Results 31 to 40 of about 5,946 (156)

Cryptanalysis of a multi-party quantum key agreement protocol with single particles

open access: yes, 2013
Recently, Sun et al. [Quant Inf Proc DOI: 10.1007/s11128-013-0569-x] presented an efficient multi-party quantum key agreement (QKA) protocol by employing single particles and unitary operations.
Gao, Fei   +4 more
core   +1 more source

A Highly Efficient ECPM Quantum Circuit for Binary Elliptic Curve Cryptanalysis

open access: yesIEEE Access
This paper provides a detailed analysis and estimation of the quantum resources required for depth-optimized elliptic curve point multiplication (ECPM), with a focus on qubits, Toffoli gates, CNOT gates, and circuit depth.
Rini Wisnu Wardhani   +3 more
doaj   +1 more source

A framework for reducing the overhead of the quantum oracle for use with Grover’s algorithm with applications to cryptanalysis of SIKE

open access: yesJournal of Mathematical Cryptology, 2020
In this paper we provide a framework for applying classical search and preprocessing to quantum oracles for use with Grover’s quantum search algorithm in order to lower the quantum circuit-complexity of Grover’s algorithm for single-target search ...
Biasse Jean-François, Pring Benjamin
doaj   +1 more source

Improvement of a quantum broadcasting multiple blind signature scheme based on quantum teleportation

open access: yes, 2015
Recently, a broadcasting multiple blind signature scheme based on quantum teleportation has been proposed for the first time. It is claimed to have unconditional security and properties of quantum multiple signature and quantum blind signature.
Qiu, Daowen, Zhang, Wei, Zou, Xiangfu
core   +1 more source

Using quantum key distribution for cryptographic purposes: a survey

open access: yes, 2014
The appealing feature of quantum key distribution (QKD), from a cryptographic viewpoint, is the ability to prove the information-theoretic security (ITS) of the established keys. As a key establishment primitive, QKD however does not provide a standalone
,   +23 more
core   +3 more sources

Hyperchaos‐Driven 3D RGB Image Scrambling and Encryption for Multi‐Image Security

open access: yesIET Image Processing, Volume 20, Issue 1, January/December 2026.
The proposed encryption scheme scrambles N colour images by stacking them into a three‐dimensional red, green, blue image, generating a secure 256‐bit key using SHA‐256 and a user‐provided salt, and applying a five‐dimensional multi‐wing hyperchaotic system to produce random key streams.
Muhammad Hanif   +6 more
wiley   +1 more source

Quantum Truncated Differential Attacks Using Convolutions

open access: yesIACR Transactions on Symmetric Cryptology
This paper focuses on quantum key-recovery attacks on block ciphers. Previous works on quantum differential and truncated differential attacks like [Kaplan et al., ToSC 2016] have shown that classical algorithms for key-recovery, typically based on ...
Aurel Pichollet-Mugnier   +1 more
doaj   +1 more source

Cryptanalysis of the arbitrated quantum signature protocols

open access: yes, 2011
As a new model for signing quantum message, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal.
Gao, Fei   +3 more
core   +1 more source

SPHINCS$^+$ post-quantum digital signature scheme with Streebog hash function

open access: yes, 2020
Many commonly used public key cryptosystems will become insecure once a scalable quantum computer is built. New cryptographic schemes that can guarantee protection against attacks with quantum computers, so-called post-quantum algorithms, have emerged in
Anufriev, M. N.   +5 more
core   +1 more source

Enhancing E‐Commerce Security Based on Involution Function Using Twin Key AES Cipher

open access: yesIET Information Security, Volume 2026, Issue 1, 2026.
In the realm of surging e‐commerce data and increasing digital transactions, ensuring end‐to‐end security is paramount to protect sensitive information and maintain user trust. The Advanced Encryption Standard (AES), a cornerstone of network security, relies on symmetric key encryption for secure communication.
Biresh Kumar   +11 more
wiley   +1 more source

Home - About - Disclaimer - Privacy