Results 41 to 50 of about 1,484,925 (333)

Quantum Key Distribution for 5G Networks: A Review, State of Art and Future Directions

open access: yesFuture Internet, 2022
In recent years, 5G networks and services become progressively popular among telecommunication providers. Simultaneously, the growth in the usage and deployment of smartphone platforms and mobile applications have been seen as phenomenal. Therefore, this
Mohd Hirzi Adnan   +2 more
doaj   +1 more source

Fast cooling of trapped ion in strong sideband coupling regime

open access: yesNew Journal of Physics, 2021
Trapped ion in the Lamb–Dicke (LD) regime with the LD parameter η ≪ 1 can be cooled down to its motional ground state using sideband cooling. Standard sideband cooling works in the weak sideband coupling (WSC) limit, where the sideband coupling strength ...
Shuo Zhang   +4 more
doaj   +1 more source

Efficient Implementation of PRESENT and GIFT on Quantum Computers

open access: yesApplied Sciences, 2021
Grover search algorithm is the most representative quantum attack method that threatens the security of symmetric key cryptography. If the Grover search algorithm is applied to symmetric key cryptography, the security level of target symmetric key ...
Kyungbae Jang   +5 more
doaj   +1 more source

A novel image encryption scheme based on quantum dynamical spinning and rotations. [PDF]

open access: yesPLoS ONE, 2018
Quantum information processing made a tremendous and remarkable impact on number of classical mechanic's problems. The impact does not only stop at classical mechanics but also the cyber security paradigm.
Majid Khan, Hafiz Muhammad Waseem
doaj   +1 more source

Side-channel Analysis of Lattice-based Post-quantum Cryptography: Exploiting Polynomial Multiplication

open access: yesIACR Cryptology ePrint Archive, 2022
Polynomial multiplication algorithms such as Toom-Cook and the Number Theoretic Transform are fundamental building blocks for lattice-based post-quantum cryptography.
Catinca Mujdei   +5 more
semanticscholar   +1 more source

An Enhanced Architecture to Resolve Public-Key Cryptographic Issues in the Internet of Things (IoT), Employing Quantum Computing Supremacy

open access: yesSensors, 2022
The Internet of Things (IoT) strongly influences the world economy; this emphasizes the importance of securing all four aspects of the IoT model: sensors, networks, cloud, and applications.
Shuhab Shamshad   +4 more
doaj   +1 more source

Learning with Errors is easy with quantum samples

open access: yes, 2018
Learning with Errors is one of the fundamental problems in computational learning theory and has in the last years become the cornerstone of post-quantum cryptography.
Grilo, Alex B.   +2 more
core   +2 more sources

Quantum Cryptography-as-a-Service for Secure UAV Communication: Applications, Challenges, and Case Study

open access: yesIEEE Access, 2022
The sudden demand rises in security made researchers come up with solutions that provide instantaneous safety better than the state of the art solutions. The quest for securing data began in the Spartan era. People are now looking to expand this field of
Vishakha K. Ralegankar   +6 more
semanticscholar   +1 more source

Free-Space Quantum Key Distribution

open access: yes, 2016
Based on the firm laws of physics rather than unproven foundations of mathematical complexity, quantum cryptography provides a radically different solution for encryption and promises unconditional security.
Carrasco-Casado, Alberto   +2 more
core   +1 more source

Multipartite Classical and Quantum Secrecy Monotones [PDF]

open access: yes, 2002
In order to study multipartite quantum cryptography, we introduce quantities which vanish on product probability distributions, and which can only decrease if the parties carry out local operations or carry out public classical communication.
A. Wehrl   +22 more
core   +2 more sources

Home - About - Disclaimer - Privacy