Results 21 to 30 of about 42,947 (261)
Finite-Key Analysis of 1-Decoy Method Quantum Key Distribution with Intensity Fluctuation
The decoy state quantum key distribution (QKD) protocol is proven to be an effective strategy against the photon number splitting attack. It was shown that the 1-decoy state protocol, easier to implement in the practical QKD system, outperforms the 2 ...
Chun Zhou +7 more
doaj +1 more source
In the User and Entity Behaviour Analytics (UEBA), unknown malicious behaviours are often difficult to be automatically detected due to the lack of labelled data.
Yi‐feng Wang, Yuan‐bo Guo, Chen Fang
doaj +1 more source
Fault-Tolerant Data Aggregation Scheme Supporting Fine-Grained Linear Operation in Smart Grid
Smart grid is a combination of traditional power system engineering and information and communication technology. Smart grid provides users with convenient services through real-time data updates.
Zichao Song +5 more
doaj +1 more source
Model Learning and Model Checking of IPSec Implementations for Internet of Things
With the development of Internet of Things (IoT) technology, the demand for secure communication by smart devices has dramatically increased, and the security of the IoT protocol has become the focus of cyberspace.
Jiaxing Guo +3 more
doaj +1 more source
Phase-Matching Quantum Key Distribution with Discrete Phase Randomization
The twin-field quantum key distribution (TF-QKD) protocol and its variations have been proposed to overcome the linear Pirandola–Laurenza–Ottaviani–Banchi (PLOB) bound.
Xiaoxu Zhang +6 more
doaj +1 more source
Security Analysis of Sending or Not-Sending Twin-Field Quantum Key Distribution with Weak Randomness
Sending-or-not sending twin-field quantum key distribution (SNS TF-QKD) has the advantage of tolerating large amounts of misalignment errors, and its key rate can exceed the linear bound of repeaterless quantum key distribution.
Xiao-Lei Jiang +5 more
doaj +1 more source
A New Era of Cryptography : Quantum Cryptography [PDF]
ABSTRACT Security is the first priority in today digital world for secure communication between sender and receiver. Various Cryptography techniques are developed time to time for secure communication. Quantum Cryptography is one of the latest and advanced cryptography technique, it is different from all other cryptography technique and more secure ...
openaire +1 more source
Demonstration of Grover’s algorithm for retrieving secret keys in a basic SPN block cipher
In this study, we present in detail the application of Grover's quantum algorithm to the searching problem of the secret key of a simple SPN (Substitution–permutation network) block cipher called Yo-yo.
Minh Thang Vu +3 more
doaj +3 more sources
Design and implementation of an energy-efficient Keccak algorithm ASIC
The complete hardware circuit of Keccak algorithm which can support the four modes of SHA3 is designed and implemented. Based on the detailed analysis of the sponge functions and Keccak algorithm, the modular idea is used to divide the circuit structure ...
Tuo Zhao, Chen Tao, Li Wei, Nan Longmei
doaj +1 more source
Post-Quantum Cryptography [PDF]
Cryptography is essential for the security of online communication, cars and implanted medical devices. However, many commonly used cryptosystems will be completely broken once large quantum computers exist. Post-quantum cryptography is cryptography under the assumption that the attacker has a large quantum computer; post-quantum cryptosystems strive ...
Daniel J. Bernstein +2 more
openaire +3 more sources

