-keyAlgorithms
5.7.1AlgorithmbasedSubset-sumProblem
5.7.2AlgorithmbasedQuantumCoding
References

6QuantumAuthentication
6.1Introduction
6.2AuthenticationTheory
6.2.1AuthenticationCategories
6.2.2SecurityModel
6.3MessageAuthenticationCode
6.3.1EncodingApproach
6.3.2HashFunctionApproach
6.4QuantumIdentityAuthentication
6.4.1SchemeDescription
6.4.2SecurityAnalysis
6.4.3InImperfectChannel
6.5QuantumSignaturePrinciple
6.6ArbitratedQuantumSignature
6.6.1AlgorithmDescription
6.6.2SecurityAnalysis
6.7TrueQuantumSignature
6.7.1AlgorithmDescription
6.7.2SecurityAnalysis
……
Index
点击展开 点击收起

   相关推荐   

—  没有更多了  —

以下为对购买帮助不大的评价

此功能需要访问孔网APP才能使用
暂时不用
打开孔网APP