Search

Your search keyword '"QUANTUM cryptography"' showing total 472 results

Search Constraints

Start Over You searched for: Descriptor "QUANTUM cryptography" Remove constraint Descriptor: "QUANTUM cryptography" Search Limiters Full Text Remove constraint Search Limiters: Full Text
472 results on '"QUANTUM cryptography"'

Search Results

1. Uncloneable Cryptography.

2. Imitating Quantum Probabilities: Beyond Bell's Theorem and Tsirelson Bounds.

3. Progress in the prime factorization of large numbers.

4. Where Is the Research on Cryptographic Transition and Agility? Gaps facing the industry as quantum safe algorithms move closer to standardization.

5. Multipartite Entanglement: A Journey through Geometry.

6. Quantitative probability estimation of light-induced inactivation of SARS-CoV-2.

7. Artificial intelligence and quantum cryptography.

8. Linking QKD Testbeds across Europe.

9. Armed with Faster Crypto: Optimizing Elliptic Curve Cryptography for ARM Processors.

10. mRLWE-CP-ABE: A revocable CP-ABE for post-quantum cryptography.

11. Quantum Secure Multi-Party Summation with Graph State.

12. Efficient Integration of Rate-Adaptive Reconciliation with Syndrome-Based Error Estimation and Subblock Confirmation for Quantum Key Distribution.

13. Assisted Postselective Quantum Transformations and an Improved Photon Number Splitting Attack Strategy.

14. A Post-Quantum Digital Signature Using Verkle Trees and Lattices.

15. One-to-Many Simultaneous Secure Quantum Information Transmission.

16. On the Security of Quantum Key Distribution Networks.

17. A High-Efficiency Modular Multiplication Digital Signal Processing for Lattice-Based Post-Quantum Cryptography.

18. A Secure Multi-Party Computation Protocol for Graph Editing Distance against Malicious Attacks.

19. Robustness of entanglement-based discrete- and continuous-variable quantum key distribution against channel noise.

20. A Survey on Exotic Signatures for Post-quantum Blockchain: Challenges and Research Directions.

21. Device-independent quantum randomness-enhanced zero-knowledge proof.

22. Experimental Demonstration of Secure Relay in Quantum Secure Direct Communication Network.

23. Quantum Obfuscation of Generalized Quantum Power Functions with Coefficient.

24. Are spies sabotaging encryption?

25. K-XMSS and K-SPHINCS + : Enhancing Security in Next-Generation Mobile Communication and Internet Systems with Hash Based Signatures Using Korean Cryptography Algorithms.

26. Insecurity of Quantum Blockchains Based on Entanglement in Time.

27. A Semi-Quantum Private Comparison Base on W-States.

28. Applications of Neural Network-Based AI in Cryptography.

29. A Survey of Post-Quantum Cryptography: Start of a New Race.

30. Boosting Quantum Key Distribution via the End-to-End Loss Control.

31. Algebraic Attacks against Grendel : An Arithmetization-Oriented Primitive with the Legendre Symbol.

32. Experimental Guesswork with Quantum Side Information Using Twisted Light.

33. Free-Space Quantum Teleportation with Orbital Angular Momentum Multiplexed Continuous Variable Entanglement.

34. Security of Hash Functions against Attacks Using Quantum Computers.

35. Functional Encryption Enabling Secure Leasing of Private Keys.

36. Development of Modern Cryptography and Research on Quantum Cryptography.

37. Elsewhere on New Scientist.

38. Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms.

39. Improving the Performance of Quantum Cryptography by Using the Encryption of the Error Correction Data.

40. Contra Bellum: Bell’s Theorem as a Confusion of Languages.

41. Concurrent Signature Scheme from Coding Theory Assumptions.

42. Forty thousand kilometers under quantum protection.

43. Security of Neural Network-Based Key Agreement Protocol for Smart Grids.

44. A Kind of (t , n) Threshold Quantum Secret Sharing with Identity Authentication.

45. A Semi-Quantum Secret-Sharing Protocol with a High Channel Capacity.

46. A novel double keys adapted elliptic curve cryptography and log normalized Gaussian sigmoid adaptive neuro‐fuzzy interference system based secure resource allocation system in decentralized cloud storage.

47. Quantum Related-Key Attack Based on Simon's Algorithm and Its Applications.

48. Scalable set of reversible parity gates for integer factorization.

49. DFT Surface Infers Ten-Vertex Cationic Carboranes from the Corresponding Neutral closo Ten-Vertex Family: The Computed Background Confirming Their Experimental Availability.

50. Quantum hash function based on controlled alternate lively quantum walks.

Catalog

Books, media, physical & digital resources