Results 51 to 60 of about 1,469,683 (369)

The relationship between two flavors of oblivious transfer at the quantum level [PDF]

open access: yes, 2005
Though all-or-nothing oblivious transfer and one-out-of-two oblivious transfer are equivalent in classical cryptography, we here show that due to the nature of quantum cryptography, a protocol built upon secure quantum all-or-nothing oblivious transfer ...
C. Crepeau   +5 more
core   +2 more sources

Quantum cryptography

open access: yes, 2006
Elementary review article on quantum cryptography.
Norbert Lütkenhaus   +2 more
openaire   +3 more sources

Quantum Candies and Quantum Cryptography [PDF]

open access: yes, 2020
The field of quantum information is becoming more known to the general public. However, effectively demonstrating the concepts underneath quantum science and technology to the general public can be a challenging job. We investigate, extend, and much expand here "quantum candies" (invented by Jacobs), a pedagogical model for intuitively describing some ...
Junan Lin, Tal Mor
openaire   +4 more sources

Side-channel Analysis of Lattice-based Post-quantum Cryptography: Exploiting Polynomial Multiplication

open access: yesIACR Cryptology ePrint Archive, 2022
Polynomial multiplication algorithms such as Toom-Cook and the Number Theoretic Transform are fundamental building blocks for lattice-based post-quantum cryptography.
Catinca Mujdei   +5 more
semanticscholar   +1 more source

Securing the future internet of things with post‐quantum cryptography [PDF]

open access: yesSecurity and Privacy, 2021
Traditional and lightweight cryptography primitives and protocols are insecure against quantum attacks. Thus, a real‐time application using traditional or lightweight cryptography primitives and protocols does not ensure full‐proof security. Post‐quantum
Adarsh Kumar   +3 more
semanticscholar   +1 more source

Fast cooling of trapped ion in strong sideband coupling regime

open access: yesNew Journal of Physics, 2021
Trapped ion in the Lamb–Dicke (LD) regime with the LD parameter η ≪ 1 can be cooled down to its motional ground state using sideband cooling. Standard sideband cooling works in the weak sideband coupling (WSC) limit, where the sideband coupling strength ...
Shuo Zhang   +4 more
doaj   +1 more source

Quantum Cryptography-as-a-Service for Secure UAV Communication: Applications, Challenges, and Case Study

open access: yesIEEE Access, 2022
The sudden demand rises in security made researchers come up with solutions that provide instantaneous safety better than the state of the art solutions. The quest for securing data began in the Spartan era. People are now looking to expand this field of
Vishakha K. Ralegankar   +6 more
semanticscholar   +1 more source

Quantum Key Distribution for 5G Networks: A Review, State of Art and Future Directions

open access: yesFuture Internet, 2022
In recent years, 5G networks and services become progressively popular among telecommunication providers. Simultaneously, the growth in the usage and deployment of smartphone platforms and mobile applications have been seen as phenomenal. Therefore, this
Mohd Hirzi Adnan   +2 more
doaj   +1 more source

Assumptions in quantum cryptography [PDF]

open access: yesarXiv: Quantum Physics, 2014
PhD Thesis, 221 ...
openaire   +3 more sources

Efficient Implementation of PRESENT and GIFT on Quantum Computers

open access: yesApplied Sciences, 2021
Grover search algorithm is the most representative quantum attack method that threatens the security of symmetric key cryptography. If the Grover search algorithm is applied to symmetric key cryptography, the security level of target symmetric key ...
Kyungbae Jang   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy