نتایج جستجو برای: quantum cryptography

تعداد نتایج: 331141  

2003
Robert B. Griffiths

References: Scarani = Valerio Scarani et al. Rev. Mod. Phys. 81 (2009) 1301-1350. Lengthy review with much valuable material. QCQI = Quantum Computation and Quantum Information by Nielsen and Chuang (Cambridge, 2000), Sec. 12.6 through 12.6.3. The material becomes more and more difficult as Sec. 12.6 advances Stinson = D. R. Stinson, Cryptography: Theory and Practice (CRC Press, 1995). Contains...

Journal: :Science China Information Sciences 2021

Abstract We present an overview of quantum-safe cryptography (QSC) with a focus on post-quantum (PQC) and information-theoretic security. From cryptographic point view, lattice code-based schemes are among the most promising PQC solutions. Both approaches based hardness decoding problems linear codes different metrics. lattices can be constructed to achieve certain secrecy quantities for wireta...

2005
Solange Ghernaouti-Helie Mohamed Ali Sfaxi

Protocols and applications could profit of quantum cryptography to secure communications. The applications of quantum cryptography are linked to telecommunication services that require very high level of security such as bank transactions. The aim of this paper is to present the possibility to use quantum cryptography in critical financial transactions, to analyse the use of quantum key distrib...

2017
Hairong Yi Yuqing Zhu Dongdai Lin

All sessions will take place in room DMS 1110 in the Desmarais Building Monday, August 14, 2017 08:30 – 09:10 Registration (in the main floor lobby of the Desmarais Building) 09:10 – 09:15 Opening Remarks Full-day session: Introduction to Post-Quantum Cryptography Michele Mosca, Douglas Stebila, David Jao 09:15 10:30 Post-Quantum Cryptography Session 1 10:30 11:00 Coffee/Nutrition Break 11:00 1...

2015

IEEE Xplore for exclusive pricing! This research paper concentrates on the theory of quantum cryptography, and.This research paper concentrates on quantum cryptography, and how this. Technologies for Homeland Security HST, 2011 IEEE International Conference on.the use of quantum cryptography in fiber optical networks gets significant. In this paper, we analyze the interests of using. 2006 IEEE ...

Journal: :J. UCS 2006
Akinori Kawachi Takeshi Koshiba

Shor’s algorithms for the integer factorization and the discrete logarithm problems can be regarded as a negative effect of the quantum mechanism on publickey cryptography. From the computational point of view, his algorithms illustrate that quantum computation could be more powerful. It is natural to consider that the power of quantum computation could be exploited to withstand even quantum ad...

2013

The concept of quantum cryptography involves the quantum physics by which two parties can establish a secure key exchange. The security in such system is defined by the laws of quantum physics. Quantum cryptography holds its root from Steven weisner’s conjugate coding. The basics of quantum cryptography is based on two principles of mechanics namely, Heisenberg’s uncertainty principle and photo...

2007
Naya Nagy Marius Nagy Selim G Akl

It has been said that quantum cryptography in general o ers a secure solution to the problem of key enhancement This means that two parties who already share a small secret key can use quantum protocols to establish a new large secret key This large secret key can be arbitrarily long and is unbreakable Thus to date the main contribution of quantum cryptography has been believed to be quan tum k...

Journal: :Journal of Physics: Conference Series 2008

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید