Results 1 to 10 of about 1,613,248 (185)

Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms. [PDF]

open access: yesSensors (Basel), 2023
Recent developments in quantum computing have shed light on the shortcomings of the conventional public cryptosystem. Even while Shor’s algorithm cannot yet be implemented on quantum computers, it indicates that asymmetric key encryption will not be ...
Farooq S   +6 more
europepmc   +2 more sources

A critical analysis of deployed use cases for quantum key distribution and comparison with post-quantum cryptography. [PDF]

open access: yesEPJ Quantum Technol
Quantum Key Distribution (QKD) is currently being discussed as a technology to safeguard communication in a future where quantum computers compromise traditional public-key cryptosystems.
Aquina N   +9 more
europepmc   +2 more sources

Graphical Methods in Device-Independent Quantum Cryptography [PDF]

open access: yesQuantum, 2019
We introduce a framework for graphical security proofs in device-independent quantum cryptography using the methods of categorical quantum mechanics. We are optimistic that this approach will make some of the highly complex proofs in quantum cryptography
Spencer Breiner   +2 more
doaj   +4 more sources

Post-Quantum and Code-Based Cryptography—Some Prospective Research Directions

open access: yesCryptography, 2021
Cryptography has been used from time immemorial for preserving the confidentiality of data/information in storage or transit. Thus, cryptography research has also been evolving from the classical Caesar cipher to the modern cryptosystems, based on ...
Chithralekha Balamurugan   +3 more
doaj   +3 more sources

Quantum Cryptography: Key Distribution and Beyond

open access: yesQuanta, 2018
Uniquely among the sciences, quantum cryptography has driven both foundational research as well as practical real-life applications. We review the progress of quantum cryptography in the last decade, covering quantum key distribution and other ...
Akshata Shenoy-Hejamadi   +2 more
doaj   +3 more sources

Post-quantum cryptography and the quantum future of cybersecurity. [PDF]

open access: yesPhys Rev Appl
We review the current status of efforts to develop and deploy post-quantum cryptography on the Internet. Then we suggest specific ways in which quantum technologies might be used to enhance cybersecurity in the near future and beyond.
Liu YK, Moody D.
europepmc   +2 more sources

Artificial intelligence and quantum cryptography

open access: yesJournal of Analytical Science and Technology
The technological advancements made in recent times, particularly in artificial intelligence (AI) and quantum computing, have brought about significant changes in technology. These advancements have profoundly impacted quantum cryptography, a field where
Petar Radanliev
doaj   +2 more sources

Quantum Cryptography—A Simplified Undergraduate Experiment and Simulation

open access: yesPhysics, 2022
Quantum cryptography is a topic of considerable interest. A simple and robust experiment and theory for a senior level undergraduate investigation of quantum key distribution are described.
Yuval Bloom   +3 more
doaj   +3 more sources

Weak Randomness Analysis of Measurement-Device-Independent Quantum Key Distribution with Finite Resources

open access: yesPhotonics, 2022
The ideal quantum key distribution (QKD) protocol requires perfect random numbers for bit encoding and basis selecting. Perfect randomness is of great significance to the practical QKD system. However, due to the imperfection of practical quantum devices,
Xiao-Lei Jiang   +6 more
doaj   +1 more source

Sending or Not-Sending Twin-Field Quantum Key Distribution with Flawed and Leaky Sources

open access: yesEntropy, 2021
Twin-field quantum key distribution (TF-QKD) has attracted considerable attention and developed rapidly due to its ability to surpass the fundamental rate-distance limit of QKD.
Yi-Fei Lu   +9 more
doaj   +1 more source

Home - About - Disclaimer - Privacy