Results 41 to 50 of about 47,878 (305)
Secure and Efficient Code-Based Cryptography for Multi-Party Computation and Digital Signatures
Code-based cryptography is a promising candidate for post-quantum cryptography due to its strong security guarantees and efficient implementations. In this paper, we explore the use of code-based cryptography for multi-party computation and digital ...
Abdellatif Kichna, Abderrazak Farchane
doaj +1 more source
Quantum Oblivious Transfer: A Short Review
Quantum cryptography is the field of cryptography that explores the quantum properties of matter. Generally, it aims to develop primitives beyond the reach of classical cryptography and to improve existing classical implementations.
Manuel B. Santos+2 more
doaj +1 more source
Review of Chosen Isogeny-Based Cryptographic Schemes
Public-key cryptography provides security for digital systems and communication. Traditional cryptographic solutions are constantly improved, e.g., to suppress brute-force attacks.
Bartosz Drzazga, Łukasz Krzywiecki
doaj +1 more source
Relativistic quantum cryptography [PDF]
Quantum key distribution (QKD) is a concept of secret key exchange supported by fundamentals of quantum physics. Its perfect realization offers unconditional key security, however, known practical schemes are potentially vulnerable if the quantum channel loss exceeds a certain realization-specific bound.
K. S. Kravtsov+3 more
openaire +4 more sources
Quantum Stream Cipher Based on Holevo–Yuen Theory
In this review paper, we first introduce the basic concept of quantum computer-resistant cryptography, which is the cornerstone of security technology for the network of a new era.
Masaki Sohma, Osamu Hirota
doaj +1 more source
THE STATE OF STANDARDIZATION OF POST-QUANTUM CRYPTO-ALGORITHMS AT THE GLOBAL LEVEL
. In the digital age, cryptography is widely used in various important systems such as financial, military and government ones, medical records etc. The life of modern people is closely connected with the cryptography.
Oleksandra Tsentseria+3 more
doaj +1 more source
The relationship between two flavors of oblivious transfer at the quantum level [PDF]
Though all-or-nothing oblivious transfer and one-out-of-two oblivious transfer are equivalent in classical cryptography, we here show that due to the nature of quantum cryptography, a protocol built upon secure quantum all-or-nothing oblivious transfer ...
C. Crepeau+5 more
core +2 more sources
Elementary review article on quantum cryptography.
Norbert Lütkenhaus+2 more
openaire +3 more sources
Quantum Candies and Quantum Cryptography [PDF]
The field of quantum information is becoming more known to the general public. However, effectively demonstrating the concepts underneath quantum science and technology to the general public can be a challenging job. We investigate, extend, and much expand here "quantum candies" (invented by Jacobs), a pedagogical model for intuitively describing some ...
Junan Lin, Tal Mor
openaire +4 more sources
Fast cooling of trapped ion in strong sideband coupling regime
Trapped ion in the Lamb–Dicke (LD) regime with the LD parameter η ≪ 1 can be cooled down to its motional ground state using sideband cooling. Standard sideband cooling works in the weak sideband coupling (WSC) limit, where the sideband coupling strength ...
Shuo Zhang+4 more
doaj +1 more source