Results 61 to 70 of about 90,413 (378)

International Symposium on Mathematics, Quantum Theory, and Cryptography [PDF]

open access: yes
This open access book presents selected papers from International Symposium on Mathematics, Quantum Theory, and Cryptography (MQC), which was held on September 25-27, 2019 in Fukuoka, Japan.

core   +4 more sources

From Golden to Unimodular Cryptography [PDF]

open access: yesChaos, Solitons and Fractals, 105 (2017) pp. 208-214, 2019
We introduce a natural generalization of the golden cryptography, which uses general unimodular matrices in place of the traditional Q-matrices, and prove that it preserves the original error correction properties of the encryption. Moreover, the additional parameters involved in generating the coding matrices make this unimodular cryptography ...
arxiv   +1 more source

Gaussian Post-selection for Continuous Variable Quantum Cryptography [PDF]

open access: yes, 2012
We extend the security proof for continuous variable quantum key distribution protocols using post selection to account for arbitrary eavesdropping attacks by employing the concept of an equivalent protocol where the post-selection is implemented as a ...
F. Grosshans   +5 more
core   +2 more sources

Survey of Promising Technologies for Quantum Drones and Networks

open access: yesIEEE Access, 2021
Due to recent advancements in quantum drones, the Internet of Quantum Drones (IoQDs), and Drone-to-Satellite connectivity, several advantages have been anticipated for real-time applications. This work examines quantum computing issues, including quantum
Adarsh Kumar   +6 more
doaj   +1 more source

Learning with Errors is easy with quantum samples

open access: yes, 2018
Learning with Errors is one of the fundamental problems in computational learning theory and has in the last years become the cornerstone of post-quantum cryptography.
Grilo, Alex B.   +2 more
core   +2 more sources

Post-Quantum Delegated Proof of Luck for Blockchain Consensus Algorithm

open access: yesApplied Sciences
The advancements in quantum computing and the potential for polynomial-time solutions to traditional public key cryptography (i.e., Rivest–Shamir–Adleman (RSA) and elliptic-curve cryptography (ECC)) using Shor’s algorithm pose a serious threat to the ...
Hyunjun Kim   +4 more
doaj   +1 more source

ANALYSIS OF THE CHANGE OF THE CONCEPT «FINANCIAL CRYPTOGRAPHY» ON THE BASIS OF 20 YEARS SUBJECTS OF THE INTERNATIONAL CONFERENCE «FINANCIAL CRYPTOGRAPHY AND DATA SECURITY»

open access: yesСтатистика и экономика, 2016
The article discusses the concept of «financial cryptography», which appeared in 1997 in the eponymous conference title and used abroad to date along with concepts of «quantum cryptography», «post-quantumcryptography», «lightweight cryptography» and ...
Alexander A. Varfolomeev
doaj   +1 more source

Current Status and Future Development of Quantum Cryptographic Protocols

open access: yes中国工程科学, 2022
Quantum computing has the capability of parallel computing and is superior to classical computing in solving some specific problems. Once a large-scale quantum computer is developed, the security of classical cryptographic algorithms and protocols, which
Zhang Xue   +3 more
doaj   +1 more source

The Impact of Quantum Computing on Present Cryptography

open access: yes, 2018
The aim of this paper is to elucidate the implications of quantum computing in present cryptography and to introduce the reader to basic post-quantum algorithms.
Jøsang, Audun   +3 more
core   +1 more source

Quantum Cryptography for Enhanced Network Security: A Comprehensive Survey of Research, Developments, and Future Directions [PDF]

open access: yesarXiv, 2023
With the ever-growing concern for internet security, the field of quantum cryptography emerges as a promising solution for enhancing the security of networking systems. In this paper, 20 notable papers from leading conferences and journals are reviewed and categorized based on their focus on various aspects of quantum cryptography, including key ...
arxiv  

Home - About - Disclaimer - Privacy