-
9.1 Evading impossibility
-
9.2 The noisy storage model
-
9.3 A simple protocol for 1-2 oblivious transfer in the noisy-storage model
-
9.4 Security from quantum uncertainty
-
9.5 A universal primitive: weak string erasure
This site uses cookies. Click here for more information
Quantum Cryptography
Home Courses Quantum Cryptography Subjects 09. Perfect security from physical assumptions
Help us improve the OCW website of TU Delft by answering a few short questions.
Filling out this survey will take approximately 5 minutes.