Results 11 to 20 of about 201,296 (311)
Quantum Cryptography [PDF]
Reviews of Modern Physics, 2001 Quantum cryptography could well be the first application of quantum mechanics
at the individual quanta level. The very fast progress in both theory and
experiments over the recent years are reviewed, with emphasis on open questions
and technological ...Aspect, A., Bechmann-Pasquinucci, H., Bechmann-Pasquinucci, H., Bechmann-Pasquinucci, H., Bell, J. S., Bennett, C. H., Bennett, C. H., Bennett, C. H., Bennett, C. H., Bennett, C. H., Bennett, C. H., Bennett, C. H., Bennett, C. H., Berry, M. V., Bethune, D., Biham, E., Biham, E., Bourennane, M., Bourennane, M., Bourennane, M., Brassard, G., Brendel, J., Brendel, J., Briegel, H.-J., Brouri, R., Brown, R. G. W., Brown, R. G. W., Brown, R. G. W., Brunel, C., Bruss, D., Bruss, D., Bréguet, J., Bréguet, J., Buttler, W. T., Buttler, W. T., Bužek, V., Canning, J., Cirac, J. I., Clarke, R. B. M., Clauser, J. F., Clauser, J. F., Cova, S., Cova, S., Csiszár, I., De Martini, F., Desurvire, E., Deutsch, D., Deutsch, D., Deutsch, D., Dieks, D., Diffie, W., Dur, W., Dur, W., Dusek, M., Einstein, A., Ekert, A. K., Ekert, A. K., Ekert, A. K., Ekert, A. K., Elamari, A., Felix, S., Fleury, L., Franson, J. D., Franson, J. D., Franson, J. D., Freedmann, S. J., Fry, E. S., Fuchs, C. A., Fuchs, C. A., Gisin, B., Gisin, N., Gisin, N., Gisin, N., Gisin, N., Gisin, N., Goldenberg, L., Gorman, P. M., Grégoire Ribordy, Gérard, J.-M., Gérard, J.-M., Haecker, W., Hall, M. J. W., Hariharan, P., Hillery, M., Hiskett, P. A., Hong, C. K., Hong, C. K., Horodecki, M., Hughes, R., Hughes, R., Hugo Zbinden, Huttner, B., Huttner, B., Huttner, B., Imamoglu, A., Ingerson, T. E., Ivanovic, I. D., Jacobs, B., Jennewein, T., Jennewein, T., Karlsson, A., Kempe, J., Kim, J., Kimble, H. J., Kitson, S. C., Kurtsiefer, C., Kurtsiefer, C., Kwiat, P. G., Kwiat, P. G., Lacaita, A., Lacaita, A., Larchuk, T. S., Levine, B. F., Li, M. J., Lo, H.-K., Lo, H.-K., Lütkenhaus, N., Lütkenhaus, N., Marand, C., Martinelli, M., Martinelli, M., Maurer, U. M., Maurer, U. M., Mayers, D., Mazurenko, Y., Michler, P., Milonni, P. W., Molotkov, S. N., Muller, A., Muller, A., Muller, A., Muller, A., Mérolla, J-M., Naik, D., Nicolas Gisin, Niu, C. S., Nogues, G., Owens, P. C. M., Peres, A., Peres, A., Phoenix, S. J. D., Rarity, J. G., Rarity, J. G., Ribordy, G., Ribordy, G., Ribordy, G., Rivest, R. L., Santori, C., Shannon, C. E., Shih, Y. H., Shor, P. W., Simon, C., Simon, C., Spinelli, A., Stefanov, A., Steinberg, A. M., Steinberg, A. M., Stucki, D., Sun, P. C., Tanzilli, S., Tapster, P. R., Thomas, G. A., Tittel, W., Tittel, W., Tittel, W., Tittel, W., Tomita, A., Townsend, P., Townsend, P., Townsend, P., Townsend, P., Townsend, P., Townsend, P., Townsend, P., Townsend, P. D., Vernam, G., Vinegoni, C., Vinegoni, C., Weihs, G., Wiesner, S., Wolfgang Tittel, Wootters, W. K., Yuen, H. P., Zappa, F., Zbinden, H., Zeilinger, A., Żukowski, M., Żukowski, M. +187 morecore +9 more sourcesQuantum Cryptography [PDF]
Contemporary Physics, 1995 Quantum cryptography is a new method for secret communications offering the
