Results 1 to 10 of about 235,449 (333)
From Golden to Unimodular Cryptography [PDF]
We introduce a natural generalization of the golden cryptography, which uses general unimodular matrices in place of the traditional Q-matrices, and prove that it preserves the original error correction properties of the encryption.
Koshkin, Sergiy, Styers, Taylor
core +2 more sources
A Pseudo DNA Cryptography Method [PDF]
The DNA cryptography is a new and very promising direction in cryptography research. DNA can be used in cryptography for storing and transmitting the information, as well as for computation.
Celland+20 more
core +2 more sources
A Comparison of Cryptography Courses [PDF]
The author taught two courses on cryptography, one at Duke University aimed at non-mathematics majors and one at Rose-Hulman Institute of Technology aimed at mathematics and computer science majors.
Holden, Joshua
core +2 more sources
Acknowledgment to Reviewers of Cryptography in 2021
Rigorous peer-reviews are the basis of high-quality academic publishing [...]
Cryptography Editorial Office
doaj +1 more source
Acknowledgment to Reviewers of Cryptography in 2020
Peer review is the driving force of journal development, and reviewers are gatekeepers who ensure that Cryptography maintains its standards for the high quality of its published papers [...]
Cryptography Editorial Office
doaj +1 more source
Acknowledgment to the Reviewers of Cryptography in 2022
High-quality academic publishing is built on rigorous peer review [...]
Cryptography Editorial Office
doaj +1 more source
The ideal quantum key distribution (QKD) protocol requires perfect random numbers for bit encoding and basis selecting. Perfect randomness is of great significance to the practical QKD system. However, due to the imperfection of practical quantum devices,
Xiao-Lei Jiang+6 more
doaj +1 more source
Acknowledgement to Reviewers of Cryptography in 2019
The editorial team greatly appreciates the reviewers who have dedicated their considerable time and expertise to the journal’s rigorous editorial process over the past 12 months, regardless of whether the papers are finally published or not [...]
Cryptography Editorial Office
doaj +1 more source
Sending or Not-Sending Twin-Field Quantum Key Distribution with Flawed and Leaky Sources
Twin-field quantum key distribution (TF-QKD) has attracted considerable attention and developed rapidly due to its ability to surpass the fundamental rate-distance limit of QKD.
Yi-Fei Lu+9 more
doaj +1 more source
The twin-field quantum key distribution (TF-QKD) and its variants can overcome the fundamental rate-distance limit of QKD. However, their physical implementations with the side channels remain the subject of further research.
Yi-Fei Lu+9 more
doaj +1 more source