Results 31 to 40 of about 25,460 (262)
No information flow using statistical fluctuations, and quantum cryptography [PDF]
The communication protocol of Home and Whitaker [Phys. Rev. A 67, 022306 (2003)] is examined in some detail, and found to work equally well using a separable state.
Larsson, Jan-Ake
core +1 more source
Most currently used cryptographic tools for protecting data are based on certain computational assumptions, which makes them vulnerable with respect to technological and algorithmic developments, such as quantum computing.
Aleksey K. Fedorov, Aleksey K. Fedorov
doaj +1 more source
Post-selection technique for quantum channels with applications to quantum cryptography [PDF]
We propose a general method for studying properties of quantum channels acting on an n-partite system, whose action is invariant under permutations of the subsystems.
Christandl, Matthias +2 more
core +2 more sources
Quantum key distribution based on selective post-processing in passive optical networks [PDF]
One of the main obstacles to the widespread adoption of quantum cryptography has been the difficulty of integration into standard optical networks, largely due to the tremendous difference in power of classical signals compared with the single quantum ...
Ciurana Aguilar, Alex +2 more
core +3 more sources
Applications of Post-Quantum Cryptography
With the constantly advancing capabilities of quantum computers, conventional cryptographic systems relying on complex math problems may encounter unforeseen vulnerabilities. Unlike regular computers, which are often deemed cost-ineffective in cryptographic attacks, quantum computers have a significant advantage in calculation speed.
Emils Bagirovs +3 more
openaire +2 more sources
Learning with Errors is easy with quantum samples
Learning with Errors is one of the fundamental problems in computational learning theory and has in the last years become the cornerstone of post-quantum cryptography.
Grilo, Alex B. +2 more
core +2 more sources
Practical cryptographic strategies in the post-quantum era
We review new frontiers in information security technologies in communications and distributed storage technologies with the use of classical, quantum, hybrid classical-quantum, and post-quantum cryptography.
Fedorov, A. K. +3 more
core +1 more source
The Case for Quantum Key Distribution [PDF]
Quantum key distribution (QKD) promises secure key agreement by using quantum mechanical systems. We argue that QKD will be an important part of future cryptographic infrastructures.
A.R. Dixon +20 more
core +8 more sources
Post-Quantum Delegated Proof of Luck for Blockchain Consensus Algorithm
The advancements in quantum computing and the potential for polynomial-time solutions to traditional public key cryptography (i.e., Rivest–Shamir–Adleman (RSA) and elliptic-curve cryptography (ECC)) using Shor’s algorithm pose a serious threat to the ...
Hyunjun Kim +4 more
doaj +1 more source
A Mathematical Perspective on Post-Quantum Cryptography
In 2016, the National Institute of Standards and Technology (NIST) announced an open competition with the goal of finding and standardizing suitable algorithms for quantum-resistant cryptography.
Maximilian Richter +3 more
doaj +1 more source

