Results 51 to 60 of about 349,531 (370)

Quantum cryptography: key distribution and beyond

open access: yes, 2018
Uniquely among the sciences, quantum cryptography has driven both foundational research as well as practical real-life applications. We review the progress of quantum cryptography in the last decade, covering quantum key distribution and other ...
H., Akshata Shenoy   +2 more
core   +1 more source

Graphical Methods in Device-Independent Quantum Cryptography [PDF]

open access: yes, 2019
We introduce a framework for graphical security proofs in device-independent quantum cryptography using the methods of categorical quantum mechanics. We are optimistic that this approach will make some of the highly complex proofs in quantum cryptography
Breiner, Spencer   +2 more
core   +2 more sources

The relationship between two flavors of oblivious transfer at the quantum level [PDF]

open access: yes, 2005
Though all-or-nothing oblivious transfer and one-out-of-two oblivious transfer are equivalent in classical cryptography, we here show that due to the nature of quantum cryptography, a protocol built upon secure quantum all-or-nothing oblivious transfer ...
C. Crepeau   +5 more
core   +2 more sources

Cloud Cryptography [PDF]

open access: yesInternational Journal of Trend in Scientific Research and Development, 2019
Cloud computing is the emerging trend in today's world. Cloud computing is not a separate technology, it is platform which provides platform as a service, Infrastructure as a service and Software as a service. The most important thing with cloud is that we hire everything from a third party or store our important data's in a third parties place .Here ...
Padmapriya I, Ragini H
openaire   +2 more sources

Single photon quantum cryptography [PDF]

open access: yes, 2002
We report the full implementation of a quantum cryptography protocol using a stream of single photon pulses generated by a stable and efficient source operating at room temperature.
A. Beveratos   +10 more
core   +2 more sources

Quantum Cryptography for Enhanced Network Security: A Comprehensive Survey of Research, Developments, and Future Directions [PDF]

open access: yesarXiv, 2023
With the ever-growing concern for internet security, the field of quantum cryptography emerges as a promising solution for enhancing the security of networking systems. In this paper, 20 notable papers from leading conferences and journals are reviewed and categorized based on their focus on various aspects of quantum cryptography, including key ...
arxiv  

Securing Data in Internet of Things (IoT) Using Cryptography and Steganography Techniques

open access: yesIEEE Transactions on Systems, Man, and Cybernetics: Systems, 2020
Internet of Things (IoT) is a domain wherein which the transfer of data is taking place every single second. The security of these data is a challenging task; however, security challenges can be mitigated with cryptography and steganography techniques ...
Manju Khari   +5 more
semanticscholar   +1 more source

Terahertz Quantum Cryptography [PDF]

open access: yesIEEE Journal on Selected Areas in Communications, 2020
REVTeX. 14 pages. 5 figures.
Carlo Ottaviani   +6 more
openaire   +5 more sources

Structural and mechanistic basis for the regulation of the chloroplast signal recognition particle by (p)ppGpp

open access: yesFEBS Letters, EarlyView.
LHCPs are transported to the thylakoid membrane via the (cp)SRP pathway. This process involves a transit complex of (cp)SRP43, (cp)SRP54 and LHCP, which interacts with (cp)FtsY and Alb3 at the membrane. GTP hydrolysis by (cp)SRP54 and (cp)FtsY triggers complex dissociation.
Victor Zegarra   +7 more
wiley   +1 more source

Cryptography: Mathematical Advancements on Cyber Security [PDF]

open access: yes, 2019
The origin of cryptography, the study of encoding and decoding messages, dates back to ancient times around 1900 BC. The ancient Egyptians enlisted the use of basic encryption techniques to conceal personal information.
Bower, Kristin
core   +1 more source

Home - About - Disclaimer - Privacy