Results 1 to 10 of about 180,085 (154)
Quantum cryptography could well be the first application of quantum mechanics at the individual quanta level. The very fast progress in both theory and experiments over the recent years are reviewed, with emphasis on open questions and technological ...
Aspect, A. +187 more
core +9 more sources
Acknowledgment to Reviewers of Cryptography in 2021
Rigorous peer-reviews are the basis of high-quality academic publishing [...]
Cryptography Editorial Office
doaj +1 more source
Acknowledgment to Reviewers of Cryptography in 2020
Peer review is the driving force of journal development, and reviewers are gatekeepers who ensure that Cryptography maintains its standards for the high quality of its published papers [...]
Cryptography Editorial Office
doaj +1 more source
Acknowledgment to the Reviewers of Cryptography in 2022
High-quality academic publishing is built on rigorous peer review [...]
Cryptography Editorial Office
doaj +1 more source
Acknowledgement to Reviewers of Cryptography in 2019
The editorial team greatly appreciates the reviewers who have dedicated their considerable time and expertise to the journal’s rigorous editorial process over the past 12 months, regardless of whether the papers are finally published or not [...]
Cryptography Editorial Office
doaj +1 more source
The ideal quantum key distribution (QKD) protocol requires perfect random numbers for bit encoding and basis selecting. Perfect randomness is of great significance to the practical QKD system. However, due to the imperfection of practical quantum devices,
Xiao-Lei Jiang +6 more
doaj +1 more source
The HMQV protocols are 'hashed variants' of the MQV key agreement protocols. They were introduced at CRYPTO 2005 by Krawczyk, who claimed that the HMQV protocols have very significant advantages over their MQV counterparts: (i) security proofs under ...
Menezes Alfred
doaj +1 more source
Acknowledgement to Reviewers of Cryptography in 2018
Rigorous peer-review is the corner-stone of high-quality academic publishing [...]
Cryptography Editorial Office
doaj +1 more source
Graphical Methods in Device-Independent Quantum Cryptography [PDF]
We introduce a framework for graphical security proofs in device-independent quantum cryptography using the methods of categorical quantum mechanics. We are optimistic that this approach will make some of the highly complex proofs in quantum cryptography
Breiner, Spencer +2 more
core +2 more sources
Strict avalanche criterion over finite fields
Boolean functions which satisfy the Strict Avalanche Criterion (SAC) play an important role in the art of information security. In this paper, we extend the concept of SAC to finite fields GF(p).
Li Yuan, Cusick T. W.
doaj +1 more source

