From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Quantum oblivious transfer with relaxed constraints on the receiver., , , , и . Quantum Inf. Process., 14 (8): 3031-3040 (2015)Trojan-horse attacks on quantum key distribution with classical Bob., , и . Quantum Inf. Process., 14 (2): 681-686 (2015)A stronger participant attack on the measurement-device-independent protocol for deterministic quantum secret sharing., , , , , , и . Quantum Inf. Process., 20 (7): 1-12 (2021)Novel quantum image encryption using one-dimensional quantum cellular automata., , , , и . Inf. Sci., (2016)Relativistic quantum private database queries., , и . Quantum Inf. Process., 14 (4): 1443-1450 (2015)Simple hash function using discrete-time quantum walks., , , , , и . Quantum Inf. Process., 17 (8): 189 (2018)Deterministic secure quantum communication based on spatial encoding., , , , , , и . Quantum Inf. Process., 21 (1): 2 (2022)A lattice-based unordered certificateless aggregate signature scheme for cloud medical health monitoring system., , , и . Peer Peer Netw. Appl., 17 (1): 284-296 (января 2024)An image reranking algorithm based on discrete-time quantum walk., , , , и . Multim. Tools Appl., 83 (12): 34979-34994 (апреля 2024)Novel classical post-processing for quantum key distribution-based quantum private query., , , , , и . Quantum Inf. Process., 15 (9): 3833-3840 (2016)