نتایج جستجو برای: quantum cryptography
تعداد نتایج: 331141 فیلتر نتایج به سال:
Advances in information and communication technologies lead to use of some new devices such as smart phones. The new devices provide more advantages for the adversaries hence with respect to them, one can define with-box cryptography. In this new model of cryptography, designers try to hide the key using as a kind of implementation. The Differential Computation Analysis (DCA) is a side channel ...
Contents Abstract 1 List of Symbols 3 1 Introduction to Quantum Cryptography and Quantum Memory 5 1.
Quantum cryptography is commonly used to generate fresh secure keys with quantum signal transmission for instant use between two parties. However, research shows that the relatively low key generation rate hinders its practical use where a symmetric cryptography component consumes the shared key. That is, the security of the symmetric cryptography demands frequent rate of key updates, which lea...
A new cryptographic tool, anonymous quantum key technique, is introduced that leads to unconditionally secure key distribution and encryption schemes that can be readily implemented experimentally in a realistic environment. If quantum memory is available, the technique would have many features of public-key cryptography; an identification protocol that does not require a shared secret key is p...
Cryptography literally means “The art & science of secret writing & sending a message between two parties in such a way that its contents cannot be understood by someone other than the intended recipient.” and Quantum word is related with “Light”. Thus, Quantum Cryptography is a way of descripting any information in the form of quantum particles. There are no classical cryptographic systems whi...
This book provides an elementary introduction to the basics of error correction and quantum cryptography. Suitable for upper-level undergraduates in mathematics, physics and computer science, this book is unusual amongst undergraduate texts on coding or cryptography in that it includes quantum physics and the emerging technology of quantum information. It is self-contained, providing students w...
The claim of quantum cryptography has always been that it can provide protocols that are unconditionally secure, that is, for which the security does not depend on any restriction on the time, space or technology available to the cheaters. We show that this claim does not hold for any quantum bit commitment protocol. Since many cryptographic tasks use bit commitment as a basic primitive, this r...
Quantum Secret Sharing (QSS) is one of the important branch in Quantum Cryptography which combines Quantum with classical mechanics. The main objective of this paper is to propose elliptic curve cryptography (ECC) for solving heuristic attacks. The QSS and ECC methods has been tested in the following three quantum algorithms like Genetic Algorithm (GA), Tabu search algorithm (TS), Cuckoo search...
Critical questions raised by Einstein, Podolsky and Rosen (EPR) on locality, reality and completeness inspired many researchers to study quantitatively the difference between quantum physics and classical physics. In time, these researches led naturally to the idea of quantum computing. Unlike classical computers, with quantum computers the computational space increases exponentially with the s...
Present information technology is based on the laws of classical physics. However, advances in quantum physics have stimulated interest in its potential impact on such technology. This article is a reasonably introductory review of three aspects of quantum information processing, cryptography, computation, and feleportation. In order to give a level of self-containment, I serve up hors d' oeuvr...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید