Results 271 to 280 of about 1,613,397 (323)
Quantum Advantage in Cryptography
Ever since its inception, cryptography has been caught in a vicious circle: Cryptographers keep inventing methods to hide information, and cryptanalysts break them, prompting cryptographers to invent even more sophisticated encryption schemes, and so on. But could it be that quantum information technology breaks this circle?
Renato Renner, Ramona Wolf
exaly +3 more sources
Though most people think they are science fiction, quantum cryptography systems are now operational, with prototypes protecting Internet traffic across metropolitan areas. These systems are so novel that we can consider quantum cryptography, or more properly, quantum key distribution (QKD), as the third and final insight to transform cryptography in ...
exaly +3 more sources
Some of the next articles are maybe not open access.
Related searches:
Related searches:
ACM Computing Surveys, 2007
We survey some results in quantum cryptography. After a brief introduction to classical cryptography, we provide the quantum-mechanical background needed to present some fundamental protocols from quantum cryptography. In particular, we review quantum key distribution via the BB84 protocol and its security proof, as well as the related quantum bit ...
Dagmar Bruß +4 more
exaly +2 more sources
We survey some results in quantum cryptography. After a brief introduction to classical cryptography, we provide the quantum-mechanical background needed to present some fundamental protocols from quantum cryptography. In particular, we review quantum key distribution via the BB84 protocol and its security proof, as well as the related quantum bit ...
Dagmar Bruß +4 more
exaly +2 more sources
Post Quantum Cryptography: A Review of Techniques, Challenges and Standardizations
International Conference on Information Networking, 2023The development of large quantum computers will have dire consequences for cryptography. Most of the symmetric and asymmetric cryptographic algorithms are vulnerable to quantum algorithms.
Ritik Bavdekar +4 more
semanticscholar +1 more source
Review of Security Methods Based on Classical Cryptography and Quantum Cryptography
Cybernetics and systems, 2023Classical cryptography is the process of hiding information and it manages the secret knowledge by encrypting the plain text message through the translation of it to an unintelligible message.
Shalini Subramani, S. M, K. A., S. Svn
semanticscholar +1 more source
High-Speed NTT-based Polynomial Multiplication Accelerator for Post-Quantum Cryptography
IEEE Symposium on Computer Arithmetic, 2021This paper demonstrates an architecture for accelerating the polynomial multiplication using number theoretic transform (NTT). Kyber is one of the finalists in the third round of the NIST post-quantum cryptography standardization process. Simultaneously,
Mojtaba Bisheh-Niasar +2 more
semanticscholar +1 more source
IEEE Transactions on Emerging Topics in Computing, 2023
Advances in quantum computing have brought the need for developing public-key cryptosystems secure against attacks potentially enabled by quantum computers.
Alvaro Cintas Canto +4 more
semanticscholar +1 more source
Advances in quantum computing have brought the need for developing public-key cryptosystems secure against attacks potentially enabled by quantum computers.
Alvaro Cintas Canto +4 more
semanticscholar +1 more source
Foundations of Physics, 2010
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
openaire +1 more source
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
openaire +1 more source
ACM SIGACT News, 1986
An idea of Stephen Wiesner [1] is expanded to give a method of public key distribution which is provably secure under the principles of quantum mechanics. It appears that this scheme could actually be implemented in favorable environments.
openaire +1 more source
An idea of Stephen Wiesner [1] is expanded to give a method of public key distribution which is provably secure under the principles of quantum mechanics. It appears that this scheme could actually be implemented in favorable environments.
openaire +1 more source
Changes to Quantum Cryptography
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2010Quantum cryptography has become a subject of widespread interest. In particular, quantum key distribution, which provides a secure key agreement by using quantum systems, is believed to be the most important application of quantum cryptography. Quantum key distribution has the potential to achieve the “unconditionally” secure infrastructure.
Yasuyuki Sakai, Hidema Tanaka
openaire +1 more source

