Results 1 to 10 of about 1,662,521 (167)
Practical Security of High-Dimensional Quantum Key Distribution with Intensity Modulator Extinction [PDF]
Quantum key distribution (QKD) has attracted much attention due to its unconditional security. High-dimensional quantum key distribution (HD-QKD) is a brand-new type of QKD protocol that has many excellent advantages. Nonetheless, practical imperfections
Yang Wang +6 more
doaj +2 more sources
Trojan-horse attacks threaten the security of practical quantum cryptography [PDF]
A quantum key distribution (QKD) system may be probed by an eavesdropper Eve by sending in bright light from the quantum channel and analyzing the back-reflections. We propose and experimentally demonstrate a setup for mounting such a Trojan-horse attack.
Nitin Jain +5 more
doaj +4 more sources
Practical Methods for Information Security Risk Management [PDF]
The purpose of this paper is to present some directions to perform the risk man-agement for information security. The article follows to practical methods through question-naire that asses the internal control, and through evaluation based on existing ...
Cristian AMANCEI
doaj +2 more sources
Joint photon-number splitting attack on semi-quantum key distribution
Semi-quantum key distribution is based on the basic principle of quantum mechanics, which allows a classical user and quantum user to use information theory to have a secure shared key.
Shang Mi +6 more
doaj +1 more source
Sending or Not-Sending Twin-Field Quantum Key Distribution with Flawed and Leaky Sources
Twin-field quantum key distribution (TF-QKD) has attracted considerable attention and developed rapidly due to its ability to surpass the fundamental rate-distance limit of QKD.
Yi-Fei Lu +9 more
doaj +1 more source
The twin-field quantum key distribution (TF-QKD) and its variants can overcome the fundamental rate-distance limit of QKD. However, their physical implementations with the side channels remain the subject of further research.
Yi-Fei Lu +9 more
doaj +1 more source
A Review of Security Evaluation of Practical Quantum Key Distribution System
Although the unconditional security of quantum key distribution (QKD) has been widely studied, the imperfections of the practical devices leave potential loopholes for Eve to spy the final key.
Shihai Sun, Anqi Huang
doaj +1 more source
Security of quantum key distribution with source and detection imperfections
In practice, the device imperfections might introduce deviations from the idealized models used in the security proofs of quantum key distribution (QKD). This requires the refined security analysis for practical QKD. However, in most of previous analysis,
Shihai Sun, Feihu Xu
doaj +1 more source
In quantum key distribution (QKD), there are some security loopholes opened by the gaps between the theoretical model and the practical system, and they may be exploited by eavesdroppers (Eve) to obtain secret key information without being detected. This
Yi Zheng +4 more
doaj +1 more source
AMERICAN SECURITY ASSISTANCE TO UKRAINE: MECHANISMS AND PRACTICAL IMPLEMENTATIONS
The purpose of the article is to research basis, experience, and practical ways of the implementation of U.S. security (defense) assistance to Ukraine. The current study considers the institutional and legal framework for providing U.S.
Marharyta Lymar, Iryna Tykhonenko
doaj +1 more source