ultimate security assurance of the inviolability of a Law of Nature.Bell J. S., Brassard G., Busch P., Clauser J. F., Conan Doyle A., D. M. Alde, Deutsch D., G. G. Luther, G. L. Morgan, Hayes B., Hodges A., Hughes R. I. G., Kahn D., Knuth D. E., Lamphere R. J., M. Schauer, P. Dyer, Richard J. Hughes, Schneier B., Schroeder M. R., Shannon C. E., Shor P. W., Simmons G. J., Vernam G. S., von Neumann J., von Neumann J., Walker N. G., Welsh D., Williams R. C., Wright P., Wrixon F. B. +30 morecore +2 more sourcesNeural Cryptography
Proceedings of the 9th International Conference on Neural Information Processing, 2002. ICONIP '02., 2002 Two neural networks which are trained on their mutual output bits show a
novel phenomenon: The networks synchronize to a state with identical time
dependent weights.Kanter, Ido, Kinzel, Wolfgangcore +3 more sourcesAdvances in quantum cryptography [PDF]
Advances in Optics and Photonics, 2020 Quantum cryptography is arguably the fastest growing area in quantum information science. Novel theoretical protocols are designed on a regular basis, security proofs are constantly improving, and experiments are gradually moving from proof-of-principle lab demonstrations to in-field implementations and technological prototypes.S. Pirandola, U. L. Andersen, L. Banchi, M. Berta, D. Bunandar, R. Colbeck, D. Englund, T. Gehring, C. Lupo, C. Ottaviani, J. L. Pereira, M. Razavi, J. Shamsul Shaari, M. Tomamichel, V. C. Usenko, G. Vallone, P. Villoresi, P. Wallden +17 moreopenaire +13 more sourcesCryptography and the internet [PDF]
, 1998 After many years, cryptography is coming to the Internet. Some protocols are in common use; more are being developed and deployed. The major issue has been one of cryptographic engineering: turning academic papers into a secure, implementable specification.Steven M. Bellovinopenalex +4 more sourcesON QUANTUM CRYPTOGRAPHY [PDF]
ЖУРНАЛ ЗА БЕЗБЈЕДНОСТ И КРИМИНАЛИСТИКУ, 2019 In the late twentieth century, human race entered the era ofinformation technology (IT). The IT industry, which deals with the production,processing, storage and transmission of information, has become an integralpart of the global economic system, a completely independent and significantsector of the economy.Jaćimovski, Stevo, Setrajčić, Jovan, Lamovec, Jelena +2 moreopenaire +3 more sourcesWatermarking Is Not Cryptography [PDF]
, 2006 The fields of cryptography and communications are quite distinct and while communications systems often combine technologies from the two fields, a layered architecture is applied that permits each layer to be independently designed. It is generally agreed that watermarking, i.e.Cox, Ingemar, Doërr, Gwenaël, Furon, Teddy +2 moreopenaire +3 more sourcesEfficient Unified Arithmetic for Hardware Cryptography [PDF]
, 2008 The basic arithmetic operations (i.e. addition, multiplication, and inversion) in finite fields, GF(q), where q = pk and p is a prime integer, have several applications in cryptography, such as RSA algorithm, Diffie-Hellman key exchange algorithm [1 ...Koc, Cetin Kaya, Koç, Çetin Kaya, Savas, Erkay, Savaş, Erkay +3 morecore +2 more sources