Results 271 to 280 of about 2,069,680 (303)
Some of the next articles are maybe not open access.

The Unconditional Security of Quantum Key Distribution

2006
Recently Boykin, Biham, Boyer, Mor, and Roychowdhury (BBBMR) proved the security of standard quantum key distribution against the most general attacks which can be performed on the channel [1]. The attack is performed by an eavesdropper who has unlimited computation abilities, and who uses the full power allowed by the rules of classical and quantum ...
Tal Mor, Vwani Roychowdhury
openaire   +1 more source

Authenticated encryption and steganography in unconditional security setting

IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security, 2005., 2005
We address authenticated encryption, the cryptographic technique that simultaneously provides both confidentiality and authenticity, and steganography that hides the very existence of messages. We focus on the security of these techniques against adversaries with unbounded computational resources.
T. Matsumoto, J. Shikata
openaire   +1 more source

Unconditional security of relativistic quantum key distribution protocol

SPIE Proceedings, 2010
Relativistic quantum key distribution (QKD) protocol is a kind of modified BB84 QKD protocol based on the principles of not only quantum mechanics but also special relativity. Its advantage compared with BB84 protocol is that all of the qubits could be used for key generation, and Alice and Bob are able to select any measuring bases.
Sushuai Zhuang, Li Yang
openaire   +1 more source

Unconditional secure two-way quantum dense key distribution

Chinese Physics, 2007
In this paper, we present a two-way quantum dense key distribution protocol. With double check modes, our scheme is secure regardless of the presence of noises. And with a quantum teleportation process, secret message can be encoded deterministically even if the quantum channel is highly lossy.
Lü Hua, Chen Ai-Xi, Yan Xu-Dong
openaire   +1 more source

Achieving Unconditional Security for MIMO-BAN under Short Blocklength Wiretap Code

IEEE Vehicular Technology Conference, 2017
Jie Tang   +4 more
semanticscholar   +1 more source

Climate change impacts on plant pathogens, food security and paths forward

Nature Reviews Microbiology, 2023
Brajesh K Singh   +2 more
exaly  

The rumen microbiome: balancing food security and environmental impacts

Nature Reviews Microbiology, 2021
Itzhak Mizrahi, Robert Wallace
exaly  

Unconditional security for the smart power grids and star networks

International Conference on Noise and Fluctuations, 2015
Elias Gonzalez   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy