Results 41 to 50 of about 1,613,397 (323)

Quantum cryptography

open access: yes, 2006
Elementary review article on quantum cryptography.
Dusek, Miloslav   +2 more
openaire   +3 more sources

Review of Chosen Isogeny-Based Cryptographic Schemes

open access: yesCryptography, 2022
Public-key cryptography provides security for digital systems and communication. Traditional cryptographic solutions are constantly improved, e.g., to suppress brute-force attacks.
Bartosz Drzazga, Łukasz Krzywiecki
doaj   +1 more source

A Framework for Migrating to Post-Quantum Cryptography: Security Dependency Analysis and Case Studies [PDF]

open access: yesIEEE Access, 2023
Quantum computing is emerging as a significant threat to information protected by widely used cryptographic systems. Cryptographic methods, once deemed secure for decades, are now at risk of being compromised, posing a massive threat to the security of ...
Khondokar Fida Hasan   +7 more
semanticscholar   +1 more source

THE STATE OF STANDARDIZATION OF POST-QUANTUM CRYPTO-ALGORITHMS AT THE GLOBAL LEVEL

open access: yesАвтоматизация технологических и бизнес-процессов, 2023
. In the digital age, cryptography is widely used in various important systems such as financial, military and government ones, medical records etc. The life of modern people is closely connected with the cryptography.
Oleksandra Tsentseria   +3 more
doaj   +1 more source

Quantum Erasure Cryptography [PDF]

open access: yes, 2016
The phenomenon of quantum erasure has long intrigued physicists, but has surprisingly found limited practical application. Here, we propose an erasure-based protocol for quantum key distribution (QKD) that promises inherent security against detector ...
Salih, Hatim
core   +3 more sources

Enhancing quantum cryptography with quantum dot single-photon sources [PDF]

open access: yesnpj Quantum Information, 2022
Quantum cryptography harnesses quantum light, in particular single photons, to provide security guarantees that cannot be reached by classical means. For each cryptographic task, the security feature of interest is directly related to the photons’ non ...
Mathieu Bozzio   +9 more
semanticscholar   +1 more source

Quantum-chaotic cryptography [PDF]

open access: yesQuantum Information Processing, 2018
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Glaucionor Lima de Oliveira   +1 more
openaire   +1 more source

Quantum-Resistant Cryptography

open access: yesCoRR, 2021
Quantum-resistant cryptography is cryptography that aims to deliver cryptographic functions and protocols that remain secure even if large-scale fault-tolerant quantum computers are built. NIST will soon announce the first selected public-key cryptography algorithms in its Post-Quantum Cryptography (PQC) standardization which is the most important ...
John Preuß Mattsson   +2 more
openaire   +2 more sources

A Survey of Post-Quantum Cryptography: Start of a New Race

open access: yesCryptogr., 2023
Information security is a fundamental and urgent issue in the digital transformation era. Cryptographic techniques and digital signatures have been applied to protect and authenticate relevant information.
Duc-Thuan Dam   +4 more
semanticscholar   +1 more source

On the computational hardness needed for quantum cryptography [PDF]

open access: yesIACR Cryptology ePrint Archive, 2022
In the classical model of computation, it is well established that one-way functions (OWF) are minimal for computational cryptography: They are essential for almost any cryptographic application that cannot be realized with respect to computationally ...
Z. Brakerski, R. Canetti, Luowen Qian
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy