Basic concepts in quantum computation [PDF]
Section headings: 1 Qubits, gates and networks 2 Quantum arithmetic and function evaluations 3 Algorithms and their complexity 4 From interferometers to computers 5 The first quantum algorithms 6 Quantum search 7 Optimal phase estimation 8 Periodicity ...
A. Barenco +40 more
core +4 more sources
Design and Implementation of a Secure Communication Protocol [PDF]
The main object of this paper is to present a mutual authentication protocol that guarantees security, integrity and authenticity of messages, transferred over a network system.
Kumar, M. Ranjith, Viswanath, M. K.
core +2 more sources
A Hybrid Cryptographic System for Secured Device to Device Communication [PDF]
It is general fact that even after enormous expansion of wireless communication there are still dead regions that hampers the effective communication. With exponential rise in the smart phones, a new layer of communication has evolved that could address ...
Chakravarthy, A. S. N. +2 more
core +3 more sources
A PUF-based cryptographic security solution for IoT systems on chip [PDF]
The integration of multicore processors and peripherals from multiple intellectual property core providers as hardware components of IoT multiprocessor systems-on-chip (SoC) represents a source of security vulnerabilities for the in-chip communication ...
Balan, Alexandra +3 more
core +1 more source
Quantum nonlinear optics: applications to quantum metrology, imaging, and information [PDF]
The fields of quantum and nonlinear optics have given rise to a variety of nonclassical states of light that have been proven to surpass certain limitations set by classical physics.
Glasser, Ryan
core +2 more sources
On Avoiding Traffic Jams with Dynamic Self-Organizing Trip Planning [PDF]
Urban areas are increasingly subject to congestions. Most navigation systems and algorithms that avoid these congestions consider drivers independently and can, thus, cause novel congestions at unexpected places.
Liebig, Thomas, Sotzny, Maurice
core +1 more source
From quantum-codemaking to quantum code-breaking [PDF]
This is a semi-popular overview of quantum entanglement as an important physical resource in the field of data security and quantum computing. After a brief outline of entanglement's key role in philosophical debates about the meaning of quantum ...
Ekert, Artur
core +1 more source
RESEARCH OF DIFFERENT TURBO CODE SPEEDS, TYPES OF MODULATIONS, DECODING METHODS AND THEIR COMPATIBILITY WITH ENCRYPTION TECHNIQUES [PDF]
Turbo codes are widely used to perform reliable information transfer over noisy communication connections with limited bandwidth or latency. The focus of the report is the analysis of different turbo encoder speed of the code, types of modulations ...
Parvanov, Stanimir
core +3 more sources
Efficient FPGA Implementations and Cryptanalysis of Automata-based Dynamic Convolutional Cryptosystems [PDF]
With the exception of the recently proposed class of cascaded dynamic convolutional cryptosystems, all the symmetric cryptosystems studied so far in the literature are static, in the sense that their structure do not change at all during encryption ...
Dragos Trinca
core
Number Theory and Cryptography: An Analytical Approach [PDF]
The more I have considered Computer Science, the more I see that it is truly a type of connected Mathematics. The two are regularly combined in University divisions, and numerous understudies study both for a more profound comprehension of the key ...
Prasada Rao, P. N. V., Srinivasa Rao, B.
core

