Results 11 to 20 of about 1,613,397 (323)

Quantum Cryptography [PDF]

open access: yesReviews of Modern Physics, 2001
Quantum cryptography could well be the first application of quantum mechanics at the individual quanta level. The very fast progress in both theory and experiments over the recent years are reviewed, with emphasis on open questions and technological ...
Aspect, A.   +187 more
core   +9 more sources

Quantum Cryptography [PDF]

open access: yesContemporary Physics, 1995
Quantum cryptography is a new method for secret communications offering the ultimate security assurance of the inviolability of a Law of Nature.
Bell J. S.   +30 more
core   +2 more sources

Advances in quantum cryptography [PDF]

open access: yesAdvances in Optics and Photonics, 2019
Quantum cryptography is arguably the fastest growing area in quantum information science. Novel theoretical protocols are designed on a regular basis, security proofs are constantly improving, and experiments are gradually moving from proof-of-principle ...
S. Pirandola   +17 more
semanticscholar   +12 more sources

Tomographic Quantum Cryptography [PDF]

open access: yesPhysical Review A, 2003
We present a protocol for quantum cryptography in which the data obtained for mismatched bases are used in full for the purpose of quantum state tomography.
A. Beige   +28 more
core   +3 more sources

Counterfactual Quantum Cryptography [PDF]

open access: yesPhysical Review Letters, 2008
Quantum cryptography allows one to distribute a secret key between two remote parties using the fundamental principles of quantum mechanics. The well-known established paradigm for the quantum key distribution relies on the actual transmission of signal ...
C. H. Bennett   +5 more
core   +3 more sources

Beyond Binary: The Capabilities of Classical and Quantum Computing for Securing Data Transmission [PDF]

open access: yesE3S Web of Conferences, 2023
In the present times, the demand for sophisticated encryption methods has escalated, especially for securing data transmission in vulnerable environments.
Prasad Paruchuri B.V.N.   +4 more
doaj   +1 more source

Practical Analysis of Sending or Not-Sending Twin-Field Quantum Key Distribution with Frequency Side Channels

open access: yesApplied Sciences, 2021
The twin-field quantum key distribution (TF-QKD) and its variants can overcome the fundamental rate-distance limit of QKD. However, their physical implementations with the side channels remain the subject of further research.
Yi-Fei Lu   +9 more
doaj   +1 more source

Finite-Key Analysis of 1-Decoy Method Quantum Key Distribution with Intensity Fluctuation

open access: yesApplied Sciences, 2022
The decoy state quantum key distribution (QKD) protocol is proven to be an effective strategy against the photon number splitting attack. It was shown that the 1-decoy state protocol, easier to implement in the practical QKD system, outperforms the 2 ...
Chun Zhou   +7 more
doaj   +1 more source

Phase-Matching Quantum Key Distribution with Discrete Phase Randomization

open access: yesEntropy, 2021
The twin-field quantum key distribution (TF-QKD) protocol and its variations have been proposed to overcome the linear Pirandola–Laurenza–Ottaviani–Banchi (PLOB) bound.
Xiaoxu Zhang   +6 more
doaj   +1 more source

Cryptography: Advances in Secure Communication and Data Protection [PDF]

open access: yesE3S Web of Conferences, 2023
In the innovative work secure communication and data protection are being main field, which are emerged by cryptography as a fundamental pillar. Strong cryptographic methods are now essential given the rising reliance on digital technologies and the ...
Victor Melvin   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy