-
GRUSKA, Jozef. From classical cryptography to quantum physics through quantum cryptography. Journal of the Indian Institute of Science. 2009, roč. 89, č. 3, s. 271-282. ISSN 0970-4140.Podrobněji: https://is.muni.cz/publication/832675/cs
-
GRUSKA, Jozef. Challenges of quantum cryptography. In ISCQI 2008 (International School and Conference on Quantum Information), Bhubaneswar, India. 2008.Podrobněji: https://is.muni.cz/publication/800641/cs
-
GRUSKA, Jozef a Jan BOUDA. New directions in quantum cryptography. In Mikulášská kryptobesídka 2008. 2008.Podrobněji: https://is.muni.cz/publication/806293/cs
-
Proposal of semiformal model of anonymity based cryptographic tasks and protocols and their analysesŠPROJCAR, Josef. Proposal of semiformal model of anonymity based cryptographic tasks and protocols and their analyses. Brno: Fakulta Informatiky, 2008.Podrobněji: https://is.muni.cz/publication/807691/cs
-
BOUDA, Jan a Mário ZIMAN. Optimality of private quantum channels. Journal of Physics A. London: IOP Publishing Limited, 2007, roč. 40, č. 20, s. 5415-5426, 11 s. ISSN 0305-4470.Podrobněji: https://is.muni.cz/publication/719846/cs
-
GRUSKA, Jozef. Security in quantum cryptography and quantum networks. In Aspects of Network and Information Security, NATO Security through Science Series, D: Information and Communication Security. Amsterdam, Netherlands: IOS Press, 2008, 2005, s. 19-46. Vol. 17. ISBN 978-1-58603-856-4.Podrobněji: https://is.muni.cz/publication/623548/cs
-
BOUDA, Jan a Vladimír BUŽEK. Encryption of Quantum Information. International Journal of Foundations of Computer Science. 2003, roč. 14, č. 5, s. 741-755. ISSN 0129-0541.Podrobněji: https://is.muni.cz/publication/490046/cs
-
GRUSKA, Jozef. Quantum Entanglement as a New Information Processing Resource. New Generation Computing. Tokyo (Japonsko): Springer-Verlag, 2003, roč. 21, č. 4, s. 279-295, 16 s. ISSN 0288-3635.Podrobněji: https://is.muni.cz/publication/555322/cs
-
GRUSKA, Jozef. Security and cryptography in 21th century. Prague: International Conference on Security of Information Systems, 2001, 8 s.Podrobněji: https://is.muni.cz/publication/483369/cs