Results 51 to 60 of about 1,876,216 (276)
The relationship between two flavors of oblivious transfer at the quantum level [PDF]
Though all-or-nothing oblivious transfer and one-out-of-two oblivious transfer are equivalent in classical cryptography, we here show that due to the nature of quantum cryptography, a protocol built upon secure quantum all-or-nothing oblivious transfer ...
C. Crepeau+5 more
core +2 more sources
Elementary review article on quantum cryptography.
Norbert Lütkenhaus+2 more
openaire +3 more sources
Masked Accelerators and Instruction Set Extensions for Post-Quantum Cryptography
Side-channel attacks can break mathematically secure cryptographic systems leading to a major concern in applied cryptography. While the cryptanalysis and security evaluation of Post-Quantum Cryptography (PQC) have already received an increasing research
Tim Fritzmann+6 more
semanticscholar +1 more source
Quantum cryptography with highly entangled photons from semiconductor quantum dots [PDF]
Fiber-based quantum cryptography between two buildings is demonstrated using entangled photons from a GaAs quantum dot. Semiconductor quantum dots are capable of emitting polarization entangled photon pairs with ultralow multipair emission probability ...
C. Schimpf+8 more
semanticscholar +1 more source
Quantum Candies and Quantum Cryptography [PDF]
The field of quantum information is becoming more known to the general public. However, effectively demonstrating the concepts underneath quantum science and technology to the general public can be a challenging job. We investigate, extend, and much expand here "quantum candies" (invented by Jacobs), a pedagogical model for intuitively describing some ...
Junan Lin, Tal Mor
openaire +4 more sources
Fast cooling of trapped ion in strong sideband coupling regime
Trapped ion in the Lamb–Dicke (LD) regime with the LD parameter η ≪ 1 can be cooled down to its motional ground state using sideband cooling. Standard sideband cooling works in the weak sideband coupling (WSC) limit, where the sideband coupling strength ...
Shuo Zhang+4 more
doaj +1 more source
Experimental authentication of quantum key distribution with post-quantum cryptography [PDF]
Quantum key distribution (QKD) can provide information theoretically secure key exchange even in the era of quantum computers. However, QKD requires the classical channel to be authenticated, the current method for which is pre-sharing symmetric keys ...
Liu-Jun Wang+11 more
semanticscholar +1 more source
In recent years, public-key cryptography has become a fundamental component of digital infrastructures. Such a scenario has to face a new and increasing threat, represented by quantum computers.
P. Nannipieri+5 more
semanticscholar +1 more source
Quantum Key Distribution for 5G Networks: A Review, State of Art and Future Directions
In recent years, 5G networks and services become progressively popular among telecommunication providers. Simultaneously, the growth in the usage and deployment of smartphone platforms and mobile applications have been seen as phenomenal. Therefore, this
Mohd Hirzi Adnan+2 more
doaj +1 more source
Quantum-Resistant Cryptography [PDF]
Quantum-resistant cryptography is cryptography that aims to deliver cryptographic functions and protocols that remain secure even if large-scale fault-tolerant quantum computers are built. NIST will soon announce the first selected public-key cryptography algorithms in its Post-Quantum Cryptography (PQC) standardization which is the most important ...
arxiv