Results 41 to 50 of about 334,436 (368)

The Impact of Quantum Computing on Present Cryptography [PDF]

open access: yesarXiv.org, 2018
The aim of this paper is to elucidate the implications of quantum computing in present cryptography and to introduce the reader to basic post-quantum algorithms.
Vasileios Mavroeidis   +3 more
semanticscholar   +1 more source

Demonstration of Grover’s algorithm for retrieving secret keys in a basic SPN block cipher

open access: yesCTU Journal of Innovation and Sustainable Development
In this study, we present in detail the application of Grover's quantum algorithm to the searching problem of the secret key of a simple SPN (Substitution–permutation network) block cipher called Yo-yo.
Minh Thang Vu   +3 more
doaj   +3 more sources

Post-Quantum Cryptography [PDF]

open access: yesNature, 2011
Cryptography is essential for the security of online communication, cars and implanted medical devices. However, many commonly used cryptosystems will be completely broken once large quantum computers exist. Post-quantum cryptography is cryptography under the assumption that the attacker has a large quantum computer; post-quantum cryptosystems strive ...
Daniel J. Bernstein   +2 more
openaire   +3 more sources

Single photon quantum cryptography [PDF]

open access: yes, 2002
We report the full implementation of a quantum cryptography protocol using a stream of single photon pulses generated by a stable and efficient source operating at room temperature.
A. Beveratos   +10 more
core   +2 more sources

Free-Space Quantum Key Distribution

open access: yes, 2016
Based on the firm laws of physics rather than unproven foundations of mathematical complexity, quantum cryptography provides a radically different solution for encryption and promises unconditional security.
Carrasco-Casado, Alberto   +2 more
core   +1 more source

Cryptography: Mathematical Advancements on Cyber Security [PDF]

open access: yes, 2019
The origin of cryptography, the study of encoding and decoding messages, dates back to ancient times around 1900 BC. The ancient Egyptians enlisted the use of basic encryption techniques to conceal personal information.
Bower, Kristin
core   +1 more source

Learning with Errors is easy with quantum samples

open access: yes, 2018
Learning with Errors is one of the fundamental problems in computational learning theory and has in the last years become the cornerstone of post-quantum cryptography.
Grilo, Alex B.   +2 more
core   +2 more sources

The unpredictably eruptive dynamics of spruce budworm populations in eastern Canada

open access: yesPopulation Ecology, EarlyView.
We examine historical population data for spruce budworm from several locations through the period 1930–1997, and use density‐dependent recruitment curves to test whether the pattern of population growth over time is more consistent with Royama's (1984; Ecological Monographs 54:429–462) linear R(t) model of harmonic oscillation at Green River New ...
Barry J. Cooke, Jacques Régnière
wiley   +1 more source

SoK of Used Cryptography in Blockchain [PDF]

open access: yesIEEE Access, 2019
The underlying fundaments of blockchain are cryptography and cryptographic concepts that provide reliable and secure decentralized solutions. Although many recent papers study the use-cases of blockchain in different industrial areas, such as finance ...
Mayank Raikwar   +2 more
semanticscholar   +1 more source

Characterisations of Ideal Threshold Schemes [PDF]

open access: yesDiscrete Mathematics & Theoretical Computer Science, 2004
We characterise ideal threshold schemes from different approaches. Since the characteristic properties are independent to particular descriptions of threshold schemes all ideal threshold schemes can be examined by new points of view and new results on ...
Josef Pieprzyk, Xian-Mo Zhang
doaj   +1 more source

Home - About - Disclaimer - Privacy