Matches in DBpedia 2016-04 for { <http://wikidata.dbpedia.org/resource/Q7047762> ?p ?o }
Showing triples 1 to 39 of
39
with 100 triples per page.
- Q7047762 subject Q6121277.
- Q7047762 subject Q8614210.
- Q7047762 abstract "The noisy-storage model refers to a cryptographic model employed in quantum cryptography. It assumes that the quantum memory device of an attacker (adversary) trying to break the protocol is imperfect (noisy). The main goal of this model is to enable the secure implementation of two-party cryptographic primitives, such as bit commitment, oblivious transfer and secure identification.".
- Q7047762 wikiPageWikiLink Q1027298.
- Q7047762 wikiPageWikiLink Q1062839.
- Q7047762 wikiPageWikiLink Q1115684.
- Q7047762 wikiPageWikiLink Q120462.
- Q7047762 wikiPageWikiLink Q12503.
- Q7047762 wikiPageWikiLink Q131222.
- Q7047762 wikiPageWikiLink Q17160413.
- Q7047762 wikiPageWikiLink Q2122176.
- Q7047762 wikiPageWikiLink Q2122216.
- Q7047762 wikiPageWikiLink Q2122243.
- Q7047762 wikiPageWikiLink Q230883.
- Q7047762 wikiPageWikiLink Q2345282.
- Q7047762 wikiPageWikiLink Q2566969.
- Q7047762 wikiPageWikiLink Q2825412.
- Q7047762 wikiPageWikiLink Q2915383.
- Q7047762 wikiPageWikiLink Q320769.
- Q7047762 wikiPageWikiLink Q378201.
- Q7047762 wikiPageWikiLink Q4117218.
- Q7047762 wikiPageWikiLink Q41349.
- Q7047762 wikiPageWikiLink Q471771.
- Q7047762 wikiPageWikiLink Q471906.
- Q7047762 wikiPageWikiLink Q4846249.
- Q7047762 wikiPageWikiLink Q49008.
- Q7047762 wikiPageWikiLink Q5128319.
- Q7047762 wikiPageWikiLink Q5157320.
- Q7047762 wikiPageWikiLink Q5988349.
- Q7047762 wikiPageWikiLink Q6121277.
- Q7047762 wikiPageWikiLink Q6517045.
- Q7047762 wikiPageWikiLink Q7251920.
- Q7047762 wikiPageWikiLink Q7269015.
- Q7047762 wikiPageWikiLink Q7269033.
- Q7047762 wikiPageWikiLink Q7444883.
- Q7047762 wikiPageWikiLink Q8614210.
- Q7047762 wikiPageWikiLink Q989220.
- Q7047762 comment "The noisy-storage model refers to a cryptographic model employed in quantum cryptography. It assumes that the quantum memory device of an attacker (adversary) trying to break the protocol is imperfect (noisy). The main goal of this model is to enable the secure implementation of two-party cryptographic primitives, such as bit commitment, oblivious transfer and secure identification.".
- Q7047762 label "Noisy-storage model".