Results 41 to 50 of about 334,436 (368)
The Impact of Quantum Computing on Present Cryptography [PDF]
The aim of this paper is to elucidate the implications of quantum computing in present cryptography and to introduce the reader to basic post-quantum algorithms.
Vasileios Mavroeidis+3 more
semanticscholar +1 more source
Demonstration of Grover’s algorithm for retrieving secret keys in a basic SPN block cipher
In this study, we present in detail the application of Grover's quantum algorithm to the searching problem of the secret key of a simple SPN (Substitution–permutation network) block cipher called Yo-yo.
Minh Thang Vu+3 more
doaj +3 more sources
Post-Quantum Cryptography [PDF]
Cryptography is essential for the security of online communication, cars and implanted medical devices. However, many commonly used cryptosystems will be completely broken once large quantum computers exist. Post-quantum cryptography is cryptography under the assumption that the attacker has a large quantum computer; post-quantum cryptosystems strive ...
Daniel J. Bernstein+2 more
openaire +3 more sources
Single photon quantum cryptography [PDF]
We report the full implementation of a quantum cryptography protocol using a stream of single photon pulses generated by a stable and efficient source operating at room temperature.
A. Beveratos+10 more
core +2 more sources
Free-Space Quantum Key Distribution
Based on the firm laws of physics rather than unproven foundations of mathematical complexity, quantum cryptography provides a radically different solution for encryption and promises unconditional security.
Carrasco-Casado, Alberto+2 more
core +1 more source
Cryptography: Mathematical Advancements on Cyber Security [PDF]
The origin of cryptography, the study of encoding and decoding messages, dates back to ancient times around 1900 BC. The ancient Egyptians enlisted the use of basic encryption techniques to conceal personal information.
Bower, Kristin
core +1 more source
Learning with Errors is easy with quantum samples
Learning with Errors is one of the fundamental problems in computational learning theory and has in the last years become the cornerstone of post-quantum cryptography.
Grilo, Alex B.+2 more
core +2 more sources
The unpredictably eruptive dynamics of spruce budworm populations in eastern Canada
We examine historical population data for spruce budworm from several locations through the period 1930–1997, and use density‐dependent recruitment curves to test whether the pattern of population growth over time is more consistent with Royama's (1984; Ecological Monographs 54:429–462) linear R(t) model of harmonic oscillation at Green River New ...
Barry J. Cooke, Jacques Régnière
wiley +1 more source
SoK of Used Cryptography in Blockchain [PDF]
The underlying fundaments of blockchain are cryptography and cryptographic concepts that provide reliable and secure decentralized solutions. Although many recent papers study the use-cases of blockchain in different industrial areas, such as finance ...
Mayank Raikwar+2 more
semanticscholar +1 more source
Characterisations of Ideal Threshold Schemes [PDF]
We characterise ideal threshold schemes from different approaches. Since the characteristic properties are independent to particular descriptions of threshold schemes all ideal threshold schemes can be examined by new points of view and new results on ...
Josef Pieprzyk, Xian-Mo Zhang
doaj +1 more source