Results 291 to 300 of about 7,995,270 (327)
Some of the next articles are maybe not open access.

Commercializing Quantum Keys

IEEE Spectrum, 2007
Several firms, including ID Quantique, MagiQ, and SmartQuantum, are working on turning the esoteric quantum properties of light into money. These firms are trying to sell a way of distributing a cryptographic key that is theoretically theft-proof because it relies on the quirky quantum physics of photons.
openaire   +1 more source

Implementing Grover Oracles for Quantum Key Search on AES and LowMC

IACR Cryptology ePrint Archive, 2019
Grover’s search algorithm gives a quantum attack against block ciphers by searching for a key that matches a small number of plaintext-ciphertext pairs. This attack uses \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage ...
Samuel Jaques   +3 more
semanticscholar   +1 more source

Quantum Key Distribution

2018
Conventional implementations of cryptography are only computationally secure. The security of quantum cryptography (QC), on the other hand, is based on the inherent uncertainty in quantum phenomena at the physical layer of a communication system.
Pramode K. Verma   +2 more
openaire   +1 more source

Quantum Cryptography and Quantum Key

2021 International Conference on Industrial Electronics Research and Applications (ICIERA), 2021
Shravan Kumar Sehgal, Rashmi Gupta
openaire   +1 more source

Quantum Key Distribution

2014
The paper discussed on possible optimization set-ups for quantum key distribution (QKD). The large secret key resulting from QKD is a valuable resource in communication scenarios, e.g. for secret communication, authentication, identification and so forth.
openaire   +1 more source

Decoy-state method for quantum-key-distribution-based quantum private query

Science China Physics Mechanics and Astronomy, 2022
B. Liu   +5 more
semanticscholar   +1 more source

Quantum Key Distribution

2008
Quantum Key Distribution (QKD) uses Quantum Mechanics to guarantee secure communication. It enables two parties to produce a shared random bit string known only to them, which can be used as a key to encrypt and decrypt messages.
openaire   +2 more sources

Quantum guidelines for solid-state spin defects

Nature Reviews Materials, 2021
Gary Wolfowicz   +2 more
exaly  

Weyl, Dirac and high-fold chiral fermions in topological quantum matter

Nature Reviews Materials, 2021
M Zahid Hasan   +2 more
exaly  

Materials challenges for trapped-ion quantum computers

Nature Reviews Materials, 2021
Kenneth R Brown   +2 more
exaly  

Home - About - Disclaimer - Privacy