Results 11 to 20 of about 34 (24)

Scientometric dimensions of cryptographic research [PDF]

open access: yes, 2015
Information security has been a crucial issue in modern information management; thus cryptographic techniques have become inevitable to safeguard the digital information assets as well as to defend the invasion of privacy in modern information society ...
Pal, Jiban K.
core   +1 more source

Private quantum codes: introduction and connection with higher rank numerical ranges

open access: yes, 2013
We give a brief introduction to private quantum codes, a basic notion in quantum cryptography and key distribution. Private code states are characterized by indistinguishability of their output states under the action of a quantum channel, and we show ...
Kribs, D. W., Plosker, S.
core   +1 more source

Quantum Privacy and Schur Product Channels

open access: yes, 2017
We investigate the quantum privacy properties of an important class of quantum chan-nels, by making use of a connection with Schur product matrix operations and associated correlationmatrix structures.
Kribs, David W.   +2 more
core   +1 more source

Post-Quantum Key Agreement Protocol based on Non-Square Integer Matrices

open access: yes, 2023
We present in this paper an algorithm for exchanging session keys, coupled with a hashing encryption module. We show schemes designed for their potential invulnerability to classical and quantum attacks.
Hecht, Juan Pedro, Scolnik, Hugo Daniel
core  

A Post Quantum Key Agreement Protocol Based on a Modified Matrix Power Function over a Rectangular Matrices Semiring

open access: yes, 2023
We present an improved post quantum version of Sakalauskas matrix power function key agreement protocol, using rectangular matrices instead of the original square ones. Sakalauskas matrix power function is an efficient and secure way to generate a shared
Hecht, Juan Pedro, Scolnik, Hugo Daniel
core  

Atac quàntic a la criptografia amb corbes el·líptiques [PDF]

open access: yes, 2020
Treballs Finals de Grau de Matemàtiques, Facultat de Matemàtiques, Universitat de Barcelona, Any: 2020, Director: Elois Sans Gispert[en] Generally, the majority of classical cryptography methods that use elliptical curves are based on the difficulty of ...
Canal Guitart, Laia
core  

Approximate Quasiorthogonality of Operator Algebras and Relative Quantum Privacy [PDF]

open access: yes, 2019
We show that the approximate quasiorthogonality of two operator algebras is equivalent to the algebras being approximately private relative to their conditional expectation quantum channels.
Kribs, David W.   +4 more
core   +1 more source

4-bit crypto S-boxes: Generation with irreducible polynomials over Galois field GF(24) and cryptanalysis. [PDF]

open access: yes, 2018
4-bit crypto S-boxes play a significant role in encryption and decryption of many cipher algorithms from last 4 decades. Generation and cryptanalysis of generated 4-bit crypto S-boxes is one of the major concerns of modern cryptography till now.
Ranjan Ghosh, Sankhanil Dey
core  

A multi-channel quantum image representation model with qubit sequences for quantum-inspired image and image retrieval [PDF]

open access: yes
Quantum image processing (QIP) has become one of the most significant fields in quantum computing (QC); it merges quantum mechanics with image processing to improve classical image-processing speed, which involves various operations to advance quantum ...
Nadia M. G. Al-Saidi   +4 more
core   +1 more source

Multivariate Cryptography with Mappings of Discrete Logarithms and Polynomials [PDF]

open access: yes, 2018
In this paper, algorithms for multivariate public key cryptography and digital signature are described. Plain messages and encrypted messages are arrays, consisting of elements from a fixed finite ring or field.
Duggirala Meher Krishna, Duggirala Ravi
core   +1 more source

Home - About - Disclaimer - Privacy