Results 141 to 150 of about 460,882 (215)

Quantum key distribution implemented with d-level time-bin entangled photons. [PDF]

open access: yesNat Commun
Yu H   +17 more
europepmc   +1 more source

Semi-Empirical Satellite-to-Ground Quantum Key Distribution Model for Realistic Receivers. [PDF]

open access: yesEntropy (Basel), 2023
Khmelev AV   +5 more
europepmc   +1 more source

Demonstration of microwave single-shot quantum key distribution. [PDF]

open access: yesNat Commun
Fesquet F   +9 more
europepmc   +1 more source

4 states protocol for time coding quantum key distribution

open access: green, 2003
Thierry Debuisschert, William Boucher
openalex   +1 more source

Quantum vs post‐quantum security for future networks: Survey

open access: yesCyber Security and Applications
Classical cryptography (crypt) schemes (sche) have been compromised by the practical results on quantum (q) computers in recent years. Nowadays these sche ‘s can be compromised by using the Shor's methodology. This paper provides a detailed survey of the
Savo Glisic
doaj  

Home - About - Disclaimer - Privacy