Results 51 to 60 of about 1,876,216 (276)

The relationship between two flavors of oblivious transfer at the quantum level [PDF]

open access: yes, 2005
Though all-or-nothing oblivious transfer and one-out-of-two oblivious transfer are equivalent in classical cryptography, we here show that due to the nature of quantum cryptography, a protocol built upon secure quantum all-or-nothing oblivious transfer ...
C. Crepeau   +5 more
core   +2 more sources

Quantum cryptography

open access: yes, 2006
Elementary review article on quantum cryptography.
Norbert Lütkenhaus   +2 more
openaire   +3 more sources

Masked Accelerators and Instruction Set Extensions for Post-Quantum Cryptography

open access: yesIACR Cryptology ePrint Archive, 2021
Side-channel attacks can break mathematically secure cryptographic systems leading to a major concern in applied cryptography. While the cryptanalysis and security evaluation of Post-Quantum Cryptography (PQC) have already received an increasing research
Tim Fritzmann   +6 more
semanticscholar   +1 more source

Quantum cryptography with highly entangled photons from semiconductor quantum dots [PDF]

open access: yesScience Advances, 2020
Fiber-based quantum cryptography between two buildings is demonstrated using entangled photons from a GaAs quantum dot. Semiconductor quantum dots are capable of emitting polarization entangled photon pairs with ultralow multipair emission probability ...
C. Schimpf   +8 more
semanticscholar   +1 more source

Quantum Candies and Quantum Cryptography [PDF]

open access: yes, 2020
The field of quantum information is becoming more known to the general public. However, effectively demonstrating the concepts underneath quantum science and technology to the general public can be a challenging job. We investigate, extend, and much expand here "quantum candies" (invented by Jacobs), a pedagogical model for intuitively describing some ...
Junan Lin, Tal Mor
openaire   +4 more sources

Fast cooling of trapped ion in strong sideband coupling regime

open access: yesNew Journal of Physics, 2021
Trapped ion in the Lamb–Dicke (LD) regime with the LD parameter η ≪ 1 can be cooled down to its motional ground state using sideband cooling. Standard sideband cooling works in the weak sideband coupling (WSC) limit, where the sideband coupling strength ...
Shuo Zhang   +4 more
doaj   +1 more source

Experimental authentication of quantum key distribution with post-quantum cryptography [PDF]

open access: yesnpj Quantum Information, 2020
Quantum key distribution (QKD) can provide information theoretically secure key exchange even in the era of quantum computers. However, QKD requires the classical channel to be authenticated, the current method for which is pre-sharing symmetric keys ...
Liu-Jun Wang   +11 more
semanticscholar   +1 more source

A RISC-V Post Quantum Cryptography Instruction Set Extension for Number Theoretic Transform to Speed-Up CRYSTALS Algorithms

open access: yesIEEE Access, 2021
In recent years, public-key cryptography has become a fundamental component of digital infrastructures. Such a scenario has to face a new and increasing threat, represented by quantum computers.
P. Nannipieri   +5 more
semanticscholar   +1 more source

Quantum Key Distribution for 5G Networks: A Review, State of Art and Future Directions

open access: yesFuture Internet, 2022
In recent years, 5G networks and services become progressively popular among telecommunication providers. Simultaneously, the growth in the usage and deployment of smartphone platforms and mobile applications have been seen as phenomenal. Therefore, this
Mohd Hirzi Adnan   +2 more
doaj   +1 more source

Quantum-Resistant Cryptography [PDF]

open access: yesarXiv, 2021
Quantum-resistant cryptography is cryptography that aims to deliver cryptographic functions and protocols that remain secure even if large-scale fault-tolerant quantum computers are built. NIST will soon announce the first selected public-key cryptography algorithms in its Post-Quantum Cryptography (PQC) standardization which is the most important ...
arxiv  

Home - About - Disclaimer - Privacy