Results 51 to 60 of about 47,878 (305)

Quantum Key Distribution for 5G Networks: A Review, State of Art and Future Directions

open access: yesFuture Internet, 2022
In recent years, 5G networks and services become progressively popular among telecommunication providers. Simultaneously, the growth in the usage and deployment of smartphone platforms and mobile applications have been seen as phenomenal. Therefore, this
Mohd Hirzi Adnan   +2 more
doaj   +1 more source

Assumptions in quantum cryptography [PDF]

open access: yesarXiv: Quantum Physics, 2014
PhD Thesis, 221 ...
openaire   +3 more sources

Quantum Erasure Cryptography [PDF]

open access: yesFrontiers in Physics, 2016
The phenomenon of quantum erasure has long intrigued physicists, but has surprisingly found limited practical application. Here, we propose an erasure-based protocol for quantum key distribution (QKD) that promises inherent security against detector attacks.
openaire   +4 more sources

A novel image encryption scheme based on quantum dynamical spinning and rotations. [PDF]

open access: yesPLoS ONE, 2018
Quantum information processing made a tremendous and remarkable impact on number of classical mechanic's problems. The impact does not only stop at classical mechanics but also the cyber security paradigm.
Majid Khan, Hafiz Muhammad Waseem
doaj   +1 more source

Efficient Implementation of PRESENT and GIFT on Quantum Computers

open access: yesApplied Sciences, 2021
Grover search algorithm is the most representative quantum attack method that threatens the security of symmetric key cryptography. If the Grover search algorithm is applied to symmetric key cryptography, the security level of target symmetric key ...
Kyungbae Jang   +5 more
doaj   +1 more source

Quantum Cryptography

open access: yes, 2009
There is no abstract for this review article.
Lo, Hoi-Kwong, Zhao, Yi
openaire   +2 more sources

Quantum Cryptography in Algorithmica

open access: yesProceedings of the 55th Annual ACM Symposium on Theory of Computing, 2023
35 pages.
Kretschmer, William   +3 more
openaire   +2 more sources

Optimized Implementation and Analysis of CHAM in Quantum Computing

open access: yesApplied Sciences, 2023
A quantum computer capable of running the Grover search algorithm, which reduces the complexity of brute-force attacks by a square root, has the potential to undermine the security strength of symmetric-key cryptography and hash functions.
Yujin Yang   +3 more
doaj   +1 more source

An Enhanced Architecture to Resolve Public-Key Cryptographic Issues in the Internet of Things (IoT), Employing Quantum Computing Supremacy

open access: yesSensors, 2022
The Internet of Things (IoT) strongly influences the world economy; this emphasizes the importance of securing all four aspects of the IoT model: sensors, networks, cloud, and applications.
Shuhab Shamshad   +4 more
doaj   +1 more source

A New Era of Cryptography : Quantum Cryptography [PDF]

open access: yesInternational Journal on Cryptography and Information Security, 2016
ABSTRACT Security is the first priority in today digital world for secure communication between sender and receiver. Various Cryptography techniques are developed time to time for secure communication. Quantum Cryptography is one of the latest and advanced cryptography technique, it is different from all other cryptography technique and more secure ...
openaire   +2 more sources

Home - About - Disclaimer - Privacy