Results 1 to 10 of about 212,764 (321)

Quantum Cryptography [PDF]

open access: yesContemporary Physics, 1995
Quantum cryptography is a new method for secret communications offering the ultimate security assurance of the inviolability of a Law of Nature.
Bell J. S.   +30 more
core   +2 more sources

Quantum Cryptography [PDF]

open access: yesReviews of Modern Physics, 2001
Quantum cryptography could well be the first application of quantum mechanics at the individual quanta level. The very fast progress in both theory and experiments over the recent years are reviewed, with emphasis on open questions and technological ...
Aspect, A.   +187 more
core   +9 more sources

Acknowledgment to Reviewers of Cryptography in 2021

open access: yesCryptography, 2022
Rigorous peer-reviews are the basis of high-quality academic publishing [...]
Cryptography Editorial Office
doaj   +1 more source

Acknowledgment to Reviewers of Cryptography in 2020

open access: yesCryptography, 2021
Peer review is the driving force of journal development, and reviewers are gatekeepers who ensure that Cryptography maintains its standards for the high quality of its published papers [...]
Cryptography Editorial Office
doaj   +1 more source

Acknowledgment to the Reviewers of Cryptography in 2022

open access: yesCryptography, 2023
High-quality academic publishing is built on rigorous peer review [...]
Cryptography Editorial Office
doaj   +1 more source

Tropical Cryptography [PDF]

open access: yesCommunications in Algebra, 2014
9 ...
Grigoriev, D., Shpilrain, V.
openaire   +4 more sources

Arithmetic Cryptography [PDF]

open access: yesJournal of the ACM, 2017
We study the possibility of computing cryptographic primitives in a fully black-box arithmetic model over a finite field F . In this model, the input to a cryptographic primitive (e.g., encryption scheme) is given as a sequence of field elements, the honest parties are implemented by arithmetic circuits that make ...
Benny Applebaum   +2 more
openaire   +1 more source

Acknowledgement to Reviewers of Cryptography in 2019

open access: yesCryptography, 2020
The editorial team greatly appreciates the reviewers who have dedicated their considerable time and expertise to the journal’s rigorous editorial process over the past 12 months, regardless of whether the papers are finally published or not [...]
Cryptography Editorial Office
doaj   +1 more source

Post-Quantum Cryptography [PDF]

open access: yesNature, 2011
Cryptography is essential for the security of online communication, cars and implanted medical devices. However, many commonly used cryptosystems will be completely broken once large quantum computers exist. Post-quantum cryptography is cryptography under the assumption that the attacker has a large quantum computer; post-quantum cryptosystems strive ...
Bernstein, Daniel J., Lange, Tanja
openaire   +3 more sources

Lattice Enumeration with Discrete Pruning: Improvements, Cost Estimation and Optimal Parameters

open access: yesMathematics, 2023
Lattice enumeration is a linear-space algorithm for solving the shortest lattice vector problem (SVP). Extreme pruning is a practical technique for accelerating lattice enumeration, which has a mature theoretical analysis and practical implementation ...
Luan Luan   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy