Results 1 to 10 of about 1,726,359 (308)
Autonomous recognition of erroneous raw key bit bias in quantum key distribution [PDF]
As quantum key distribution technologies mature, it is pertinent to consider these systems in contexts beyond lab settings, and how these systems may have to operate autonomously.
Matt Young +2 more
doaj +4 more sources
MOBS: Matrices Over Bit Strings Public Key Exchange [PDF]
We use matrices over bit strings as platforms for Diffie-Hellman-like public key exchange protocols. When multiplying matrices like that, we use Boolean OR operation on bit strings in place of addition and Boolean AND operation in place of multiplication.
Nael Rahman, Vladimir Shpilrain
openaire +4 more sources
Key Distillation and the Secret-Bit Fraction [PDF]
We consider distillation of secret bits from partially secret noisy correlations P_ABE, shared between two honest parties and an eavesdropper. The most studied distillation scenario consists of joint operations on a large number of copies of the ...
Jones, Nick S., Masanes, Lluis
core +2 more sources
Qubit and bit-based quantum hybrid secret key generation [PDF]
Abstract For the generation of a secret key, hardly a quantum algorithms integrating states and bits have yet developed. Integrating random states and bits is difficult for a combiner component. The underlying problems of the study are the design of a quantum circuit, an algorithm, state polarization setup, and the concatenation of bits and ...
Shyam R. Sihare
openaire +2 more sources
Compressed Secret Key Agreement:Maximizing Multivariate Mutual Information per Bit [PDF]
The multiterminal secret key agreement problem by public discussion is formulated with an additional source compression step where, prior to the public discussion phase, users independently compress their private sources to filter out strongly correlated
Chung Chan
doaj +3 more sources
NEW KEY EXPANSION FUNCTION OF RIJNDAEL 128-BIT RESISTANCE TO THE RELATED-KEY ATTACKS
A master key of special length is manipulated based on the key schedule to create round sub-keys in most block ciphers. A strong key schedule is described as a cipher that will be more resistant to various forms of attacks, especially in related-key ...
Hassan Mansur Hussien +2 more
doaj +3 more sources
Are 128 Bits Long Keys Possible in Watermarking? [PDF]
The question raised in this poster is the following: is the key length of a watermarking system proportional to the key length of the seed used to generate the watermark? For example, if a watermark is generated from a binary sequence of size n, does it means that the key length is 2n?
Bas, Patrick, Furon, Teddy
openaire +3 more sources
Asynchronous-bit-rate differential phase-shift-keying [PDF]
An adaptive differential-phase-shifting (DPS) quantum key distribution (QKD) protocol improved by encoding asynchronous-bit-rate with harmonic clock tunability, decoded by shortened delay-line interferometer (DLI) with enhancing stability, and received by single-photon detection with long hold-off is demonstrated to realize low-erroneous transmission ...
You-Cheng Lin +11 more
openaire +3 more sources
Proposing A Symmetric Key Bit-Level Block Cipher [PDF]
A novel bit level block cipher based symmetric key cryptographic technique using G.C.D is proposed in this research paper. Entire plain text file is read one character at a time and according to the binary representation of ASCII value of the characters, entire plain text file is divided into n number of 16 bit blocks. Then an agreed-upon symmetric key
Manna, Sarbajit, Dutta, Saurabh
openaire +3 more sources
Continuous operation of high bit rate quantum key distribution [PDF]
We demonstrate a quantum key distribution with a secure bit rate exceeding 1 Mbit/s over 50 km fiber averaged over a continuous 36-hours period. Continuous operation of high bit rates is achieved using feedback systems to control path length difference ...
, +5 more
core +2 more sources

