Results 71 to 80 of about 1,469,683 (369)

Protocols and plan of quantum cryptography [PDF]

open access: yesVojnotehnički Glasnik, 2012
Along with the development of confidentiality of data and resources, there is a need to develop systems that would provide confidentiality. Currently, the most used systems are classical cryptographic systems and encryption public key systems.
Milorad S. Markagić
doaj   +1 more source

Free-Space Quantum Key Distribution

open access: yes, 2016
Based on the firm laws of physics rather than unproven foundations of mathematical complexity, quantum cryptography provides a radically different solution for encryption and promises unconditional security.
Carrasco-Casado, Alberto   +2 more
core   +1 more source

Composability in quantum cryptography

open access: yesNew Journal of Physics, 2009
In this article, we review several aspects of composability in the context of quantum cryptography. The first part is devoted to key distribution. We discuss the security criteria that a quantum key distribution protocol must fulfill to allow its safe use within a larger security application (e.g., for secure message transmission).
Müller-Quade, Jörn, Renner, Renato
openaire   +5 more sources

QUANTUM CRYPTOGRAPHY AND U.S. DIGITAL SECURITY: A COMPREHENSIVE REVIEW: INVESTIGATING THE POTENTIAL OF QUANTUM TECHNOLOGIES IN CREATING UNBREAKABLE ENCRYPTION AND THEIR FUTURE IN NATIONAL SECURITY

open access: yesComputer Science & IT Research Journal
This study provides a comprehensive review of quantum cryptography and its implications for U.S. national security in the face of emerging quantum technologies.
Sedat Sonko   +4 more
semanticscholar   +1 more source

Gaussian Quantum Information [PDF]

open access: yes, 2011
The science of quantum information has arisen over the last two decades centered on the manipulation of individual quanta of information, known as quantum bits or qubits.
Arthurs, E.   +48 more
core   +2 more sources

Masked Accelerators and Instruction Set Extensions for Post-Quantum Cryptography

open access: yesIACR Cryptology ePrint Archive, 2021
Side-channel attacks can break mathematically secure cryptographic systems leading to a major concern in applied cryptography. While the cryptanalysis and security evaluation of Post-Quantum Cryptography (PQC) have already received an increasing research
Tim Fritzmann   +6 more
semanticscholar   +1 more source

Circuit-noise-resilient virtual distillation

open access: yesCommunications Physics
Quantum error mitigation (QEM) is vital for improving quantum algorithms’ accuracy on noisy near-term devices. A typical QEM method, called Virtual Distillation (VD), can suffer from imperfect implementation, potentially leading to worse outcomes than ...
Xiao-Yue Xu   +4 more
doaj   +1 more source

Experimental Integration of Quantum Key Distribution and Post‐Quantum Cryptography in a Hybrid Quantum‐Safe Cryptosystem

open access: yesAdvanced Quantum Technologies
Quantum key distribution (QKD) and post‐quantum cryptography (PQC) are the two counter measures against cryptographic attacks via quantum computing. While QKD offers information theoretic security but limited authentication scalability, PQC facilitates ...
L. Garms   +9 more
semanticscholar   +1 more source

Mechanistic basis for inhibition of the extended‐spectrum β‐lactamase GES‐1 by enmetazobactam and tazobactam

open access: yesFEBS Letters, EarlyView.
Antimicrobial resistance (AMR) is of huge importance, resulting in over 1 million deaths each year. Here, we describe how a new drug, enmetazobactam, designed to help fight resistant bacterial diseases, inhibits a key enzyme (GES‐1) responsible for AMR. Our data show it is a more potent inhibitor than the related tazobactam, with high‐level computation
Michael Beer   +10 more
wiley   +1 more source

From lactation to malignancy: A comparison between healthy and cancerous breast gland at single‐cell resolution reveals new issues for tumorigenesis

open access: yesFEBS Letters, EarlyView.
Single‐cell RNA sequencing reveals an opposite role of SLPI in basal tumors based on metastatic spread, along with shared activation of specific regulons in cancer cells and mature luminal lactocytes, as well as downregulation of MALAT1 and NEAT1 in the latter.
Pietro Ancona   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy