Results 31 to 40 of about 25,460 (262)

No information flow using statistical fluctuations, and quantum cryptography [PDF]

open access: yes, 2003
The communication protocol of Home and Whitaker [Phys. Rev. A 67, 022306 (2003)] is examined in some detail, and found to work equally well using a separable state.
Larsson, Jan-Ake
core   +1 more source

Deploying hybrid quantum-secured infrastructure for applications: When quantum and post-quantum can work together

open access: yesFrontiers in Quantum Science and Technology, 2023
Most currently used cryptographic tools for protecting data are based on certain computational assumptions, which makes them vulnerable with respect to technological and algorithmic developments, such as quantum computing.
Aleksey K. Fedorov, Aleksey K. Fedorov
doaj   +1 more source

Post-selection technique for quantum channels with applications to quantum cryptography [PDF]

open access: yes, 2008
We propose a general method for studying properties of quantum channels acting on an n-partite system, whose action is invariant under permutations of the subsystems.
Christandl, Matthias   +2 more
core   +2 more sources

Quantum key distribution based on selective post-processing in passive optical networks [PDF]

open access: yes, 2014
One of the main obstacles to the widespread adoption of quantum cryptography has been the difficulty of integration into standard optical networks, largely due to the tremendous difference in power of classical signals compared with the single quantum ...
Ciurana Aguilar, Alex   +2 more
core   +3 more sources

Applications of Post-Quantum Cryptography

open access: yesEuropean Conference on Cyber Warfare and Security
With the constantly advancing capabilities of quantum computers, conventional cryptographic systems relying on complex math problems may encounter unforeseen vulnerabilities. Unlike regular computers, which are often deemed cost-ineffective in cryptographic attacks, quantum computers have a significant advantage in calculation speed.
Emils Bagirovs   +3 more
openaire   +2 more sources

Learning with Errors is easy with quantum samples

open access: yes, 2018
Learning with Errors is one of the fundamental problems in computational learning theory and has in the last years become the cornerstone of post-quantum cryptography.
Grilo, Alex B.   +2 more
core   +2 more sources

Practical cryptographic strategies in the post-quantum era

open access: yes, 2018
We review new frontiers in information security technologies in communications and distributed storage technologies with the use of classical, quantum, hybrid classical-quantum, and post-quantum cryptography.
Fedorov, A. K.   +3 more
core   +1 more source

The Case for Quantum Key Distribution [PDF]

open access: yes, 2009
Quantum key distribution (QKD) promises secure key agreement by using quantum mechanical systems. We argue that QKD will be an important part of future cryptographic infrastructures.
A.R. Dixon   +20 more
core   +8 more sources

Post-Quantum Delegated Proof of Luck for Blockchain Consensus Algorithm

open access: yesApplied Sciences
The advancements in quantum computing and the potential for polynomial-time solutions to traditional public key cryptography (i.e., Rivest–Shamir–Adleman (RSA) and elliptic-curve cryptography (ECC)) using Shor’s algorithm pose a serious threat to the ...
Hyunjun Kim   +4 more
doaj   +1 more source

A Mathematical Perspective on Post-Quantum Cryptography

open access: yesMathematics, 2022
In 2016, the National Institute of Standards and Technology (NIST) announced an open competition with the goal of finding and standardizing suitable algorithms for quantum-resistant cryptography.
Maximilian Richter   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy