Results 1 to 10 of about 1,549,156 (197)
Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms. [PDF]
Recent developments in quantum computing have shed light on the shortcomings of the conventional public cryptosystem. Even while Shor’s algorithm cannot yet be implemented on quantum computers, it indicates that asymmetric key encryption will not be ...
Farooq S +6 more
europepmc +2 more sources
Post-quantum cryptography and the quantum future of cybersecurity. [PDF]
We review the current status of efforts to develop and deploy post-quantum cryptography on the Internet. Then we suggest specific ways in which quantum technologies might be used to enhance cybersecurity in the near future and beyond.
Liu YK, Moody D.
europepmc +2 more sources
Artificial intelligence and quantum cryptography
The technological advancements made in recent times, particularly in artificial intelligence (AI) and quantum computing, have brought about significant changes in technology. These advancements have profoundly impacted quantum cryptography, a field where
Petar Radanliev
doaj +2 more sources
AbstractThe Internet can be thought of as a channel of information being sent from you to everyone else connected to the Internet. If you wanted to transmit your sensitive information (such as bank account numbers or military secrets) over the Internet, then you have to ensure that only the persons you intend to read your information have access to ...
Pawel Sniatala +2 more
+9 more sources
36 pages in compressed PostScript format, 10 PostScript figures compressed tar ...
Hughes, Richard J. +5 more
openaire +3 more sources
The ideal quantum key distribution (QKD) protocol requires perfect random numbers for bit encoding and basis selecting. Perfect randomness is of great significance to the practical QKD system. However, due to the imperfection of practical quantum devices,
Xiao-Lei Jiang +6 more
doaj +1 more source
Elementary review article on quantum cryptography.
Dusek, Miloslav +2 more
+6 more sources
Finite-Key Analysis of 1-Decoy Method Quantum Key Distribution with Intensity Fluctuation
The decoy state quantum key distribution (QKD) protocol is proven to be an effective strategy against the photon number splitting attack. It was shown that the 1-decoy state protocol, easier to implement in the practical QKD system, outperforms the 2 ...
Chun Zhou +7 more
doaj +1 more source
Semi-quantum cryptography [PDF]
Semi-quantum communication, a model introduced in 2007 by M. Boyer, D. Kenigsberg, and T. Mor (PRL 99 140501), involves the use of fully-quantum users and semi-quantum, or "classical" users. These restricted users are only allowed to interact with the quantum channel in a limited manner. Originally introduced to study the key-distribution problem, semi-
Iqbal, Hasan, Krawec, Walter O.
openaire +3 more sources
Sending or Not-Sending Twin-Field Quantum Key Distribution with Flawed and Leaky Sources
Twin-field quantum key distribution (TF-QKD) has attracted considerable attention and developed rapidly due to its ability to surpass the fundamental rate-distance limit of QKD.
Yi-Fei Lu +9 more
doaj +1 more source

