Results 31 to 40 of about 3,809 (250)
Quantum cryptography could well be the first application of quantum mechanics at the individual quanta level. The very fast progress in both theory and experiments over the recent years are reviewed, with emphasis on open questions and technological issues.
Gisin, Nicolas +3 more
openaire +5 more sources
Quantum Stream Cipher Based on Holevo–Yuen Theory
In this review paper, we first introduce the basic concept of quantum computer-resistant cryptography, which is the cornerstone of security technology for the network of a new era.
Masaki Sohma, Osamu Hirota
doaj +1 more source
Review of Chosen Isogeny-Based Cryptographic Schemes
Public-key cryptography provides security for digital systems and communication. Traditional cryptographic solutions are constantly improved, e.g., to suppress brute-force attacks.
Bartosz Drzazga, Łukasz Krzywiecki
doaj +1 more source
THE STATE OF STANDARDIZATION OF POST-QUANTUM CRYPTO-ALGORITHMS AT THE GLOBAL LEVEL
. In the digital age, cryptography is widely used in various important systems such as financial, military and government ones, medical records etc. The life of modern people is closely connected with the cryptography.
Oleksandra Tsentseria +3 more
doaj +1 more source
Counterfactual Quantum Cryptography [PDF]
Quantum cryptography allows one to distribute a secret key between two remote parties using the fundamental principles of quantum mechanics. The well-known established paradigm for the quantum key distribution relies on the actual transmission of signal particle through a quantum channel.
openaire +3 more sources
Autocompensating quantum cryptography
18 pages, 6 figures, 1 table.
Bethune, Donald S., Risk, William P.
openaire +2 more sources
Quantum Key Distribution for 5G Networks: A Review, State of Art and Future Directions
In recent years, 5G networks and services become progressively popular among telecommunication providers. Simultaneously, the growth in the usage and deployment of smartphone platforms and mobile applications have been seen as phenomenal. Therefore, this
Mohd Hirzi Adnan +2 more
doaj +1 more source
This is a chapter on quantum cryptography for the book "A Multidisciplinary Introduction to Information Security" to be published by CRC Press in 2011/2012. The chapter aims to introduce the topic to undergraduate-level and continuing-education students specializing in information and communication technology.
Hjelme, Dag Roar +2 more
+6 more sources
Efficient Implementation of PRESENT and GIFT on Quantum Computers
Grover search algorithm is the most representative quantum attack method that threatens the security of symmetric key cryptography. If the Grover search algorithm is applied to symmetric key cryptography, the security level of target symmetric key ...
Kyungbae Jang +5 more
doaj +1 more source
Fast cooling of trapped ion in strong sideband coupling regime
Trapped ion in the Lamb–Dicke (LD) regime with the LD parameter η ≪ 1 can be cooled down to its motional ground state using sideband cooling. Standard sideband cooling works in the weak sideband coupling (WSC) limit, where the sideband coupling strength ...
Shuo Zhang +4 more
doaj +1 more source

