Results 271 to 280 of about 1,613,397 (323)

Quantum Advantage in Cryptography

open access: yesAIAA Journal, 2023
Ever since its inception, cryptography has been caught in a vicious circle: Cryptographers keep inventing methods to hide information, and cryptanalysts break them, prompting cryptographers to invent even more sophisticated encryption schemes, and so on. But could it be that quantum information technology breaks this circle?
Renato Renner, Ramona Wolf
exaly   +3 more sources

Quantum cryptography

open access: yesIEEE Security and Privacy, 2004
Though most people think they are science fiction, quantum cryptography systems are now operational, with prototypes protecting Internet traffic across metropolitan areas. These systems are so novel that we can consider quantum cryptography, or more properly, quantum key distribution (QKD), as the third and final insight to transform cryptography in ...
exaly   +3 more sources

Quantum cryptography

ACM Computing Surveys, 2007
We survey some results in quantum cryptography. After a brief introduction to classical cryptography, we provide the quantum-mechanical background needed to present some fundamental protocols from quantum cryptography. In particular, we review quantum key distribution via the BB84 protocol and its security proof, as well as the related quantum bit ...
Dagmar Bruß   +4 more
exaly   +2 more sources

Post Quantum Cryptography: A Review of Techniques, Challenges and Standardizations

International Conference on Information Networking, 2023
The development of large quantum computers will have dire consequences for cryptography. Most of the symmetric and asymmetric cryptographic algorithms are vulnerable to quantum algorithms.
Ritik Bavdekar   +4 more
semanticscholar   +1 more source

Review of Security Methods Based on Classical Cryptography and Quantum Cryptography

Cybernetics and systems, 2023
Classical cryptography is the process of hiding information and it manages the secret knowledge by encrypting the plain text message through the translation of it to an unintelligible message.
Shalini Subramani, S. M, K. A., S. Svn
semanticscholar   +1 more source

High-Speed NTT-based Polynomial Multiplication Accelerator for Post-Quantum Cryptography

IEEE Symposium on Computer Arithmetic, 2021
This paper demonstrates an architecture for accelerating the polynomial multiplication using number theoretic transform (NTT). Kyber is one of the finalists in the third round of the NIST post-quantum cryptography standardization process. Simultaneously,
Mojtaba Bisheh-Niasar   +2 more
semanticscholar   +1 more source

Error Detection Schemes Assessed on FPGA for Multipliers in Lattice-Based Key Encapsulation Mechanisms in Post-Quantum Cryptography

IEEE Transactions on Emerging Topics in Computing, 2023
Advances in quantum computing have brought the need for developing public-key cryptosystems secure against attacks potentially enabled by quantum computers.
Alvaro Cintas Canto   +4 more
semanticscholar   +1 more source

Quantum Cryptography

Foundations of Physics, 2010
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
openaire   +1 more source

Quantum cryptography

ACM SIGACT News, 1986
An idea of Stephen Wiesner [1] is expanded to give a method of public key distribution which is provably secure under the principles of quantum mechanics. It appears that this scheme could actually be implemented in favorable environments.
openaire   +1 more source

Changes to Quantum Cryptography

IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2010
Quantum cryptography has become a subject of widespread interest. In particular, quantum key distribution, which provides a secure key agreement by using quantum systems, is believed to be the most important application of quantum cryptography. Quantum key distribution has the potential to achieve the “unconditionally” secure infrastructure.
Yasuyuki Sakai, Hidema Tanaka
openaire   +1 more source

Home - About - Disclaimer - Privacy