Results 11 to 20 of about 71 (46)

Basic concepts in quantum computation [PDF]

open access: yes, 2000
Section headings: 1 Qubits, gates and networks 2 Quantum arithmetic and function evaluations 3 Algorithms and their complexity 4 From interferometers to computers 5 The first quantum algorithms 6 Quantum search 7 Optimal phase estimation 8 Periodicity ...
A. Barenco   +40 more
core   +4 more sources

Design and Implementation of a Secure Communication Protocol [PDF]

open access: yes, 2018
The main object of this paper is to present a mutual authentication protocol that guarantees security, integrity and authenticity of messages, transferred over a network system.
Kumar, M. Ranjith, Viswanath, M. K.
core   +2 more sources

A Hybrid Cryptographic System for Secured Device to Device Communication [PDF]

open access: yes, 2016
It is general fact that even after enormous expansion of wireless communication there are still dead regions that hampers the effective communication. With exponential rise in the smart phones, a new layer of communication has evolved that could address ...
Chakravarthy, A. S. N.   +2 more
core   +3 more sources

A PUF-based cryptographic security solution for IoT systems on chip [PDF]

open access: yes, 2020
The integration of multicore processors and peripherals from multiple intellectual property core providers as hardware components of IoT multiprocessor systems-on-chip (SoC) represents a source of security vulnerabilities for the in-chip communication ...
Balan, Alexandra   +3 more
core   +1 more source

Quantum nonlinear optics: applications to quantum metrology, imaging, and information [PDF]

open access: yes, 2009
The fields of quantum and nonlinear optics have given rise to a variety of nonclassical states of light that have been proven to surpass certain limitations set by classical physics.
Glasser, Ryan
core   +2 more sources

On Avoiding Traffic Jams with Dynamic Self-Organizing Trip Planning [PDF]

open access: yes, 2017
Urban areas are increasingly subject to congestions. Most navigation systems and algorithms that avoid these congestions consider drivers independently and can, thus, cause novel congestions at unexpected places.
Liebig, Thomas, Sotzny, Maurice
core   +1 more source

From quantum-codemaking to quantum code-breaking [PDF]

open access: yes, 1997
This is a semi-popular overview of quantum entanglement as an important physical resource in the field of data security and quantum computing. After a brief outline of entanglement's key role in philosophical debates about the meaning of quantum ...
Ekert, Artur
core   +1 more source

RESEARCH OF DIFFERENT TURBO CODE SPEEDS, TYPES OF MODULATIONS, DECODING METHODS AND THEIR COMPATIBILITY WITH ENCRYPTION TECHNIQUES [PDF]

open access: yes
Turbo codes are widely used to perform reliable information transfer over noisy communication connections with limited bandwidth or latency. The focus of the report is the analysis of different turbo encoder speed of the code, types of modulations ...
Parvanov, Stanimir
core   +3 more sources

Efficient FPGA Implementations and Cryptanalysis of Automata-based Dynamic Convolutional Cryptosystems [PDF]

open access: yes, 2006
With the exception of the recently proposed class of cascaded dynamic convolutional cryptosystems, all the symmetric cryptosystems studied so far in the literature are static, in the sense that their structure do not change at all during encryption ...
Dragos Trinca
core  

Number Theory and Cryptography: An Analytical Approach [PDF]

open access: yes, 2016
The more I have considered Computer Science, the more I see that it is truly a type of connected Mathematics. The two are regularly combined in University divisions, and numerous understudies study both for a more profound comprehension of the key ...
Prasada Rao, P. N. V., Srinivasa Rao, B.
core  

Home - About - Disclaimer - Privacy