Results 21 to 30 of about 1,469,683 (369)

Cryptography: Advances in Secure Communication and Data Protection [PDF]

open access: yesE3S Web of Conferences, 2023
In the innovative work secure communication and data protection are being main field, which are emerged by cryptography as a fundamental pillar. Strong cryptographic methods are now essential given the rising reliance on digital technologies and the ...
Victor Melvin   +4 more
doaj   +1 more source

Terahertz Quantum Cryptography [PDF]

open access: yesIEEE Journal on Selected Areas in Communications, 2020
REVTeX. 14 pages. 5 figures.
Carlo Ottaviani   +6 more
openaire   +6 more sources

Finite-Key Analysis of 1-Decoy Method Quantum Key Distribution with Intensity Fluctuation

open access: yesApplied Sciences, 2022
The decoy state quantum key distribution (QKD) protocol is proven to be an effective strategy against the photon number splitting attack. It was shown that the 1-decoy state protocol, easier to implement in the practical QKD system, outperforms the 2 ...
Chun Zhou   +7 more
doaj   +1 more source

A Framework for Migrating to Post-Quantum Cryptography: Security Dependency Analysis and Case Studies [PDF]

open access: yesIEEE Access, 2023
Quantum computing is emerging as a significant threat to information protected by widely used cryptographic systems. Cryptographic methods, once deemed secure for decades, are now at risk of being compromised, posing a massive threat to the security of ...
Khondokar Fida Hasan   +7 more
semanticscholar   +1 more source

Phase-Matching Quantum Key Distribution with Discrete Phase Randomization

open access: yesEntropy, 2021
The twin-field quantum key distribution (TF-QKD) protocol and its variations have been proposed to overcome the linear Pirandola–Laurenza–Ottaviani–Banchi (PLOB) bound.
Xiaoxu Zhang   +6 more
doaj   +1 more source

Quantum Cryptography for Enhanced Network Security: A Comprehensive Survey of Research, Developments, and Future Directions [PDF]

open access: yesBigData Congress [Services Society], 2023
With the ever-growing concern for internet security, the field of quantum cryptography emerges as a promising solution for enhancing the security of networking systems.
Mst. Shapna Akter
semanticscholar   +1 more source

Security Analysis of Sending or Not-Sending Twin-Field Quantum Key Distribution with Weak Randomness

open access: yesEntropy, 2022
Sending-or-not sending twin-field quantum key distribution (SNS TF-QKD) has the advantage of tolerating large amounts of misalignment errors, and its key rate can exceed the linear bound of repeaterless quantum key distribution.
Xiao-Lei Jiang   +5 more
doaj   +1 more source

ON QUANTUM CRYPTOGRAPHY [PDF]

open access: yesЖУРНАЛ ЗА БЕЗБЈЕДНОСТ И КРИМИНАЛИСТИКУ, 2019
In the late twentieth century, human race entered the era ofinformation technology (IT). The IT industry, which deals with the production,processing, storage and transmission of information, has become an integralpart of the global economic system, a completely independent and significantsector of the economy.
Jaćimovski, Stevo   +2 more
openaire   +3 more sources

Power Network Optimization: A Quantum Approach

open access: yesIEEE Access, 2023
Optimization of electricity surplus is a crucial element for transmission power networks since it leads to reducing costs as well as increasing efficiency across the network as a whole.
Giuseppe Colucci   +2 more
doaj   +1 more source

Practical Security of High-Dimensional Quantum Key Distribution with Intensity Modulator Extinction

open access: yesEntropy, 2022
Quantum key distribution (QKD) has attracted much attention due to its unconditional security. High-dimensional quantum key distribution (HD-QKD) is a brand-new type of QKD protocol that has many excellent advantages. Nonetheless, practical imperfections
Yang Wang   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy