Results 1 to 10 of about 336,709 (366)

Quantum Cryptography [PDF]

open access: yesReviews of Modern Physics, 2001
Quantum cryptography could well be the first application of quantum mechanics at the individual quanta level. The very fast progress in both theory and experiments over the recent years are reviewed, with emphasis on open questions and technological ...
Aspect, A.   +187 more
core   +11 more sources

From Golden to Unimodular Cryptography [PDF]

open access: yesChaos, Solitons and Fractals, 105 (2017) pp. 208-214, 2019
We introduce a natural generalization of the golden cryptography, which uses general unimodular matrices in place of the traditional Q-matrices, and prove that it preserves the original error correction properties of the encryption. Moreover, the additional parameters involved in generating the coding matrices make this unimodular cryptography ...
Koshkin, Sergiy, Styers, Taylor
arxiv   +3 more sources

A Pseudo DNA Cryptography Method [PDF]

open access: yes, 2009
The DNA cryptography is a new and very promising direction in cryptography research. DNA can be used in cryptography for storing and transmitting the information, as well as for computation. Although in its primitive stage, DNA cryptography is shown to be very effective.
Celland   +20 more
arxiv   +3 more sources

A Secure Data Sharing Model Utilizing Attribute-Based Signcryption in Blockchain Technology [PDF]

open access: yesSensors
With the rapid development of the Internet of Things (IoT), the scope of personal data sharing has significantly increased, enhancing convenience in daily life and optimizing resource management.
Chaoyue Song   +3 more
doaj   +2 more sources

Acknowledgment to Reviewers of Cryptography in 2021

open access: yesCryptography, 2022
Rigorous peer-reviews are the basis of high-quality academic publishing [...]
Cryptography Editorial Office
doaj   +1 more source

Acknowledgment to Reviewers of Cryptography in 2020

open access: yesCryptography, 2021
Peer review is the driving force of journal development, and reviewers are gatekeepers who ensure that Cryptography maintains its standards for the high quality of its published papers [...]
Cryptography Editorial Office
doaj   +1 more source

Acknowledgment to the Reviewers of Cryptography in 2022

open access: yesCryptography, 2023
High-quality academic publishing is built on rigorous peer review [...]
Cryptography Editorial Office
doaj   +1 more source

Status report on the third round of the NIST post-quantum cryptography standardization process

open access: yesRadiotekhnika, 2022
In recent years, there has been steady progress in the creation of quantum computers. If large-scale quantum computers are implemented, they will threaten the security of many widely used public-key cryptosystems.
M.V. Yesina   +2 more
semanticscholar   +1 more source

Divertible protocols and atomic proxy cryptography

open access: bronzeInternational Conference on the Theory and Application of Cryptographic Techniques, 1998
Matt Blaze   +2 more
openalex   +2 more sources

Weak Randomness Analysis of Measurement-Device-Independent Quantum Key Distribution with Finite Resources

open access: yesPhotonics, 2022
The ideal quantum key distribution (QKD) protocol requires perfect random numbers for bit encoding and basis selecting. Perfect randomness is of great significance to the practical QKD system. However, due to the imperfection of practical quantum devices,
Xiao-Lei Jiang   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy