Results 271 to 280 of about 2,069,680 (303)
Some of the next articles are maybe not open access.
The Unconditional Security of Quantum Key Distribution
2006Recently Boykin, Biham, Boyer, Mor, and Roychowdhury (BBBMR) proved the security of standard quantum key distribution against the most general attacks which can be performed on the channel [1]. The attack is performed by an eavesdropper who has unlimited computation abilities, and who uses the full power allowed by the rules of classical and quantum ...
Tal Mor, Vwani Roychowdhury
openaire +1 more source
Authenticated encryption and steganography in unconditional security setting
IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security, 2005., 2005We address authenticated encryption, the cryptographic technique that simultaneously provides both confidentiality and authenticity, and steganography that hides the very existence of messages. We focus on the security of these techniques against adversaries with unbounded computational resources.
T. Matsumoto, J. Shikata
openaire +1 more source
Unconditional security of relativistic quantum key distribution protocol
SPIE Proceedings, 2010Relativistic quantum key distribution (QKD) protocol is a kind of modified BB84 QKD protocol based on the principles of not only quantum mechanics but also special relativity. Its advantage compared with BB84 protocol is that all of the qubits could be used for key generation, and Alice and Bob are able to select any measuring bases.
Sushuai Zhuang, Li Yang
openaire +1 more source
Unconditional secure two-way quantum dense key distribution
Chinese Physics, 2007In this paper, we present a two-way quantum dense key distribution protocol. With double check modes, our scheme is secure regardless of the presence of noises. And with a quantum teleportation process, secret message can be encoded deterministically even if the quantum channel is highly lossy.
Lü Hua, Chen Ai-Xi, Yan Xu-Dong
openaire +1 more source
Achieving Unconditional Security for MIMO-BAN under Short Blocklength Wiretap Code
IEEE Vehicular Technology Conference, 2017Jie Tang +4 more
semanticscholar +1 more source
Climate change impacts on plant pathogens, food security and paths forward
Nature Reviews Microbiology, 2023Brajesh K Singh +2 more
exaly
A practical implementation of unconditional security for the IEC 60780-5-101 SCADA protocol
Int. J. Crit. Infrastructure Prot., 2017T. Cherifi, L. Hamami
semanticscholar +1 more source
The rumen microbiome: balancing food security and environmental impacts
Nature Reviews Microbiology, 2021Itzhak Mizrahi, Robert Wallace
exaly
Unconditional security for the smart power grids and star networks
International Conference on Noise and Fluctuations, 2015Elias Gonzalez +3 more
semanticscholar +1 more source

