Search

Your search keyword '"QUANTUM cryptography"' showing total 816 results

Search Constraints

Start Over You searched for: Descriptor "QUANTUM cryptography" Remove constraint Descriptor: "QUANTUM cryptography" Publisher springer nature Remove constraint Publisher: springer nature
816 results on '"QUANTUM cryptography"'

Search Results

1. Imitating Quantum Probabilities: Beyond Bell's Theorem and Tsirelson Bounds.

2. Progress in the prime factorization of large numbers.

3. Efficient single-state multi-party quantum key agreement.

4. A privacy preserving quantum aggregating technique.

5. Induced turbulence in the quantum channel of high dimensional QKD system using structured light.

6. De Finetti Theorems for Quantum Conditional Probability Distributions with Symmetry.

7. Quantum healthcare analysis based on smart IoT and mobile edge computing: way into network study.

8. Routing in quantum communication networks using reinforcement machine learning.

9. A chosen-plaintext attack on quantum permutation pad.

10. Optimized quantum computing technique to encrypt medical images.

11. Quantitative probability estimation of light-induced inactivation of SARS-CoV-2.

12. Artificial intelligence and quantum cryptography.

13. A rational hierarchical (t,n)-threshold quantum secret sharing scheme.

14. A resilient m-qubit quantum secret sharing scheme using quantum error correction code.

15. Authenticable dynamic quantum multi-secret sharing based on the Chinese remainder theorem.

16. Two-Layer Multiparty Quantum Key Agreement Protocol with Collective Detection.

17. Quantum-resistant public-key encryption and signature schemes with smaller key sizes.

18. Exploring the solution space: CB-WCA for efficient finite field multiplication in post-quantum cryptography.

19. Bell state-based semi-quantum signature scheme with arbitrator.

20. Time Synchronization in Satellite Quantum Key Distribution.

21. A novel quantum private set intersection scheme with a semi-honest third party.

22. Discussion on the initial states of controlled bidirectional quantum secure direct communication.

23. Slow Subscribers: a novel IoT-MQTT based denial of service attack.

24. PQC CSIKE Algorithm on Non-Cyclic Edwards Curves.

25. Lattice-Based Cryptography: A Survey.

26. Quantum coherence-assisted secure communication of internet of things information via Landau-quantized graphene.

27. Two intercept-and-resend attacks on a bidirectional quantum secure direct communication and its improvement.

28. Optimized quantum implementation of AES.

29. Quantum based flexible secure authentication protocol (SAP) for device to device (D2D) communication.

30. A Semi-Quantum Private Comparison with High-Level Security Third Party.

31. Dynamic hierarchical quantum secret sharing with general access structure.

32. Dynamic full quantum one-way function based on quantum circuit mapping.

33. A novel and quantum-resistant handover authentication protocol in IoT environment.

34. Security Loophole and Improvement of Quantum Private Query Protocol Based on W State.

35. Efficient multiparty quantum private comparison protocol based on single photons and rotation encryption.

36. Decoherence mitigation by embedding a logical qubit in a qudit.

37. Security analysis for single-state circular mediated semi-quantum key distribution.

38. Ultra-lightweight blockchain-enabled RFID authentication protocol for supply chain in the domain of 5G mobile edge computing.

39. Quantum private comparison protocol based on 4D GHZ-like states.

40. Multi-party quantum private information comparison based on nonlocal orthogonal product states.

41. Annihilating Entanglement Between Cones.

42. Enhanced BB84 quantum cryptography protocol for secure communication in wireless body sensor networks for medical applications.

43. Forty thousand kilometers under quantum protection.

44. How to verify identity in the continuous variable quantum system?

45. Cryptanalysis and improvement of a controlled quantum secure direct communication with authentication protocol based on five-particle cluster state.

46. A d-level quantum secret sharing scheme with cheat-detection (t, m) threshold.

47. Quantum and Semi–Quantum key Distribution in Networks.

48. Scalable set of reversible parity gates for integer factorization.

49. Quantum hash function based on controlled alternate lively quantum walks.

50. Cryptanalysis of three quantum money schemes.

Catalog

Books, media, physical & digital resources