Search

Your search keyword '"QUANTUM cryptography"' showing total 1,978 results

Search Constraints

Start Over You searched for: Descriptor "QUANTUM cryptography" Remove constraint Descriptor: "QUANTUM cryptography" Publication Type News Remove constraint Publication Type: News
1,978 results on '"QUANTUM cryptography"'

Search Results

1. Quantum-Proof Secrets.

2. Uncloneable Cryptography.

3. Engineering the electro-optic effect in HfO2 and ZrO2 through strain and polarization control.

4. Improving the success rate of quantum algorithm attacking RSA encryption system.

5. Complex quantum networks: a topical review.

6. Imitating Quantum Probabilities: Beyond Bell's Theorem and Tsirelson Bounds.

7. Progress in the prime factorization of large numbers.

8. Secure data aggregation using quantum key management in IoT networks.

9. Efficient single-state multi-party quantum key agreement.

10. A privacy preserving quantum aggregating technique.

11. Induced turbulence in the quantum channel of high dimensional QKD system using structured light.

12. De Finetti Theorems for Quantum Conditional Probability Distributions with Symmetry.

13. Quantum healthcare analysis based on smart IoT and mobile edge computing: way into network study.

14. Where Is the Research on Cryptographic Transition and Agility? Gaps facing the industry as quantum safe algorithms move closer to standardization.

15. From the classical Frenet–Serret apparatus to the curvature and torsion of quantum-mechanical evolutions. Part I. Stationary Hamiltonians.

16. Faster optimal ate pairings for cyclotomic sparse families of pairing-friendly elliptic curves with embedding degrees k=5,7.

17. Efficient and secure semi-quantum private comparison protocol using three-particle GHZ-like states against participant attack.

18. A novel quantum dialogue without information leakage based on single photons in both polarization and spatial-mode degrees of freedom.

19. Continuous variable quantum teleportation network with star topology.

20. Quantum cryptography with structured photons.

21. Routing in quantum communication networks using reinforcement machine learning.

22. A chosen-plaintext attack on quantum permutation pad.

23. Multipartite Entanglement: A Journey through Geometry.

24. Nature of Nonlocality in Triangle Network based on Elegant Joint Measurement.

25. Optimized quantum computing technique to encrypt medical images.

26. Jet schemes, quantum dilogarithm and Feigin-Stoyanovsky's principal subspaces.

27. Quantitative probability estimation of light-induced inactivation of SARS-CoV-2.

28. Artificial intelligence and quantum cryptography.

29. A rational hierarchical (t,n)-threshold quantum secret sharing scheme.

30. A resilient m-qubit quantum secret sharing scheme using quantum error correction code.

31. Authenticable dynamic quantum multi-secret sharing based on the Chinese remainder theorem.

32. Two-Layer Multiparty Quantum Key Agreement Protocol with Collective Detection.

33. Quantum-resistant public-key encryption and signature schemes with smaller key sizes.

34. Linking QKD Testbeds across Europe.

35. Armed with Faster Crypto: Optimizing Elliptic Curve Cryptography for ARM Processors.

36. Controlled quantum teleportation with the ability to change the destination of qubits.

37. Editorial of Applied Geometric Algebras in Computer Science and Engineering (AGACSE 21).

38. The photonic content of a transmission-line pulse.

39. Theoretical and simulation investigation of practical QKD for both BB84 and SARG04 protocols.

40. Analyzing the contribution of material science in quantum cryptography: A scientometric study.

41. mRLWE-CP-ABE: A revocable CP-ABE for post-quantum cryptography.

42. Exploring the solution space: CB-WCA for efficient finite field multiplication in post-quantum cryptography.

43. Reduction of g2(0) value in heralded spontaneous parametric down-conversion sources using photon number resolving detectors.

44. Quantum Secure Multi-Party Summation with Graph State.

45. Efficient Integration of Rate-Adaptive Reconciliation with Syndrome-Based Error Estimation and Subblock Confirmation for Quantum Key Distribution.

46. Bell state-based semi-quantum signature scheme with arbitrator.

47. Perfect quantum state transfer on Cayley graphs over dicyclic groups.

48. An Inquiry-Based Learning Approach to Teaching Undergraduate Cryptology.

49. Elzaki-Rohit cryptographical model.

50. Quantum cryptography research over the past two decades – Review, research implications, and future directions.

Catalog

Books, media, physical & digital resources