Search

Your search keyword '"QUANTUM cryptography"' showing total 342 results

Search Constraints

Start Over You searched for: Descriptor "QUANTUM cryptography" Remove constraint Descriptor: "QUANTUM cryptography" Journal quantum information processing Remove constraint Journal: quantum information processing
342 results on '"QUANTUM cryptography"'

Search Results

1. Efficient single-state multi-party quantum key agreement.

2. A privacy preserving quantum aggregating technique.

3. Routing in quantum communication networks using reinforcement machine learning.

4. A chosen-plaintext attack on quantum permutation pad.

5. A rational hierarchical (t,n)-threshold quantum secret sharing scheme.

6. A resilient m-qubit quantum secret sharing scheme using quantum error correction code.

7. Authenticable dynamic quantum multi-secret sharing based on the Chinese remainder theorem.

8. Exploring the solution space: CB-WCA for efficient finite field multiplication in post-quantum cryptography.

9. A novel quantum private set intersection scheme with a semi-honest third party.

10. Discussion on the initial states of controlled bidirectional quantum secure direct communication.

11. Two intercept-and-resend attacks on a bidirectional quantum secure direct communication and its improvement.

12. Optimized quantum implementation of AES.

13. Dynamic hierarchical quantum secret sharing with general access structure.

14. Dynamic full quantum one-way function based on quantum circuit mapping.

15. Efficient multiparty quantum private comparison protocol based on single photons and rotation encryption.

16. Decoherence mitigation by embedding a logical qubit in a qudit.

17. Security analysis for single-state circular mediated semi-quantum key distribution.

18. Quantum private comparison protocol based on 4D GHZ-like states.

19. Multi-party quantum private information comparison based on nonlocal orthogonal product states.

20. How to verify identity in the continuous variable quantum system?

21. Cryptanalysis and improvement of a controlled quantum secure direct communication with authentication protocol based on five-particle cluster state.

22. A d-level quantum secret sharing scheme with cheat-detection (t, m) threshold.

23. Cryptanalysis of three quantum money schemes.

24. Circular mediated semi-quantum key distribution.

25. Security analysis and improvement in a semi-quantum private comparison without pre-shared key.

26. Quantum money with mintage supervision.

27. Device-independent quantum key distribution using random quantum states.

28. Practical efficient 1-out-of-n quantum oblivious transfer protocol.

29. Polarization–orbital angular momentum duality assisted entanglement observation for indistinguishable photons.

30. Quantum attacks against BBB secure PRFs or MACs built from public random permutations.

31. Quantum blind signature scheme for supply chain financial.

32. Multiparty quantum private comparison based on quantum walks.

33. A (k, n)-threshold dynamic quantum secure multiparty multiplication protocol.

34. A short review on quantum identity authentication protocols: how would Bob know that he is talking with Alice?

35. Parallel quantum addition for Korean block ciphers.

36. SKC-CCCO: an encryption algorithm for quantum group signature.

37. Improved semi-quantum key distribution with two almost-classical users.

38. A lightweight three-user secure quantum summation protocol without a third party based on single-particle states.

39. Leveraging the hardness of dihedral coset problem for quantum cryptography.

40. Performance analysis of continuous-variable quantum key distribution using non-Gaussian states.

41. Mutual authentication quantum key agreement protocol based on Bell states.

42. Quantum verifiable protocol for secure modulo zero-sum randomness.

43. Cryptanalysis of secure multiparty quantum summation.

44. Measurement device–independent quantum secure direct communication with user authentication.

45. Ternary quantum public-key cryptography based on qubit rotation.

46. Higher-rate quantum key expansion scheme.

47. Quantum generic attacks on key-alternating Feistel ciphers for shorter keys.

48. Measurement-device-independent quantum secure multiparty summation.

49. Two-party secure semiquantum summation against the collective-dephasing noise.

50. Enhanced cloud security model using QKDP (ECSM-QKDP) for advanced data security over cloud.

Catalog

Books, media, physical & digital resources