dc.contributor.author | RĂDUCANU, Octavian | |
dc.contributor.author | BODOGA, Cristina | |
dc.date.accessioned | 2019-11-02T12:04:05Z | |
dc.date.available | 2019-11-02T12:04:05Z | |
dc.date.issued | 2019 | |
dc.identifier.citation | RĂDUCANU, Octavian, BODOGA, Cristina. Design and develop BB84 protocol. In: Electronics, Communications and Computing: extended abstracts of the 10th Intern. Conf.: the 55th anniversary of Technical University of Moldova, Chişinău, October 23-26, 2019. Chişinău, 2019, pp. 50-51. ISBN 978-9975-108-84-3. | en_US |
dc.identifier.isbn | 978-9975-108-84-3 | |
dc.identifier.uri | http://repository.utm.md/handle/5014/5908 | |
dc.description | Abstract | en_US |
dc.description.abstract | Since ancient times, methods of coding information have been used to ensure confidentiality. Roman Emperor Caesar proposed among the first a substitution-based encryption algorithm. Today it is called Caesar Cipher. The idea was simple, replacing the letters according to a key initially established and known to both the source and the recipient. Today, however, the amount of information is growing exponentially, computers have made available to mankind the computing power as it never was before. Therefore, the confidentiality of the data has been attacked. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Tehnica UTM | en_US |
dc.rights | Attribution-NonCommercial-NoDerivs 3.0 United States | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/us/ | * |
dc.subject | quantum cryptography | en_US |
dc.subject | key distribution | en_US |
dc.subject | photon | en_US |
dc.title | Design and develop BB84 protocol | en_US |
dc.type | Article | en_US |
The following license files are associated with this item: