Results 21 to 30 of about 1,876,216 (276)

Sending or Not-Sending Twin-Field Quantum Key Distribution with Flawed and Leaky Sources

open access: yesEntropy, 2021
Twin-field quantum key distribution (TF-QKD) has attracted considerable attention and developed rapidly due to its ability to surpass the fundamental rate-distance limit of QKD.
Yi-Fei Lu   +9 more
doaj   +1 more source

Practical Analysis of Sending or Not-Sending Twin-Field Quantum Key Distribution with Frequency Side Channels

open access: yesApplied Sciences, 2021
The twin-field quantum key distribution (TF-QKD) and its variants can overcome the fundamental rate-distance limit of QKD. However, their physical implementations with the side channels remain the subject of further research.
Yi-Fei Lu   +9 more
doaj   +1 more source

One-Wayness in Quantum Cryptography [PDF]

open access: yesIACR Cryptology ePrint Archive, 2022
The existence of one-way functions is one of the most fundamental assumptions in classical cryptography. In the quantum world, on the other hand, there are evidences that some cryptographic primitives can exist even if one-way functions do not exist.
T. Morimae, Takashi Yamakawa
semanticscholar   +1 more source

Phase-Matching Quantum Key Distribution with Discrete Phase Randomization

open access: yesEntropy, 2021
The twin-field quantum key distribution (TF-QKD) protocol and its variations have been proposed to overcome the linear Pirandola–Laurenza–Ottaviani–Banchi (PLOB) bound.
Xiaoxu Zhang   +6 more
doaj   +1 more source

Finite-Key Analysis of 1-Decoy Method Quantum Key Distribution with Intensity Fluctuation

open access: yesApplied Sciences, 2022
The decoy state quantum key distribution (QKD) protocol is proven to be an effective strategy against the photon number splitting attack. It was shown that the 1-decoy state protocol, easier to implement in the practical QKD system, outperforms the 2 ...
Chun Zhou   +7 more
doaj   +1 more source

Status report on the third round of the NIST post-quantum cryptography standardization process

open access: yesRadiotekhnika, 2022
In recent years, there has been steady progress in the creation of quantum computers. If large-scale quantum computers are implemented, they will threaten the security of many widely used public-key cryptosystems.
M.V. Yesina   +2 more
semanticscholar   +1 more source

ON QUANTUM CRYPTOGRAPHY [PDF]

open access: yesЖУРНАЛ ЗА БЕЗБЈЕДНОСТ И КРИМИНАЛИСТИКУ, 2019
In the late twentieth century, human race entered the era ofinformation technology (IT). The IT industry, which deals with the production,processing, storage and transmission of information, has become an integralpart of the global economic system, a completely independent and significantsector of the economy.
Jaćimovski, Stevo   +2 more
openaire   +3 more sources

Security Analysis of Sending or Not-Sending Twin-Field Quantum Key Distribution with Weak Randomness

open access: yesEntropy, 2022
Sending-or-not sending twin-field quantum key distribution (SNS TF-QKD) has the advantage of tolerating large amounts of misalignment errors, and its key rate can exceed the linear bound of repeaterless quantum key distribution.
Xiao-Lei Jiang   +5 more
doaj   +1 more source

A Survey of Post-Quantum Cryptography: Start of a New Race

open access: yesCryptogr., 2023
Information security is a fundamental and urgent issue in the digital transformation era. Cryptographic techniques and digital signatures have been applied to protect and authenticate relevant information.
Duc-Thuan Dam   +4 more
semanticscholar   +1 more source

Power Network Optimization: A Quantum Approach

open access: yesIEEE Access, 2023
Optimization of electricity surplus is a crucial element for transmission power networks since it leads to reducing costs as well as increasing efficiency across the network as a whole.
Giuseppe Colucci   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy