Search

Your search keyword '"Quantum cryptography"' showing total 2,047 results

Search Constraints

Start Over You searched for: Descriptor "Quantum cryptography" Remove constraint Descriptor: "Quantum cryptography" Database Academic Search Index Remove constraint Database: Academic Search Index
2,047 results on '"Quantum cryptography"'

Search Results

1. Quantum-Proof Secrets.

2. Satellite dish-like nanocomposite as a breakthrough in single photon detection for highly developed optoelectronic applications.

3. Scenarios for Optical Encryption Using Quantum Keys †.

4. Verifiable quantum secret sharing scheme using Bell states for a class of special access structures.

5. A threshold changeable dynamic quantum secret sharing scheme with cheating identification.

6. Comment on "quantum identity authentication with single photon".

7. Verifiable dynamic quantum secret sharing based on generalized Hadamard gate.

8. Quantum secret sharing with (m, n) threshold: QFT and identity authentication.

9. A novel digital contents privacy scheme based on quantum harmonic oscillator and schrodinger paradox.

10. A novel quantum multiparty blind signature scheme based on χ state.

11. Probabilistic versions of Quantum Private Queries.

12. Paving the Way for SQIsign: Toward Efficient Deployment on 32-bit Embedded Devices.

13. A privacy preserving quantum authentication scheme for secure data sharing in wireless body area networks.

14. Advancing quantum steganography: a secure IoT communication with reversible decoding and customized encryption technique for smart cities.

15. Transforming future technology with quantum-based IoT.

16. Room Temperature Emission Line Narrowing and Long‐Range Photon Transport in Colloidal Quantum Wells Coupled to Metasurface Resonance.

17. Cryptanalysis of a quantum identity-based signature and its improvement.

18. Metalens array for quantum random number.

19. Lattice-Based Post-Quantum Public Key Encryption Scheme Using ElGamal's Principles.

20. Analysis of RSA and Shor's algorithm for cryptography: A quantum perspective.

21. Masked torsion point SIDH-countermeasure for Castryck-Decru attack.

22. Role of hash-based signatures in quantum cryptography.

23. Engineering the electro-optic effect in HfO2 and ZrO2 through strain and polarization control.

24. Improving the success rate of quantum algorithm attacking RSA encryption system.

25. Uncloneable Cryptography.

26. An efficient quantum oblivious transfer protocol.

27. Lattice-based ring signcryption scheme for smart healthcare management.

28. Designing quantum-secure attribute-based encryption.

29. Hybrid quantum key distribution: A novel approach for secure end-to-end communication in network infrastructure.

30. Enhancing Performance of Continuous-Variable Quantum Key Distribution (CV-QKD) and Gaussian Modulation of Coherent States (GMCS) in Free-Space Channels under Individual Attacks with Phase-Sensitive Amplifier (PSA) and Homodyne Detection (HD).

31. Reduction of the semigroup-action problem on a module to the hidden-subgroup problem.

32. Zero-correlation linear analysis for block ciphers based on the Bernstein–Vazirani and Grover algorithms.

33. Blockchain data sharing scheme based on quantum re-encryption.

34. Secure Messaging Application Development: Based on Post-Quantum Algorithms CSIDH, Falcon, and AES Symmetric Key Cryptosystem.

35. Technological trajectories in quantum computing to design a quantum ecosystem for industrial change.

36. Implementation of coherent one way protocol for quantum key distribution up to an effective distance of 145 km.

37. New Quantum Private Comparison Using Bell States.

38. A New Semi-Quantum Two-Way Authentication Protocol between Control Centers and Neighborhood Gateways in Smart Grids.

39. A new bound for the orthogonality defect of HKZ reduced lattices.

40. A Systematic Review: Post Quantum Cryptography to Secure Data Transmission.

41. From the classical Frenet–Serret apparatus to the curvature and torsion of quantum-mechanical evolutions. Part I. Stationary Hamiltonians.

42. A new attack resistant encryption method based on hybrid chaotic-quantum key distribution (CQKD).

43. High-capacity device-independent quantum secure direct communication based on hyper-encoding.

44. Compact and Low-Latency FPGA-Based Number Theoretic Transform Architecture for CRYSTALS Kyber Postquantum Cryptography Scheme.

45. Experimental implementation of distributed phase reference quantum key distribution protocols.

46. Faster optimal ate pairings for cyclotomic sparse families of pairing-friendly elliptic curves with embedding degrees k=5,7.

47. A quantum secure multi-party summation protocol with quantum Fourier transform.

48. Multiparty semi-quantum secret sharing protocol based on single photon sequence and permutation.

49. Dynamic Analysis and FPGA Implementation of a New Linear Memristor-Based Hyperchaotic System with Strong Complexity.

50. Unsupervised manifold embedding to encode molecular quantum information for supervised learning of chemical data.

Catalog

Books, media, physical & digital resources