Results 51 to 60 of about 1,469,683 (369)
The relationship between two flavors of oblivious transfer at the quantum level [PDF]
Though all-or-nothing oblivious transfer and one-out-of-two oblivious transfer are equivalent in classical cryptography, we here show that due to the nature of quantum cryptography, a protocol built upon secure quantum all-or-nothing oblivious transfer ...
C. Crepeau +5 more
core +2 more sources
Elementary review article on quantum cryptography.
Norbert Lütkenhaus +2 more
openaire +3 more sources
Quantum Candies and Quantum Cryptography [PDF]
The field of quantum information is becoming more known to the general public. However, effectively demonstrating the concepts underneath quantum science and technology to the general public can be a challenging job. We investigate, extend, and much expand here "quantum candies" (invented by Jacobs), a pedagogical model for intuitively describing some ...
Junan Lin, Tal Mor
openaire +4 more sources
Polynomial multiplication algorithms such as Toom-Cook and the Number Theoretic Transform are fundamental building blocks for lattice-based post-quantum cryptography.
Catinca Mujdei +5 more
semanticscholar +1 more source
Securing the future internet of things with post‐quantum cryptography [PDF]
Traditional and lightweight cryptography primitives and protocols are insecure against quantum attacks. Thus, a real‐time application using traditional or lightweight cryptography primitives and protocols does not ensure full‐proof security. Post‐quantum
Adarsh Kumar +3 more
semanticscholar +1 more source
Fast cooling of trapped ion in strong sideband coupling regime
Trapped ion in the Lamb–Dicke (LD) regime with the LD parameter η ≪ 1 can be cooled down to its motional ground state using sideband cooling. Standard sideband cooling works in the weak sideband coupling (WSC) limit, where the sideband coupling strength ...
Shuo Zhang +4 more
doaj +1 more source
The sudden demand rises in security made researchers come up with solutions that provide instantaneous safety better than the state of the art solutions. The quest for securing data began in the Spartan era. People are now looking to expand this field of
Vishakha K. Ralegankar +6 more
semanticscholar +1 more source
Quantum Key Distribution for 5G Networks: A Review, State of Art and Future Directions
In recent years, 5G networks and services become progressively popular among telecommunication providers. Simultaneously, the growth in the usage and deployment of smartphone platforms and mobile applications have been seen as phenomenal. Therefore, this
Mohd Hirzi Adnan +2 more
doaj +1 more source
Assumptions in quantum cryptography [PDF]
PhD Thesis, 221 ...
openaire +3 more sources
Efficient Implementation of PRESENT and GIFT on Quantum Computers
Grover search algorithm is the most representative quantum attack method that threatens the security of symmetric key cryptography. If the Grover search algorithm is applied to symmetric key cryptography, the security level of target symmetric key ...
Kyungbae Jang +5 more
doaj +1 more source

