Results 31 to 40 of about 349,531 (370)

Phase-Matching Quantum Key Distribution with Discrete Phase Randomization

open access: yesEntropy, 2021
The twin-field quantum key distribution (TF-QKD) protocol and its variations have been proposed to overcome the linear Pirandola–Laurenza–Ottaviani–Banchi (PLOB) bound.
Xiaoxu Zhang   +6 more
doaj   +1 more source

SoK: Computer-Aided Cryptography

open access: yesIEEE Symposium on Security and Privacy, 2021
Computer-aided cryptography is an active area of research that develops and applies formal, machine-checkable approaches to the design, analysis, and implementation of cryptography.
M. Barbosa   +6 more
semanticscholar   +1 more source

Finite-Key Analysis of 1-Decoy Method Quantum Key Distribution with Intensity Fluctuation

open access: yesApplied Sciences, 2022
The decoy state quantum key distribution (QKD) protocol is proven to be an effective strategy against the photon number splitting attack. It was shown that the 1-decoy state protocol, easier to implement in the practical QKD system, outperforms the 2 ...
Chun Zhou   +7 more
doaj   +1 more source

Efficient Unified Arithmetic for Hardware Cryptography [PDF]

open access: yes, 2008
The basic arithmetic operations (i.e. addition, multiplication, and inversion) in finite fields, GF(q), where q = pk and p is a prime integer, have several applications in cryptography, such as RSA algorithm, Diffie-Hellman key exchange algorithm [1 ...
Koc, Cetin Kaya   +3 more
core   +2 more sources

Handbook of Applied Cryptography

open access: yes, 2018
From the Publisher: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and ...
A. Menezes, P. V. Oorschot, S. Vanstone
semanticscholar   +1 more source

Model Learning and Model Checking of IPSec Implementations for Internet of Things

open access: yesIEEE Access, 2019
With the development of Internet of Things (IoT) technology, the demand for secure communication by smart devices has dramatically increased, and the security of the IoT protocol has become the focus of cyberspace.
Jiaxing Guo   +3 more
doaj   +1 more source

Security Analysis of Sending or Not-Sending Twin-Field Quantum Key Distribution with Weak Randomness

open access: yesEntropy, 2022
Sending-or-not sending twin-field quantum key distribution (SNS TF-QKD) has the advantage of tolerating large amounts of misalignment errors, and its key rate can exceed the linear bound of repeaterless quantum key distribution.
Xiao-Lei Jiang   +5 more
doaj   +1 more source

Post-Quantum Cryptography [PDF]

open access: yesNature, 2011
Cryptography is essential for the security of online communication, cars and implanted medical devices. However, many commonly used cryptosystems will be completely broken once large quantum computers exist. Post-quantum cryptography is cryptography under the assumption that the attacker has a large quantum computer; post-quantum cryptosystems strive ...
Daniel J. Bernstein   +2 more
openaire   +3 more sources

A New Era of Cryptography : Quantum Cryptography [PDF]

open access: yesInternational Journal on Cryptography and Information Security, 2016
ABSTRACT Security is the first priority in today digital world for secure communication between sender and receiver. Various Cryptography techniques are developed time to time for secure communication. Quantum Cryptography is one of the latest and advanced cryptography technique, it is different from all other cryptography technique and more secure ...
openaire   +2 more sources

Applications of finite geometry in coding theory and cryptography [PDF]

open access: yes, 2011
We present in this article the basic properties of projective geometry, coding theory, and cryptography, and show how finite geometry can contribute to coding theory and cryptography.
Klein, Andreas, Storme, Leo
core   +1 more source

Home - About - Disclaimer - Privacy