Results 11 to 20 of about 34 (24)
Scientometric dimensions of cryptographic research [PDF]
Information security has been a crucial issue in modern information management; thus cryptographic techniques have become inevitable to safeguard the digital information assets as well as to defend the invasion of privacy in modern information society ...
Pal, Jiban K.
core +1 more source
Private quantum codes: introduction and connection with higher rank numerical ranges
We give a brief introduction to private quantum codes, a basic notion in quantum cryptography and key distribution. Private code states are characterized by indistinguishability of their output states under the action of a quantum channel, and we show ...
Kribs, D. W., Plosker, S.
core +1 more source
Quantum Privacy and Schur Product Channels
We investigate the quantum privacy properties of an important class of quantum chan-nels, by making use of a connection with Schur product matrix operations and associated correlationmatrix structures.
Kribs, David W. +2 more
core +1 more source
Post-Quantum Key Agreement Protocol based on Non-Square Integer Matrices
We present in this paper an algorithm for exchanging session keys, coupled with a hashing encryption module. We show schemes designed for their potential invulnerability to classical and quantum attacks.
Hecht, Juan Pedro, Scolnik, Hugo Daniel
core
We present an improved post quantum version of Sakalauskas matrix power function key agreement protocol, using rectangular matrices instead of the original square ones. Sakalauskas matrix power function is an efficient and secure way to generate a shared
Hecht, Juan Pedro, Scolnik, Hugo Daniel
core
Atac quàntic a la criptografia amb corbes el·líptiques [PDF]
Treballs Finals de Grau de Matemàtiques, Facultat de Matemàtiques, Universitat de Barcelona, Any: 2020, Director: Elois Sans Gispert[en] Generally, the majority of classical cryptography methods that use elliptical curves are based on the difficulty of ...
Canal Guitart, Laia
core
Approximate Quasiorthogonality of Operator Algebras and Relative Quantum Privacy [PDF]
We show that the approximate quasiorthogonality of two operator algebras is equivalent to the algebras being approximately private relative to their conditional expectation quantum channels.
Kribs, David W. +4 more
core +1 more source
4-bit crypto S-boxes: Generation with irreducible polynomials over Galois field GF(24) and cryptanalysis. [PDF]
4-bit crypto S-boxes play a significant role in encryption and decryption of many cipher algorithms from last 4 decades. Generation and cryptanalysis of generated 4-bit crypto S-boxes is one of the major concerns of modern cryptography till now.
Ranjan Ghosh, Sankhanil Dey
core
A multi-channel quantum image representation model with qubit sequences for quantum-inspired image and image retrieval [PDF]
Quantum image processing (QIP) has become one of the most significant fields in quantum computing (QC); it merges quantum mechanics with image processing to improve classical image-processing speed, which involves various operations to advance quantum ...
Nadia M. G. Al-Saidi +4 more
core +1 more source
Multivariate Cryptography with Mappings of Discrete Logarithms and Polynomials [PDF]
In this paper, algorithms for multivariate public key cryptography and digital signature are described. Plain messages and encrypted messages are arrays, consisting of elements from a fixed finite ring or field.
Duggirala Meher Krishna, Duggirala Ravi
core +1 more source

