Results 51 to 60 of about 47,878 (305)
Quantum Key Distribution for 5G Networks: A Review, State of Art and Future Directions
In recent years, 5G networks and services become progressively popular among telecommunication providers. Simultaneously, the growth in the usage and deployment of smartphone platforms and mobile applications have been seen as phenomenal. Therefore, this
Mohd Hirzi Adnan+2 more
doaj +1 more source
Assumptions in quantum cryptography [PDF]
PhD Thesis, 221 ...
openaire +3 more sources
Quantum Erasure Cryptography [PDF]
The phenomenon of quantum erasure has long intrigued physicists, but has surprisingly found limited practical application. Here, we propose an erasure-based protocol for quantum key distribution (QKD) that promises inherent security against detector attacks.
openaire +4 more sources
A novel image encryption scheme based on quantum dynamical spinning and rotations. [PDF]
Quantum information processing made a tremendous and remarkable impact on number of classical mechanic's problems. The impact does not only stop at classical mechanics but also the cyber security paradigm.
Majid Khan, Hafiz Muhammad Waseem
doaj +1 more source
Efficient Implementation of PRESENT and GIFT on Quantum Computers
Grover search algorithm is the most representative quantum attack method that threatens the security of symmetric key cryptography. If the Grover search algorithm is applied to symmetric key cryptography, the security level of target symmetric key ...
Kyungbae Jang+5 more
doaj +1 more source
Quantum Cryptography in Algorithmica
35 pages.
Kretschmer, William+3 more
openaire +2 more sources
Optimized Implementation and Analysis of CHAM in Quantum Computing
A quantum computer capable of running the Grover search algorithm, which reduces the complexity of brute-force attacks by a square root, has the potential to undermine the security strength of symmetric-key cryptography and hash functions.
Yujin Yang+3 more
doaj +1 more source
The Internet of Things (IoT) strongly influences the world economy; this emphasizes the importance of securing all four aspects of the IoT model: sensors, networks, cloud, and applications.
Shuhab Shamshad+4 more
doaj +1 more source
A New Era of Cryptography : Quantum Cryptography [PDF]
ABSTRACT Security is the first priority in today digital world for secure communication between sender and receiver. Various Cryptography techniques are developed time to time for secure communication. Quantum Cryptography is one of the latest and advanced cryptography technique, it is different from all other cryptography technique and more secure ...
openaire +2 more sources