Results 41 to 50 of about 47,878 (305)

Secure and Efficient Code-Based Cryptography for Multi-Party Computation and Digital Signatures

open access: yesComputer Sciences & Mathematics Forum, 2023
Code-based cryptography is a promising candidate for post-quantum cryptography due to its strong security guarantees and efficient implementations. In this paper, we explore the use of code-based cryptography for multi-party computation and digital ...
Abdellatif Kichna, Abderrazak Farchane
doaj   +1 more source

Quantum Oblivious Transfer: A Short Review

open access: yesEntropy, 2022
Quantum cryptography is the field of cryptography that explores the quantum properties of matter. Generally, it aims to develop primitives beyond the reach of classical cryptography and to improve existing classical implementations.
Manuel B. Santos   +2 more
doaj   +1 more source

Review of Chosen Isogeny-Based Cryptographic Schemes

open access: yesCryptography, 2022
Public-key cryptography provides security for digital systems and communication. Traditional cryptographic solutions are constantly improved, e.g., to suppress brute-force attacks.
Bartosz Drzazga, Łukasz Krzywiecki
doaj   +1 more source

Relativistic quantum cryptography [PDF]

open access: yesLaser Physics Letters, 2014
Quantum key distribution (QKD) is a concept of secret key exchange supported by fundamentals of quantum physics. Its perfect realization offers unconditional key security, however, known practical schemes are potentially vulnerable if the quantum channel loss exceeds a certain realization-specific bound.
K. S. Kravtsov   +3 more
openaire   +4 more sources

Quantum Stream Cipher Based on Holevo–Yuen Theory

open access: yesEntropy, 2022
In this review paper, we first introduce the basic concept of quantum computer-resistant cryptography, which is the cornerstone of security technology for the network of a new era.
Masaki Sohma, Osamu Hirota
doaj   +1 more source

THE STATE OF STANDARDIZATION OF POST-QUANTUM CRYPTO-ALGORITHMS AT THE GLOBAL LEVEL

open access: yesАвтоматизация технологических и бизнес-процессов, 2023
. In the digital age, cryptography is widely used in various important systems such as financial, military and government ones, medical records etc. The life of modern people is closely connected with the cryptography.
Oleksandra Tsentseria   +3 more
doaj   +1 more source

The relationship between two flavors of oblivious transfer at the quantum level [PDF]

open access: yes, 2005
Though all-or-nothing oblivious transfer and one-out-of-two oblivious transfer are equivalent in classical cryptography, we here show that due to the nature of quantum cryptography, a protocol built upon secure quantum all-or-nothing oblivious transfer ...
C. Crepeau   +5 more
core   +2 more sources

Quantum cryptography

open access: yes, 2006
Elementary review article on quantum cryptography.
Norbert Lütkenhaus   +2 more
openaire   +3 more sources

Quantum Candies and Quantum Cryptography [PDF]

open access: yes, 2020
The field of quantum information is becoming more known to the general public. However, effectively demonstrating the concepts underneath quantum science and technology to the general public can be a challenging job. We investigate, extend, and much expand here "quantum candies" (invented by Jacobs), a pedagogical model for intuitively describing some ...
Junan Lin, Tal Mor
openaire   +4 more sources

Fast cooling of trapped ion in strong sideband coupling regime

open access: yesNew Journal of Physics, 2021
Trapped ion in the Lamb–Dicke (LD) regime with the LD parameter η ≪ 1 can be cooled down to its motional ground state using sideband cooling. Standard sideband cooling works in the weak sideband coupling (WSC) limit, where the sideband coupling strength ...
Shuo Zhang   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy