Results 51 to 60 of about 349,531 (370)
Quantum cryptography: key distribution and beyond
Uniquely among the sciences, quantum cryptography has driven both foundational research as well as practical real-life applications. We review the progress of quantum cryptography in the last decade, covering quantum key distribution and other ...
H., Akshata Shenoy+2 more
core +1 more source
Graphical Methods in Device-Independent Quantum Cryptography [PDF]
We introduce a framework for graphical security proofs in device-independent quantum cryptography using the methods of categorical quantum mechanics. We are optimistic that this approach will make some of the highly complex proofs in quantum cryptography
Breiner, Spencer+2 more
core +2 more sources
The relationship between two flavors of oblivious transfer at the quantum level [PDF]
Though all-or-nothing oblivious transfer and one-out-of-two oblivious transfer are equivalent in classical cryptography, we here show that due to the nature of quantum cryptography, a protocol built upon secure quantum all-or-nothing oblivious transfer ...
C. Crepeau+5 more
core +2 more sources
Cloud computing is the emerging trend in today's world. Cloud computing is not a separate technology, it is platform which provides platform as a service, Infrastructure as a service and Software as a service. The most important thing with cloud is that we hire everything from a third party or store our important data's in a third parties place .Here ...
Padmapriya I, Ragini H
openaire +2 more sources
Single photon quantum cryptography [PDF]
We report the full implementation of a quantum cryptography protocol using a stream of single photon pulses generated by a stable and efficient source operating at room temperature.
A. Beveratos+10 more
core +2 more sources
Quantum Cryptography for Enhanced Network Security: A Comprehensive Survey of Research, Developments, and Future Directions [PDF]
With the ever-growing concern for internet security, the field of quantum cryptography emerges as a promising solution for enhancing the security of networking systems. In this paper, 20 notable papers from leading conferences and journals are reviewed and categorized based on their focus on various aspects of quantum cryptography, including key ...
arxiv
Securing Data in Internet of Things (IoT) Using Cryptography and Steganography Techniques
Internet of Things (IoT) is a domain wherein which the transfer of data is taking place every single second. The security of these data is a challenging task; however, security challenges can be mitigated with cryptography and steganography techniques ...
Manju Khari+5 more
semanticscholar +1 more source
Terahertz Quantum Cryptography [PDF]
REVTeX. 14 pages. 5 figures.
Carlo Ottaviani+6 more
openaire +5 more sources
LHCPs are transported to the thylakoid membrane via the (cp)SRP pathway. This process involves a transit complex of (cp)SRP43, (cp)SRP54 and LHCP, which interacts with (cp)FtsY and Alb3 at the membrane. GTP hydrolysis by (cp)SRP54 and (cp)FtsY triggers complex dissociation.
Victor Zegarra+7 more
wiley +1 more source
Cryptography: Mathematical Advancements on Cyber Security [PDF]
The origin of cryptography, the study of encoding and decoding messages, dates back to ancient times around 1900 BC. The ancient Egyptians enlisted the use of basic encryption techniques to conceal personal information.
Bower, Kristin
core +1 more source