Results 311 to 320 of about 24,566 (328)
Some of the next articles are maybe not open access.
High-rate measurement-device-independent quantum cryptography
Nature Photonics, 2015Stefano Pirandola +2 more
exaly
A Survey of Microarchitectural Side-channel Vulnerabilities, Attacks, and Defenses in Cryptography
ACM Computing Surveys, 2022exaly
Artificial Intelligence in Post-Quantum Cryptography
Purpose: Artificial Intelligence (AI) is critical to thecreation and execution of Post-quantum cryptography, which ensures data security in the era of quantum computing. Quantum computers have the ability to break existing encryption techniques, posing a serious danger to data security and privacy.openaire +1 more source
Post-Quantum Lattice-Based Cryptography Implementations
ACM Computing Surveys, 2019Hamid Nejatollahi +2 more
exaly
Tight finite-key analysis for quantum cryptography
Nature Communications, 2012Marco Tomamichel +2 more
exaly

