Results 11 to 20 of about 13,252 (232)
Quantum random number generators and their use in cryptography [PDF]
Random number generators (RNG) are an important resource in many areas: cryptography (both quantum and classical), probabilistic computation (Monte Carlo methods), numerical simulations, industrial testing and labeling, hazard games, scientific research,
Stipcevic, Mario
core +2 more sources
Entanglement-based quantum digital signatures over a deployed campus network. [PDF]
The quantum digital signature protocol offers a replacement for most aspects of public-key digital signatures ubiquitous in today's digital world. A major advantage of a quantum-digital-signatures protocol is that it can have information-theoretic ...
Joseph C. Chapman +3 more
semanticscholar +1 more source
Relating non-local quantum computation to information theoretic cryptography [PDF]
Non-local quantum computation (NLQC) is a cheating strategy for position-verification schemes, and has appeared in the context of the AdS/CFT correspondence.
Rene Allerstorfer +4 more
semanticscholar +1 more source
In recent years, public-key cryptography has become a fundamental component of digital infrastructures. Such a scenario has to face a new and increasing threat, represented by quantum computers.
P. Nannipieri +5 more
semanticscholar +1 more source
Number Theoretic Study in Quantum Interactions
The quantum interaction models, with the quantum Rabi model as a distinguished representative, are recently appearing ubiquitously in various quantum systems including cavity and circuit quantum electrodynamics, quantum dots and artificial atoms, with ...
M. Wakayama
semanticscholar +1 more source
Quantum Cryptography for Enhanced Network Security: A Comprehensive Survey of Research, Developments, and Future Directions [PDF]
With the ever-growing concern for internet security, the field of quantum cryptography emerges as a promising solution for enhancing the security of networking systems.
Mst. Shapna Akter
semanticscholar +1 more source
Experimental composable key distribution using discrete-modulated continuous variable quantum cryptography. [PDF]
Establishing secure data communication necessitates secure key exchange over a public channel. Quantum key distribution (QKD), which leverages the principles of quantum physics, can achieve this with information-theoretic security. The discrete modulated
Hajomer AAE +8 more
europepmc +2 more sources
Applications of Finite Non-Abelian Simple Groups to Cryptography in the Quantum Era [PDF]
The theory of finite simple groups is a (rather unexplored) area likely to provide interesting computational problems and modeling tools useful in a cryptographic context.
María Isabel González Vasco +2 more
semanticscholar +1 more source
The Number Theoretic Transform (NTT) has been widely used to speed up polynomial multiplication in lattice-based post-quantum algorithms. All NTT operands use modular arithmetic, especially modular multiplication, which significantly influences NTT ...
Trong-Hung Nguyen +2 more
semanticscholar +1 more source
Along with the National Institute of Standards and Technology (NIST) post-quantum cryptography (PQC) standardization process, lightweight PQC-related research, and development have also gained substantial attention from the research community.
Pengzhou He +3 more
semanticscholar +1 more source

