نتایج جستجو برای: quantum cryptography

تعداد نتایج: 331141  

2012
Abhilash Kumar M R Pavan Kumar

Most cryptographic mechanisms such as symmetric and asymmetric cryptography, often involve the use of cryptographic keys. However, all cryptographic techniques will be ineffective if the key distribution mechanism is weak. Quantum Key Distribution or Quantum Cryptography is attracting much attention as a solution of the problem of Key Distribution; QKD offers unconditionally secure communicatio...

2013
Mehrdad Sepehri Sharbaf

For the past decade progress in quantum cryptography changed the status of quantum key distribution (QKD) from laboratory to the practical innovation technology. Quantum cryptography is an emerging technology in which two parties can secure network communications by applying the phenomena of quantum physics. Quantum cryptography applies the uncertainty principle and the no-cloning theorem of qu...

2016
Abhishek Agnihotri

By the development of ultra high-speed computers, existing modern cryptography could be failed whereas Quantum cryptography guarantees the secure communication whose security based on the legality of quantum mechanics. This research paper concentrates on the strong basics of quantum cryptography and how it guarantees the secure communication over the network. There are two ways to conduct Quant...

Journal: :JNW 2006
Thi Mai Trang Nguyen Mohamed Ali Sfaxi Solange Ghernaouti-Helie

Quantum cryptography is a promising solution towards absolute security in long term cryptosystems. While the use of quantum cryptography in fiber optical networks gets significant advances, research on the application of quantum cryptography in mobile wireless network is still premature. In this paper, we analyze the interests of using quantum cryptography in 802.11 wireless networks, and propo...

Journal: :CoRR 2008
Solange Ghernaouti-Helie Igli Tashi Thomas Länger Christian Monyk

1 ABSTRACT In contemporary cryptographic systems, secret keys are usually exchanged by means of methods, which suffer from mathematical and technology inherent drawbacks. That could lead to unnoticed complete compromise of cryptographic systems, without a chance of control by its legitimate owners. Therefore a need for innovative solutions exists when truly and reliably secure transmission of s...

2009
Toyohiro Tsurumaru

1. Introduction Quantum cryptography is a technology that ensures ultimate security 1). Compared to current cryptography that could be defeated by the development of an ultra high-speed computer, quantum cryptography ensures secure communication because it is based on the fundamental physical laws. Among the various quantum information technologies, the most extensive research is being conducte...

2013
V. Padmaja Sayeed Yasin

Cryptography is the science of writing in secret message and is an ancient art. In data and telecommunications, cryptography is necessary when communicating over any untrusted medium, which includes just about any network, particularly over the Internet. Over the last two decades an interesting field of the cryptography has raised from non classical atomic theory, Quantum Physics. This field is...

Journal: :Parallel Processing Letters 2010
Naya Nagy Marius Nagy Selim G. Akl

It has been said that quantum cryptography in general o ers a secure solution to the problem of key enhancement. This means that two parties who already share a small secret key, can use quantum protocols to establish a new large secret key. This large secret key can be arbitrarily long and is unbreakable. Thus, to date, the main contribution of quantum cryptography has been believed to be quan...

Journal: :IACR Cryptology ePrint Archive 2017
Daniel J. Bernstein Tanja Lange

Cryptography is essential for the security of Internet communication, cars, and implanted medical devices. However, many commonly used cryptosystems will be completely broken once big quantum computers exist. Post-quantum cryptography is cryptography under the assumption that the attacker has a large quantum computer; post-quantum cryptosystems strive to remain secure even in this scenario. Thi...

Journal: :Designs, Codes and Cryptography 2015

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید