Search

Your search keyword '"QUANTUM cryptography"' showing total 52 results

Search Constraints

Start Over You searched for: Descriptor "QUANTUM cryptography" Remove constraint Descriptor: "QUANTUM cryptography" Publication Year Range This year Remove constraint Publication Year Range: This year
52 results on '"QUANTUM cryptography"'

Search Results

1. Quantum-Proof Secrets.

2. Complex quantum networks: a topical review.

3. Imitating Quantum Probabilities: Beyond Bell's Theorem and Tsirelson Bounds.

4. Progress in the prime factorization of large numbers.

5. Secure data aggregation using quantum key management in IoT networks.

6. Efficient single-state multi-party quantum key agreement.

7. A privacy preserving quantum aggregating technique.

8. Induced turbulence in the quantum channel of high dimensional QKD system using structured light.

9. De Finetti Theorems for Quantum Conditional Probability Distributions with Symmetry.

10. Quantum healthcare analysis based on smart IoT and mobile edge computing: way into network study.

11. Efficient and secure semi-quantum private comparison protocol using three-particle GHZ-like states against participant attack.

12. A novel quantum dialogue without information leakage based on single photons in both polarization and spatial-mode degrees of freedom.

13. Continuous variable quantum teleportation network with star topology.

14. Quantum cryptography with structured photons.

15. Routing in quantum communication networks using reinforcement machine learning.

16. A chosen-plaintext attack on quantum permutation pad.

17. Multipartite Entanglement: A Journey through Geometry.

18. Nature of Nonlocality in Triangle Network based on Elegant Joint Measurement.

19. Optimized quantum computing technique to encrypt medical images.

20. Jet schemes, quantum dilogarithm and Feigin-Stoyanovsky's principal subspaces.

21. Quantitative probability estimation of light-induced inactivation of SARS-CoV-2.

22. Artificial intelligence and quantum cryptography.

23. A rational hierarchical (t,n)-threshold quantum secret sharing scheme.

24. A resilient m-qubit quantum secret sharing scheme using quantum error correction code.

25. Authenticable dynamic quantum multi-secret sharing based on the Chinese remainder theorem.

26. Two-Layer Multiparty Quantum Key Agreement Protocol with Collective Detection.

27. Quantum-resistant public-key encryption and signature schemes with smaller key sizes.

28. Linking QKD Testbeds across Europe.

29. Armed with Faster Crypto: Optimizing Elliptic Curve Cryptography for ARM Processors.

30. Controlled quantum teleportation with the ability to change the destination of qubits.

31. Editorial of Applied Geometric Algebras in Computer Science and Engineering (AGACSE 21).

32. The photonic content of a transmission-line pulse.

33. Theoretical and simulation investigation of practical QKD for both BB84 and SARG04 protocols.

34. Analyzing the contribution of material science in quantum cryptography: A scientometric study.

35. mRLWE-CP-ABE: A revocable CP-ABE for post-quantum cryptography.

36. Exploring the solution space: CB-WCA for efficient finite field multiplication in post-quantum cryptography.

37. Reduction of g2(0) value in heralded spontaneous parametric down-conversion sources using photon number resolving detectors.

38. Quantum Secure Multi-Party Summation with Graph State.

39. Efficient Integration of Rate-Adaptive Reconciliation with Syndrome-Based Error Estimation and Subblock Confirmation for Quantum Key Distribution.

40. Bell state-based semi-quantum signature scheme with arbitrator.

41. Perfect quantum state transfer on Cayley graphs over dicyclic groups.

42. An Inquiry-Based Learning Approach to Teaching Undergraduate Cryptology.

43. Elsewhere on New Scientist.

44. Quantifying the quantumness of pure-state ensembles via coherence of Gram matrix.

45. Advancing quantum steganography: a secure IoT communication with reversible decoding and customized encryption technique for smart cities.

46. A privacy preserving quantum authentication scheme for secure data sharing in wireless body area networks.

47. CNC: A lightweight architecture for Binary Ring-LWE based PQC.

48. Over-threshold multi-party private set operation protocols for lightweight clients.

49. Quantum protection scheme for privacy data based on trusted center.

50. Program generation meets program verification: A case study on number-theoretic transform.

Catalog

Books, media, physical & digital resources