Results 21 to 30 of about 3,809 (250)

Improving the performance of practical decoy-state quantum key distribution with advantage distillation technology

open access: yesCommunications Physics, 2022
Advantage distillation technology increases the collection between raw keys in quantum key distribution systems. Combining a decoy state method with advantage distillation technology, the authors demonstrate improved maximal transmission distance and ...
Hong-Wei Li   +3 more
doaj   +1 more source

Post-Quantum and Code-Based Cryptography—Some Prospective Research Directions

open access: yesCryptography, 2021
Cryptography has been used from time immemorial for preserving the confidentiality of data/information in storage or transit. Thus, cryptography research has also been evolving from the classical Caesar cipher to the modern cryptosystems, based on ...
Chithralekha Balamurugan   +3 more
doaj   +1 more source

A Survey of Cryptographic Algorithms in Cybersecurity: From Classical Methods to Quantum-Resistant Solutions

open access: yesShifra, 2023
As quantum computing technology evolves, it poses greater risks to current cryptography schemes such as RSA and Elliptic Curve Cryptography (ECC), widely used to secure digital communications These classical algorithms are based on mathematical problems
Swapnali N Tambe-Jagtap
doaj   +1 more source

Tomographic quantum cryptography [PDF]

open access: yesPhysical Review A, 2003
REVTeX4, 9 pages, 3 figures, 1 ...
Liang, Y.C.   +4 more
openaire   +3 more sources

ON QUANTUM CRYPTOGRAPHY [PDF]

open access: yesЖУРНАЛ ЗА БЕЗБЈЕДНОСТ И КРИМИНАЛИСТИКУ, 2019
In the late twentieth century, human race entered the era ofinformation technology (IT). The IT industry, which deals with the production,processing, storage and transmission of information, has become an integralpart of the global economic system, a completely independent and significantsector of the economy.
Jaćimovski, Stevo   +2 more
openaire   +3 more sources

Secure and Efficient Code-Based Cryptography for Multi-Party Computation and Digital Signatures

open access: yesComputer Sciences & Mathematics Forum, 2023
Code-based cryptography is a promising candidate for post-quantum cryptography due to its strong security guarantees and efficient implementations. In this paper, we explore the use of code-based cryptography for multi-party computation and digital ...
Abdellatif Kichna, Abderrazak Farchane
doaj   +1 more source

Single Photon Quantum Cryptography [PDF]

open access: yesPhysical Review Letters, 2002
We report the full implementation of a quantum cryptography protocol using a stream of single photon pulses generated by a stable and efficient source operating at room temperature. The single photon pulses are emitted on demand by a single nitrogen-vacancy (NV) color center in a diamond nanocrystal. The quantum bit error rate is less that 4.6% and the
Beveratos, Alexios   +5 more
openaire   +4 more sources

Variations of QKD Protocols Based on Conventional System Measurements: A Literature Review

open access: yesCryptography, 2022
Cryptography is an unexpected revolution in information security in the recent decades, where remarkable improvements have been created to provide confidentiality and integrity.
Abdulbast A. Abushgra
doaj   +1 more source

Quantum Cryptography Without Switching [PDF]

open access: yesPhysical Review Letters, 2004
We propose a new coherent state quantum key distribution protocol that eliminates the need to randomly switch between measurement bases. This protocol provides significantly higher secret key rates with increased bandwidths than previous schemes that only make single quadrature measurements.
Weedbrook, C.   +5 more
openaire   +4 more sources

Quantum Oblivious Transfer: A Short Review

open access: yesEntropy, 2022
Quantum cryptography is the field of cryptography that explores the quantum properties of matter. Generally, it aims to develop primitives beyond the reach of classical cryptography and to improve existing classical implementations.
Manuel B. Santos   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy