Results 51 to 60 of about 1,484,925 (333)

Quantum Cryptography

open access: yes, 1995
Quantum cryptography is a new method for secret communications offering the ultimate security assurance of the inviolability of a Law of Nature.
Bell J. S.   +30 more
core   +1 more source

Optimized Implementation and Analysis of CHAM in Quantum Computing

open access: yesApplied Sciences, 2023
A quantum computer capable of running the Grover search algorithm, which reduces the complexity of brute-force attacks by a square root, has the potential to undermine the security strength of symmetric-key cryptography and hash functions.
Yujin Yang   +3 more
doaj   +1 more source

Gaussian Quantum Information [PDF]

open access: yes, 2011
The science of quantum information has arisen over the last two decades centered on the manipulation of individual quanta of information, known as quantum bits or qubits.
Arthurs, E.   +48 more
core   +2 more sources

Protocols and plan of quantum cryptography [PDF]

open access: yesVojnotehnički Glasnik, 2012
Along with the development of confidentiality of data and resources, there is a need to develop systems that would provide confidentiality. Currently, the most used systems are classical cryptographic systems and encryption public key systems.
Milorad S. Markagić
doaj   +1 more source

Single photon quantum cryptography [PDF]

open access: yes, 2002
We report the full implementation of a quantum cryptography protocol using a stream of single photon pulses generated by a stable and efficient source operating at room temperature.
A. Beveratos   +10 more
core   +2 more sources

QUANTUM CRYPTOGRAPHY AND U.S. DIGITAL SECURITY: A COMPREHENSIVE REVIEW: INVESTIGATING THE POTENTIAL OF QUANTUM TECHNOLOGIES IN CREATING UNBREAKABLE ENCRYPTION AND THEIR FUTURE IN NATIONAL SECURITY

open access: yesComputer Science & IT Research Journal
This study provides a comprehensive review of quantum cryptography and its implications for U.S. national security in the face of emerging quantum technologies.
Sedat Sonko   +4 more
semanticscholar   +1 more source

Recent Advances in Post-Quantum Cryptography for Networks: A Survey

open access: yes2022 Seventh International Conference On Mobile And Secure Services (MobiSecServ), 2022
The development of quantum computers poses a new security threat to network infrastructures and services, as they will be powerful enough to break the most common forms of digital encryption.
Engin Zeydan   +3 more
semanticscholar   +1 more source

Circuit-noise-resilient virtual distillation

open access: yesCommunications Physics
Quantum error mitigation (QEM) is vital for improving quantum algorithms’ accuracy on noisy near-term devices. A typical QEM method, called Virtual Distillation (VD), can suffer from imperfect implementation, potentially leading to worse outcomes than ...
Xiao-Yue Xu   +4 more
doaj   +1 more source

Removing Homocoupling Defects in Alkoxy/Alkyl‐PBTTT Enhances Polymer:Fullerene Co‐Crystal Formation and Stability

open access: yesAdvanced Functional Materials, EarlyView.
PBTTT‐OR‐R, a C14‐alkoxy/alkyl‐PBTTT polymer derivative, is of substantial interest for optoelectronics due to its specific fullerene intercalation behavior and enhanced charge‐transfer absorption. Comparing this polymer with (S) and without (O) homocoupling defects reveals that PBTTT‐OR‐R(O) forms stable co‐crystals with PC61BM, while PBTTT‐OR‐R(S ...
Zhen Liu   +14 more
wiley   +1 more source

Tomographic Quantum Cryptography

open access: yes, 2003
We present a protocol for quantum cryptography in which the data obtained for mismatched bases are used in full for the purpose of quantum state tomography.
A. Beige   +28 more
core   +1 more source

Home - About - Disclaimer - Privacy