Results 291 to 300 of about 7,995,270 (327)
Some of the next articles are maybe not open access.
IEEE Spectrum, 2007
Several firms, including ID Quantique, MagiQ, and SmartQuantum, are working on turning the esoteric quantum properties of light into money. These firms are trying to sell a way of distributing a cryptographic key that is theoretically theft-proof because it relies on the quirky quantum physics of photons.
openaire +1 more source
Several firms, including ID Quantique, MagiQ, and SmartQuantum, are working on turning the esoteric quantum properties of light into money. These firms are trying to sell a way of distributing a cryptographic key that is theoretically theft-proof because it relies on the quirky quantum physics of photons.
openaire +1 more source
Implementing Grover Oracles for Quantum Key Search on AES and LowMC
IACR Cryptology ePrint Archive, 2019Grover’s search algorithm gives a quantum attack against block ciphers by searching for a key that matches a small number of plaintext-ciphertext pairs. This attack uses \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage ...
Samuel Jaques +3 more
semanticscholar +1 more source
2018
Conventional implementations of cryptography are only computationally secure. The security of quantum cryptography (QC), on the other hand, is based on the inherent uncertainty in quantum phenomena at the physical layer of a communication system.
Pramode K. Verma +2 more
openaire +1 more source
Conventional implementations of cryptography are only computationally secure. The security of quantum cryptography (QC), on the other hand, is based on the inherent uncertainty in quantum phenomena at the physical layer of a communication system.
Pramode K. Verma +2 more
openaire +1 more source
Quantum Cryptography and Quantum Key
2021 International Conference on Industrial Electronics Research and Applications (ICIERA), 2021Shravan Kumar Sehgal, Rashmi Gupta
openaire +1 more source
2014
The paper discussed on possible optimization set-ups for quantum key distribution (QKD). The large secret key resulting from QKD is a valuable resource in communication scenarios, e.g. for secret communication, authentication, identification and so forth.
openaire +1 more source
The paper discussed on possible optimization set-ups for quantum key distribution (QKD). The large secret key resulting from QKD is a valuable resource in communication scenarios, e.g. for secret communication, authentication, identification and so forth.
openaire +1 more source
Decoy-state method for quantum-key-distribution-based quantum private query
Science China Physics Mechanics and Astronomy, 2022B. Liu +5 more
semanticscholar +1 more source
2008
Quantum Key Distribution (QKD) uses Quantum Mechanics to guarantee secure communication. It enables two parties to produce a shared random bit string known only to them, which can be used as a key to encrypt and decrypt messages.
openaire +2 more sources
Quantum Key Distribution (QKD) uses Quantum Mechanics to guarantee secure communication. It enables two parties to produce a shared random bit string known only to them, which can be used as a key to encrypt and decrypt messages.
openaire +2 more sources
Quantum guidelines for solid-state spin defects
Nature Reviews Materials, 2021Gary Wolfowicz +2 more
exaly
Weyl, Dirac and high-fold chiral fermions in topological quantum matter
Nature Reviews Materials, 2021M Zahid Hasan +2 more
exaly
Materials challenges for trapped-ion quantum computers
Nature Reviews Materials, 2021Kenneth R Brown +2 more
exaly

