Results 31 to 40 of about 3,809 (250)

Quantum cryptography

open access: yesReviews of Modern Physics, 2002
Quantum cryptography could well be the first application of quantum mechanics at the individual quanta level. The very fast progress in both theory and experiments over the recent years are reviewed, with emphasis on open questions and technological issues.
Gisin, Nicolas   +3 more
openaire   +5 more sources

Quantum Stream Cipher Based on Holevo–Yuen Theory

open access: yesEntropy, 2022
In this review paper, we first introduce the basic concept of quantum computer-resistant cryptography, which is the cornerstone of security technology for the network of a new era.
Masaki Sohma, Osamu Hirota
doaj   +1 more source

Review of Chosen Isogeny-Based Cryptographic Schemes

open access: yesCryptography, 2022
Public-key cryptography provides security for digital systems and communication. Traditional cryptographic solutions are constantly improved, e.g., to suppress brute-force attacks.
Bartosz Drzazga, Łukasz Krzywiecki
doaj   +1 more source

THE STATE OF STANDARDIZATION OF POST-QUANTUM CRYPTO-ALGORITHMS AT THE GLOBAL LEVEL

open access: yesАвтоматизация технологических и бизнес-процессов, 2023
. In the digital age, cryptography is widely used in various important systems such as financial, military and government ones, medical records etc. The life of modern people is closely connected with the cryptography.
Oleksandra Tsentseria   +3 more
doaj   +1 more source

Counterfactual Quantum Cryptography [PDF]

open access: yesPhysical Review Letters, 2009
Quantum cryptography allows one to distribute a secret key between two remote parties using the fundamental principles of quantum mechanics. The well-known established paradigm for the quantum key distribution relies on the actual transmission of signal particle through a quantum channel.
openaire   +3 more sources

Autocompensating quantum cryptography

open access: yesNew Journal of Physics, 2002
18 pages, 6 figures, 1 table.
Bethune, Donald S., Risk, William P.
openaire   +2 more sources

Quantum Key Distribution for 5G Networks: A Review, State of Art and Future Directions

open access: yesFuture Internet, 2022
In recent years, 5G networks and services become progressively popular among telecommunication providers. Simultaneously, the growth in the usage and deployment of smartphone platforms and mobile applications have been seen as phenomenal. Therefore, this
Mohd Hirzi Adnan   +2 more
doaj   +1 more source

Quantum cryptography

open access: yes, 2011
This is a chapter on quantum cryptography for the book "A Multidisciplinary Introduction to Information Security" to be published by CRC Press in 2011/2012. The chapter aims to introduce the topic to undergraduate-level and continuing-education students specializing in information and communication technology.
Hjelme, Dag Roar   +2 more
  +6 more sources

Efficient Implementation of PRESENT and GIFT on Quantum Computers

open access: yesApplied Sciences, 2021
Grover search algorithm is the most representative quantum attack method that threatens the security of symmetric key cryptography. If the Grover search algorithm is applied to symmetric key cryptography, the security level of target symmetric key ...
Kyungbae Jang   +5 more
doaj   +1 more source

Fast cooling of trapped ion in strong sideband coupling regime

open access: yesNew Journal of Physics, 2021
Trapped ion in the Lamb–Dicke (LD) regime with the LD parameter η ≪ 1 can be cooled down to its motional ground state using sideband cooling. Standard sideband cooling works in the weak sideband coupling (WSC) limit, where the sideband coupling strength ...
Shuo Zhang   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy