Results 11 to 20 of about 1,876,216 (276)

Quantum Cryptography in Algorithmica [PDF]

open access: yesProceedings of the 55th Annual ACM Symposium on Theory of Computing, 2023
35 pages.
Kretschmer, William   +3 more
openaire   +3 more sources

Quantum Cryptography—A Simplified Undergraduate Experiment and Simulation

open access: yesPhysics, 2022
Quantum cryptography is a topic of considerable interest. A simple and robust experiment and theory for a senior level undergraduate investigation of quantum key distribution are described.
Yuval Bloom   +3 more
doaj   +2 more sources

Security in quantum cryptography [PDF]

open access: yesReviews of Modern Physics, 2022
Quantum cryptography exploits principles of quantum physics for the secure processing of information. A prominent example is secure communication, i.e., the task of transmitting confidential messages from one location to another. The cryptographic requirement here is that the transmitted messages remain inaccessible to anyone other than the designated ...
Christopher Portmann, Renato Renner
openaire   +3 more sources

Quantum Advantage in Cryptography [PDF]

open access: yesAIAA Journal, 2023
Ever since its inception, cryptography has been caught in a vicious circle: Cryptographers keep inventing methods to hide information, and cryptanalysts break them, prompting cryptographers to invent even more sophisticated encryption schemes, and so on. But could it be that quantum information technology breaks this circle?
Renato Renner, Ramona Wolf
openaire   +3 more sources

Enhancing quantum cryptography with quantum dot single-photon sources [PDF]

open access: yesnpj Quantum Information, 2022
Quantum cryptography harnesses quantum light, in particular single photons, to provide security guarantees that cannot be reached by classical means. For each cryptographic task, the security feature of interest is directly related to the photons’ non ...
Mathieu Bozzio   +9 more
semanticscholar   +1 more source

On the computational hardness needed for quantum cryptography [PDF]

open access: yesIACR Cryptology ePrint Archive, 2022
In the classical model of computation, it is well established that one-way functions (OWF) are minimal for computational cryptography: They are essential for almost any cryptographic application that cannot be realized with respect to computationally ...
Zvika Brakerski, R. Canetti, Luowen Qian
semanticscholar   +1 more source

Beyond Binary: The Capabilities of Classical and Quantum Computing for Securing Data Transmission [PDF]

open access: yesE3S Web of Conferences, 2023
In the present times, the demand for sophisticated encryption methods has escalated, especially for securing data transmission in vulnerable environments.
Prasad Paruchuri B.V.N.   +4 more
doaj   +1 more source

Weak Randomness Analysis of Measurement-Device-Independent Quantum Key Distribution with Finite Resources

open access: yesPhotonics, 2022
The ideal quantum key distribution (QKD) protocol requires perfect random numbers for bit encoding and basis selecting. Perfect randomness is of great significance to the practical QKD system. However, due to the imperfection of practical quantum devices,
Xiao-Lei Jiang   +6 more
doaj   +1 more source

Cryptography: Advances in Secure Communication and Data Protection [PDF]

open access: yesE3S Web of Conferences, 2023
In the innovative work secure communication and data protection are being main field, which are emerged by cryptography as a fundamental pillar. Strong cryptographic methods are now essential given the rising reliance on digital technologies and the ...
Victor Melvin   +4 more
doaj   +1 more source

Terahertz Quantum Cryptography [PDF]

open access: yesIEEE Journal on Selected Areas in Communications, 2020
REVTeX. 14 pages. 5 figures.
Carlo Ottaviani   +6 more
openaire   +5 more sources

Home - About - Disclaimer - Privacy