Results 1 to 10 of about 3,809 (250)
AbstractThe Internet can be thought of as a channel of information being sent from you to everyone else connected to the Internet. If you wanted to transmit your sensitive information (such as bank account numbers or military secrets) over the Internet, then you have to ensure that only the persons you intend to read your information have access to ...
Pawel Sniatala +2 more
+9 more sources
36 pages in compressed PostScript format, 10 PostScript figures compressed tar ...
Hughes, Richard J. +5 more
openaire +3 more sources
The ideal quantum key distribution (QKD) protocol requires perfect random numbers for bit encoding and basis selecting. Perfect randomness is of great significance to the practical QKD system. However, due to the imperfection of practical quantum devices,
Xiao-Lei Jiang +6 more
doaj +1 more source
Elementary review article on quantum cryptography.
Dusek, Miloslav +2 more
+6 more sources
Sending or Not-Sending Twin-Field Quantum Key Distribution with Flawed and Leaky Sources
Twin-field quantum key distribution (TF-QKD) has attracted considerable attention and developed rapidly due to its ability to surpass the fundamental rate-distance limit of QKD.
Yi-Fei Lu +9 more
doaj +1 more source
Semi-quantum cryptography [PDF]
Semi-quantum communication, a model introduced in 2007 by M. Boyer, D. Kenigsberg, and T. Mor (PRL 99 140501), involves the use of fully-quantum users and semi-quantum, or "classical" users. These restricted users are only allowed to interact with the quantum channel in a limited manner. Originally introduced to study the key-distribution problem, semi-
Iqbal, Hasan, Krawec, Walter O.
openaire +3 more sources
The twin-field quantum key distribution (TF-QKD) and its variants can overcome the fundamental rate-distance limit of QKD. However, their physical implementations with the side channels remain the subject of further research.
Yi-Fei Lu +9 more
doaj +1 more source
Beyond Binary: The Capabilities of Classical and Quantum Computing for Securing Data Transmission [PDF]
In the present times, the demand for sophisticated encryption methods has escalated, especially for securing data transmission in vulnerable environments.
Prasad Paruchuri B.V.N. +4 more
doaj +1 more source
Terahertz Quantum Cryptography [PDF]
REVTeX. 14 pages. 5 figures.
Carlo Ottaviani +6 more
openaire +5 more sources
Finite-Key Analysis of 1-Decoy Method Quantum Key Distribution with Intensity Fluctuation
The decoy state quantum key distribution (QKD) protocol is proven to be an effective strategy against the photon number splitting attack. It was shown that the 1-decoy state protocol, easier to implement in the practical QKD system, outperforms the 2 ...
Chun Zhou +7 more
doaj +1 more source

