Results 1 to 10 of about 1,613,248 (185)
Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms. [PDF]
Recent developments in quantum computing have shed light on the shortcomings of the conventional public cryptosystem. Even while Shor’s algorithm cannot yet be implemented on quantum computers, it indicates that asymmetric key encryption will not be ...
Farooq S +6 more
europepmc +2 more sources
A critical analysis of deployed use cases for quantum key distribution and comparison with post-quantum cryptography. [PDF]
Quantum Key Distribution (QKD) is currently being discussed as a technology to safeguard communication in a future where quantum computers compromise traditional public-key cryptosystems.
Aquina N +9 more
europepmc +2 more sources
Graphical Methods in Device-Independent Quantum Cryptography [PDF]
We introduce a framework for graphical security proofs in device-independent quantum cryptography using the methods of categorical quantum mechanics. We are optimistic that this approach will make some of the highly complex proofs in quantum cryptography
Spencer Breiner +2 more
doaj +4 more sources
Post-Quantum and Code-Based Cryptography—Some Prospective Research Directions
Cryptography has been used from time immemorial for preserving the confidentiality of data/information in storage or transit. Thus, cryptography research has also been evolving from the classical Caesar cipher to the modern cryptosystems, based on ...
Chithralekha Balamurugan +3 more
doaj +3 more sources
Quantum Cryptography: Key Distribution and Beyond
Uniquely among the sciences, quantum cryptography has driven both foundational research as well as practical real-life applications. We review the progress of quantum cryptography in the last decade, covering quantum key distribution and other ...
Akshata Shenoy-Hejamadi +2 more
doaj +3 more sources
Post-quantum cryptography and the quantum future of cybersecurity. [PDF]
We review the current status of efforts to develop and deploy post-quantum cryptography on the Internet. Then we suggest specific ways in which quantum technologies might be used to enhance cybersecurity in the near future and beyond.
Liu YK, Moody D.
europepmc +2 more sources
Artificial intelligence and quantum cryptography
The technological advancements made in recent times, particularly in artificial intelligence (AI) and quantum computing, have brought about significant changes in technology. These advancements have profoundly impacted quantum cryptography, a field where
Petar Radanliev
doaj +2 more sources
Quantum Cryptography—A Simplified Undergraduate Experiment and Simulation
Quantum cryptography is a topic of considerable interest. A simple and robust experiment and theory for a senior level undergraduate investigation of quantum key distribution are described.
Yuval Bloom +3 more
doaj +3 more sources
The ideal quantum key distribution (QKD) protocol requires perfect random numbers for bit encoding and basis selecting. Perfect randomness is of great significance to the practical QKD system. However, due to the imperfection of practical quantum devices,
Xiao-Lei Jiang +6 more
doaj +1 more source
Sending or Not-Sending Twin-Field Quantum Key Distribution with Flawed and Leaky Sources
Twin-field quantum key distribution (TF-QKD) has attracted considerable attention and developed rapidly due to its ability to surpass the fundamental rate-distance limit of QKD.
Yi-Fei Lu +9 more
doaj +1 more source

