Search

Your search keyword '"quantum cryptography"' showing total 1,730 results

Search Constraints

Start Over You searched for: Descriptor "quantum cryptography" Remove constraint Descriptor: "quantum cryptography" Topic cryptography Remove constraint Topic: cryptography
1,730 results on '"quantum cryptography"'

Search Results

1. Quantum-Proof Secrets.

2. Transforming future technology with quantum-based IoT.

3. Cryptanalysis of a quantum identity-based signature and its improvement.

4. Zero-correlation linear analysis for block ciphers based on the Bernstein–Vazirani and Grover algorithms.

5. A new semiring and its cryptographic applications.

6. A comprehensive survey for cryptography implementation using quantum computing.

7. Designing quantum-secure attribute-based encryption.

8. A new bound for the orthogonality defect of HKZ reduced lattices.

9. Complete Analysis of Isogeny on Hessian Curve.

10. Verifying Hierarchic Multipartite and Network Nonlocalities with a Unified Method.

11. Enhancing the Security of Classical Communication with Post-Quantum Authenticated-Encryption Schemes for the Quantum Key Distribution.

12. Performance Analysis of Post-Quantum Cryptography Algorithms for Digital Signature.

13. Constrained Device Performance Benchmarking with the Implementation of Post-Quantum Cryptography.

14. Breaking permutation-based pseudorandom cryptographic schemes using distributed exact quantum algorithms.

15. Post-Quantum Cryptography: Effects of Quantum Computing on Modern Cryptography.

16. Secure Key Exchange in Tropical Cryptography: Leveraging Efficiency with Advanced Block Matrix Protocols.

17. Quantum implementation of SHA1 and MD5 and comparison with classical algorithms.

18. QIS-Box: Pioneering Ultralightweight S-Box Generation with Quantum Inspiration.

19. Comparative Analysis of Quantum Key Distribution Protocols: Security, Efficiency, and Practicality

20. Where Is the Research on Cryptographic Transition and Agility? Gaps facing the industry as quantum safe algorithms move closer to standardization.

21. Analysis of Atom against quantum attacks

22. Experimental Integration of Quantum Key Distribution and Post‐Quantum Cryptography in a Hybrid Quantum‐Safe Cryptosystem.

23. A survey on lattice-based digital signature.

24. A Systematic Literature Review of Current Trends in Electronic Voting System Protection Using Modern Cryptography.

25. Cryptanalysis and improvement of efficient multiparty quantum secret sharing based on a novel structure and single qubits.

26. An Efficient PSI-CA Protocol Under the Malicious Model.

27. Side-channel Analysis of Lattice-based Post-quantum Cryptography: Exploiting Polynomial Multiplication.

28. Armed with Faster Crypto: Optimizing Elliptic Curve Cryptography for ARM Processors.

29. Quantum-resistant public-key encryption and signature schemes with smaller key sizes.

30. Linking QKD Testbeds across Europe.

31. Quantum cryptanalysis of Farfalle and (generalised) key-alternating Feistel networks.

32. Advancing Cloud Image Security via AES Algorithm Enhancement Techniques.

33. Elzaki-Rohit cryptographical model.

34. Spatial Isolation Implies Zero Knowledge Even in a Quantum World.

35. Exploring the solution space: CB-WCA for efficient finite field multiplication in post-quantum cryptography.

36. mRLWE-CP-ABE: A revocable CP-ABE for post-quantum cryptography.

37. An Inquiry-Based Learning Approach to Teaching Undergraduate Cryptology.

38. A SECURE METHOD OF COMMUNICATION THROUGH BB84 PROTOCOL IN QUANTUM KEY DISTRIBUTION.

39. RATIONALE FOR IMPROVING AUTHENTICATION PROTOCOLS IN THE CONDITIONS OF POST-QUANTUM CRYPTOGRAPHY.

40. Quantum vs post-quantum security for future networks: Survey.

41. A Lightweight Symmetric Cryptography based User Authentication Protocol for IoT based Applications.

42. Deploying hybrid quantum-secured infrastructure for applications: When quantum and post-quantum can work together.

43. A New Hybrid Diffie-Hellman and Caesar Cipher Algorithm for Cryptography.

44. A High-Efficiency Modular Multiplication Digital Signal Processing for Lattice-Based Post-Quantum Cryptography.

45. A Survey on Exotic Signatures for Post-quantum Blockchain: Challenges and Research Directions.

46. The Prospects of Quantum Secure Direct Communication: An Overview.

47. Developing Secure Messaging Software using Post-Quantum Cryptography.

48. Quantum communication with RLP quantum resistant cryptography in industrial manufacturing.

49. Device-independent quantum randomness-enhanced zero-knowledge proof.

50. Lattice-Based Cryptography: A Survey.

Catalog

Books, media, physical & digital resources