Results 1 to 10 of about 1,549,156 (197)

Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms. [PDF]

open access: yesSensors (Basel), 2023
Recent developments in quantum computing have shed light on the shortcomings of the conventional public cryptosystem. Even while Shor’s algorithm cannot yet be implemented on quantum computers, it indicates that asymmetric key encryption will not be ...
Farooq S   +6 more
europepmc   +2 more sources

Post-quantum cryptography and the quantum future of cybersecurity. [PDF]

open access: yesPhys Rev Appl
We review the current status of efforts to develop and deploy post-quantum cryptography on the Internet. Then we suggest specific ways in which quantum technologies might be used to enhance cybersecurity in the near future and beyond.
Liu YK, Moody D.
europepmc   +2 more sources

Artificial intelligence and quantum cryptography

open access: yesJournal of Analytical Science and Technology
The technological advancements made in recent times, particularly in artificial intelligence (AI) and quantum computing, have brought about significant changes in technology. These advancements have profoundly impacted quantum cryptography, a field where
Petar Radanliev
doaj   +2 more sources

Quantum Cryptography [PDF]

open access: yes, 2021
AbstractThe Internet can be thought of as a channel of information being sent from you to everyone else connected to the Internet. If you wanted to transmit your sensitive information (such as bank account numbers or military secrets) over the Internet, then you have to ensure that only the persons you intend to read your information have access to ...
Pawel Sniatala   +2 more
  +9 more sources

Quantum cryptography [PDF]

open access: yesContemporary Physics, 1995
36 pages in compressed PostScript format, 10 PostScript figures compressed tar ...
Hughes, Richard J.   +5 more
openaire   +3 more sources

Weak Randomness Analysis of Measurement-Device-Independent Quantum Key Distribution with Finite Resources

open access: yesPhotonics, 2022
The ideal quantum key distribution (QKD) protocol requires perfect random numbers for bit encoding and basis selecting. Perfect randomness is of great significance to the practical QKD system. However, due to the imperfection of practical quantum devices,
Xiao-Lei Jiang   +6 more
doaj   +1 more source

Quantum cryptography

open access: yesJournal of the Society of Mechanical Engineers, 2006
Elementary review article on quantum cryptography.
Dusek, Miloslav   +2 more
  +6 more sources

Finite-Key Analysis of 1-Decoy Method Quantum Key Distribution with Intensity Fluctuation

open access: yesApplied Sciences, 2022
The decoy state quantum key distribution (QKD) protocol is proven to be an effective strategy against the photon number splitting attack. It was shown that the 1-decoy state protocol, easier to implement in the practical QKD system, outperforms the 2 ...
Chun Zhou   +7 more
doaj   +1 more source

Semi-quantum cryptography [PDF]

open access: yesQuantum Information Processing, 2020
Semi-quantum communication, a model introduced in 2007 by M. Boyer, D. Kenigsberg, and T. Mor (PRL 99 140501), involves the use of fully-quantum users and semi-quantum, or "classical" users. These restricted users are only allowed to interact with the quantum channel in a limited manner. Originally introduced to study the key-distribution problem, semi-
Iqbal, Hasan, Krawec, Walter O.
openaire   +3 more sources

Sending or Not-Sending Twin-Field Quantum Key Distribution with Flawed and Leaky Sources

open access: yesEntropy, 2021
Twin-field quantum key distribution (TF-QKD) has attracted considerable attention and developed rapidly due to its ability to surpass the fundamental rate-distance limit of QKD.
Yi-Fei Lu   +9 more
doaj   +1 more source

Home - About - Disclaimer - Privacy