Results 1 to 10 of about 13,252 (232)

Time-memory trade-off in Toom-Cook multiplication: an application to module-lattice based cryptography

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2020
Since the introduction of the ring-learning with errors problem, the number theoretic transform (NTT) based polynomial multiplication algorithm has been studied extensively.
Jose Maria Bermudo Mera   +2 more
doaj   +1 more source

Experimental demonstration of the DPTS QKD protocol over a 170 km fiber link [PDF]

open access: yes, 2019
Quantum key distribution (QKD) is a promising technology aiming at solving the security problem arising from the advent of quantum computers. While the main theoretical aspects are well developed today, limited performances, in terms of achievable link ...
Bacco, Davide   +6 more
core   +2 more sources

Orthogonal-state-based protocols of quantum key agreement [PDF]

open access: yes, 2013
Two orthogonal-state-based protocols of quantum key agreement (QKA) are proposed. The first protocol of QKA proposed here is designed for two-party QKA, whereas the second protocol is designed for multi-party QKA. Security of these orthogonal-state-based
Alam, Nasir   +2 more
core   +1 more source

Efficient reconciliation protocol for discrete-variable quantum key distribution

open access: yes, 2009
Reconciliation is an essential part of any secret-key agreement protocol and hence of a Quantum Key Distribution (QKD) protocol, where two legitimate parties are given correlated data and want to agree on a common string in the presence of an adversary ...
Alléaume, Romain   +3 more
core   +1 more source

Quantum key distribution and cryptography: a survey [PDF]

open access: yes, 2010
I will try to partially answer, based on a review on recent work, the following question: Can QKD and more generally quantum information be useful to cover some practical security requirements in current (and future) IT infrastructures ?
  +23 more
core   +1 more source

Decoy state quantum key distribution with two-way classical post-processing [PDF]

open access: yes, 2006
Decoy states have recently been proposed as a useful method for substantially improving the performance of quantum key distribution protocols when a coherent state source is used.
C. H. Bennett   +14 more
core   +1 more source

Key recycling in authentication

open access: yes, 2014
In their seminal work on authentication, Wegman and Carter propose that to authenticate multiple messages, it is sufficient to reuse the same hash function as long as each tag is encrypted with a one-time pad.
Portmann, Christopher
core   +1 more source

Provably-secure symmetric private information retrieval with quantum cryptography

open access: yes, 2020
Private information retrieval (PIR) is a database query protocol that provides user privacy, in that the user can learn a particular entry of the database of his interest but his query would be hidden from the data centre.
Kon, Wen Yu, Lim, Charles Ci Wen
core   +1 more source

Philosophical Aspects of Quantum Information Theory [PDF]

open access: yes, 2006
Quantum information theory represents a rich subject of discussion for those interested in the philosphical and foundational issues surrounding quantum mechanics for a simple reason: one can cast its central concerns in terms of a long-familiar question:
Timpson, Christopher G
core   +2 more sources

Strategic Insights From Playing the Quantum Tic-Tac-Toe

open access: yes, 2010
In this paper, we perform a minimalistic quantization of the classical game of tic-tac-toe, by allowing superpositions of classical moves. In order for the quantum game to reduce properly to the classical game, we require legal quantum moves to be ...
Bennett C H Brassard G   +15 more
core   +1 more source

Home - About - Disclaimer - Privacy