Results 11 to 20 of about 34 (24)
Quantum Privacy and Schur Product Channels
We investigate the quantum privacy properties of an important class of quantum chan-nels, by making use of a connection with Schur product matrix operations and associated correlationmatrix structures.
Kribs, David W. +2 more
core +1 more source
We present an improved post quantum version of Sakalauskas matrix power function key agreement protocol, using rectangular matrices instead of the original square ones. Sakalauskas matrix power function is an efficient and secure way to generate a shared
Hecht, Juan Pedro, Scolnik, Hugo Daniel
core
The dihedral hidden subgroup problem
The hidden subgroup problem (HSP) is a cornerstone problem in quantum computing, which captures many problems of interest and provides a standard framework algorithm for their study based on Fourier sampling, one class of techniques known to provide ...
Chen Imin, Sun David
doaj +1 more source
Post-Quantum Key Agreement Protocol based on Non-Square Integer Matrices
We present in this paper an algorithm for exchanging session keys, coupled with a hashing encryption module. We show schemes designed for their potential invulnerability to classical and quantum attacks.
Hecht, Juan Pedro, Scolnik, Hugo Daniel
core
Atac quàntic a la criptografia amb corbes el·líptiques [PDF]
Treballs Finals de Grau de Matemàtiques, Facultat de Matemàtiques, Universitat de Barcelona, Any: 2020, Director: Elois Sans Gispert[en] Generally, the majority of classical cryptography methods that use elliptical curves are based on the difficulty of ...
Canal Guitart, Laia
core
Approximate Quasiorthogonality of Operator Algebras and Relative Quantum Privacy [PDF]
We show that the approximate quasiorthogonality of two operator algebras is equivalent to the algebras being approximately private relative to their conditional expectation quantum channels.
Kribs, David W. +4 more
core +1 more source
4-bit crypto S-boxes: Generation with irreducible polynomials over Galois field GF(24) and cryptanalysis. [PDF]
4-bit crypto S-boxes play a significant role in encryption and decryption of many cipher algorithms from last 4 decades. Generation and cryptanalysis of generated 4-bit crypto S-boxes is one of the major concerns of modern cryptography till now.
Ranjan Ghosh, Sankhanil Dey
core
A multi-channel quantum image representation model with qubit sequences for quantum-inspired image and image retrieval [PDF]
Quantum image processing (QIP) has become one of the most significant fields in quantum computing (QC); it merges quantum mechanics with image processing to improve classical image-processing speed, which involves various operations to advance quantum ...
Nadia M. G. Al-Saidi +4 more
core +1 more source
Multivariate Cryptography with Mappings of Discrete Logarithms and Polynomials [PDF]
In this paper, algorithms for multivariate public key cryptography and digital signature are described. Plain messages and encrypted messages are arrays, consisting of elements from a fixed finite ring or field.
Duggirala Meher Krishna, Duggirala Ravi
core +1 more source
Simple and tight device-independent security proofs [PDF]
Device-independent security is the gold standard for quantum cryptography: not only is security based entirely on the laws of quantum mechanics, but it holds irrespective of any a priori assumptions on the quantum devices used in a protocol, making it ...
Arnon-Friedman, Rotem +2 more
core

