Results 11 to 20 of about 334,436 (368)

Quantum Cryptography [PDF]

open access: yesContemporary Physics, 1995
Quantum cryptography is a new method for secret communications offering the ultimate security assurance of the inviolability of a Law of Nature.
Bell J. S.   +30 more
core   +2 more sources

Cryptography

open access: yesSecurity Engineering, 2020
The word cryptography was coined from two Greek words ‘Krypto’, meaning hidden and ‘graphein’ meaning writing. Thus, cryptography means hidden writing.
Biswanath Ghosh   +4 more
semanticscholar   +3 more sources

Cryptography

open access: yesWiley Encyclopedia of Computer Science and Engineering, 2019
: Critical Infrastructures (CIs), such as healthcare facilities, power grids, transportation systems, and financial institutions, are vital components of a functioning society, with the economy and safety being dependent on them.
Jonathan Katz
semanticscholar   +2 more sources

Tropical Cryptography [PDF]

open access: yesCommunications in Algebra, 2014
9 ...
Grigoriev, D., Shpilrain, V.
openaire   +4 more sources

Arithmetic Cryptography [PDF]

open access: yesJournal of the ACM, 2017
We study the possibility of computing cryptographic primitives in a fully black-box arithmetic model over a finite field F . In this model, the input to a cryptographic primitive (e.g., encryption scheme) is given as a sequence of field elements, the honest parties are implemented by arithmetic circuits that make ...
Benny Applebaum   +2 more
openaire   +2 more sources

Cryptography and the internet [PDF]

open access: bronze, 1998
After many years, cryptography is coming to the Internet. Some protocols are in common use; more are being developed and deployed. The major issue has been one of cryptographic engineering: turning academic papers into a secure, implementable specification.
Steven M. Bellovin
openalex   +4 more sources

Sending or Not-Sending Twin-Field Quantum Key Distribution with Flawed and Leaky Sources

open access: yesEntropy, 2021
Twin-field quantum key distribution (TF-QKD) has attracted considerable attention and developed rapidly due to its ability to surpass the fundamental rate-distance limit of QKD.
Yi-Fei Lu   +9 more
doaj   +1 more source

ON QUANTUM CRYPTOGRAPHY [PDF]

open access: yesЖУРНАЛ ЗА БЕЗБЈЕДНОСТ И КРИМИНАЛИСТИКУ, 2019
In the late twentieth century, human race entered the era ofinformation technology (IT). The IT industry, which deals with the production,processing, storage and transmission of information, has become an integralpart of the global economic system, a completely independent and significantsector of the economy.
Jaćimovski, Stevo   +2 more
openaire   +3 more sources

Practical Analysis of Sending or Not-Sending Twin-Field Quantum Key Distribution with Frequency Side Channels

open access: yesApplied Sciences, 2021
The twin-field quantum key distribution (TF-QKD) and its variants can overcome the fundamental rate-distance limit of QKD. However, their physical implementations with the side channels remain the subject of further research.
Yi-Fei Lu   +9 more
doaj   +1 more source

Efficient Unified Arithmetic for Hardware Cryptography [PDF]

open access: yes, 2008
The basic arithmetic operations (i.e. addition, multiplication, and inversion) in finite fields, GF(q), where q = pk and p is a prime integer, have several applications in cryptography, such as RSA algorithm, Diffie-Hellman key exchange algorithm [1 ...
Koc, Cetin Kaya   +3 more
core   +2 more sources

Home - About - Disclaimer - Privacy