Results 1 to 10 of about 349,432 (271)

Quantum Cryptography [PDF]

open access: yesReviews of Modern Physics, 2001
Quantum cryptography could well be the first application of quantum mechanics at the individual quanta level. The very fast progress in both theory and experiments over the recent years are reviewed, with emphasis on open questions and technological ...
Aspect, A.   +187 more
core   +11 more sources

Tropical cryptography [PDF]

open access: yesCommunications in Algebra, 2014
9 ...
Grigoriev, D., Shpilrain, V.
core   +6 more sources

Quantum Cryptography [PDF]

open access: yesContemporary Physics, 1995
Quantum cryptography is a new method for secret communications offering the ultimate security assurance of the inviolability of a Law of Nature.
Bell J. S.   +30 more
core   +2 more sources

From Golden to Unimodular Cryptography [PDF]

open access: yesChaos, Solitons and Fractals, 105 (2017) pp. 208-214, 2019
We introduce a natural generalization of the golden cryptography, which uses general unimodular matrices in place of the traditional Q-matrices, and prove that it preserves the original error correction properties of the encryption.
Koshkin, Sergiy, Styers, Taylor
core   +2 more sources

Advances in quantum cryptography [PDF]

open access: yesAdvances in Optics and Photonics, 2019
Quantum cryptography is arguably the fastest growing area in quantum information science. Novel theoretical protocols are designed on a regular basis, security proofs are constantly improving, and experiments are gradually moving from proof-of-principle ...
S. Pirandola   +17 more
semanticscholar   +14 more sources

A Pseudo DNA Cryptography Method [PDF]

open access: yes, 2009
The DNA cryptography is a new and very promising direction in cryptography research. DNA can be used in cryptography for storing and transmitting the information, as well as for computation.
Celland   +20 more
core   +2 more sources

Cryptography and the internet [PDF]

open access: bronze, 1998
After many years, cryptography is coming to the Internet. Some protocols are in common use; more are being developed and deployed. The major issue has been one of cryptographic engineering: turning academic papers into a secure, implementable specification.
Steven M. Bellovin
openalex   +4 more sources

Neural Cryptography

open access: yesProceedings of the 9th International Conference on Neural Information Processing, 2002. ICONIP '02., 2002
Two neural networks which are trained on their mutual output bits show a novel phenomenon: The networks synchronize to a state with identical time dependent weights.
Kanter, Ido, Kinzel, Wolfgang
core   +3 more sources

Cryptography

open access: yesSecurity Engineering, 2020
The word cryptography was coined from two Greek words ‘Krypto’, meaning hidden and ‘graphein’ meaning writing. Thus, cryptography means hidden writing.
Biswanath Ghosh   +4 more
semanticscholar   +3 more sources

Cryptography

open access: yesWiley Encyclopedia of Computer Science and Engineering, 2019
: Critical Infrastructures (CIs), such as healthcare facilities, power grids, transportation systems, and financial institutions, are vital components of a functioning society, with the economy and safety being dependent on them.
Jonathan Katz
semanticscholar   +2 more sources

Home - About - Disclaimer - Privacy