Results 11 to 20 of about 34 (24)

Quantum Privacy and Schur Product Channels

open access: yes, 2017
We investigate the quantum privacy properties of an important class of quantum chan-nels, by making use of a connection with Schur product matrix operations and associated correlationmatrix structures.
Kribs, David W.   +2 more
core   +1 more source

A Post Quantum Key Agreement Protocol Based on a Modified Matrix Power Function over a Rectangular Matrices Semiring

open access: yes, 2023
We present an improved post quantum version of Sakalauskas matrix power function key agreement protocol, using rectangular matrices instead of the original square ones. Sakalauskas matrix power function is an efficient and secure way to generate a shared
Hecht, Juan Pedro, Scolnik, Hugo Daniel
core  

The dihedral hidden subgroup problem

open access: yesJournal of Mathematical Cryptology
The hidden subgroup problem (HSP) is a cornerstone problem in quantum computing, which captures many problems of interest and provides a standard framework algorithm for their study based on Fourier sampling, one class of techniques known to provide ...
Chen Imin, Sun David
doaj   +1 more source

Post-Quantum Key Agreement Protocol based on Non-Square Integer Matrices

open access: yes, 2023
We present in this paper an algorithm for exchanging session keys, coupled with a hashing encryption module. We show schemes designed for their potential invulnerability to classical and quantum attacks.
Hecht, Juan Pedro, Scolnik, Hugo Daniel
core  

Atac quàntic a la criptografia amb corbes el·líptiques [PDF]

open access: yes, 2020
Treballs Finals de Grau de Matemàtiques, Facultat de Matemàtiques, Universitat de Barcelona, Any: 2020, Director: Elois Sans Gispert[en] Generally, the majority of classical cryptography methods that use elliptical curves are based on the difficulty of ...
Canal Guitart, Laia
core  

Approximate Quasiorthogonality of Operator Algebras and Relative Quantum Privacy [PDF]

open access: yes, 2019
We show that the approximate quasiorthogonality of two operator algebras is equivalent to the algebras being approximately private relative to their conditional expectation quantum channels.
Kribs, David W.   +4 more
core   +1 more source

4-bit crypto S-boxes: Generation with irreducible polynomials over Galois field GF(24) and cryptanalysis. [PDF]

open access: yes, 2018
4-bit crypto S-boxes play a significant role in encryption and decryption of many cipher algorithms from last 4 decades. Generation and cryptanalysis of generated 4-bit crypto S-boxes is one of the major concerns of modern cryptography till now.
Ranjan Ghosh, Sankhanil Dey
core  

A multi-channel quantum image representation model with qubit sequences for quantum-inspired image and image retrieval [PDF]

open access: yes
Quantum image processing (QIP) has become one of the most significant fields in quantum computing (QC); it merges quantum mechanics with image processing to improve classical image-processing speed, which involves various operations to advance quantum ...
Nadia M. G. Al-Saidi   +4 more
core   +1 more source

Multivariate Cryptography with Mappings of Discrete Logarithms and Polynomials [PDF]

open access: yes, 2018
In this paper, algorithms for multivariate public key cryptography and digital signature are described. Plain messages and encrypted messages are arrays, consisting of elements from a fixed finite ring or field.
Duggirala Meher Krishna, Duggirala Ravi
core   +1 more source

Simple and tight device-independent security proofs [PDF]

open access: yes, 2019
Device-independent security is the gold standard for quantum cryptography: not only is security based entirely on the laws of quantum mechanics, but it holds irrespective of any a priori assumptions on the quantum devices used in a protocol, making it ...
Arnon-Friedman, Rotem   +2 more
core  

Home - About - Disclaimer - Privacy