Search

Your search keyword '"QUANTUM cryptography"' showing total 168 results

Search Constraints

Start Over You searched for: Descriptor "QUANTUM cryptography" Remove constraint Descriptor: "QUANTUM cryptography" Topic quantum key distribution Remove constraint Topic: quantum key distribution
168 results on '"QUANTUM cryptography"'

Search Results

1. Theoretical and simulation investigation of practical QKD for both BB84 and SARG04 protocols.

2. Efficient Integration of Rate-Adaptive Reconciliation with Syndrome-Based Error Estimation and Subblock Confirmation for Quantum Key Distribution.

3. Time Synchronization in Satellite Quantum Key Distribution.

4. On the Security of Quantum Key Distribution Networks.

5. A quantum key distribution on qudits using quantum operators.

6. Boosting Quantum Key Distribution via the End-to-End Loss Control.

7. Improving the Performance of Quantum Cryptography by Using the Encryption of the Error Correction Data.

8. Secure Communication Based On Key Generation With Quantum Reinforcement Learning.

9. Device-independent quantum key distribution using random quantum states.

10. Adaptive Continuous-Variable Quantum Key Distribution with Discrete Modulation Regulative in Free Space.

11. A Secured Half-Duplex Bidirectional Quantum Key Distribution Protocol against Collective Attacks.

12. Performance evaluation of high-dimensional quantum key distribution with single-photon detector based on avalanche photodiode.

13. Cryptanalysis and improvement of the measurement-device-independent quantum key distribution with hyper-encoding.

14. Improved semi-quantum key distribution with two almost-classical users.

15. Quantum Key Distribution: Modeling and Simulation through BB84 Protocol Using Python3.

16. Quantum Steganography Based on the B92 Quantum Protocol.

17. Performance analysis of continuous-variable quantum key distribution using non-Gaussian states.

18. A privacy preserving quantum authentication scheme for secure data sharing in wireless body area networks.

19. Cryptanalysis and improvement on two party quantum private comparison based on seven-qubit and eight-qubit states.

20. Higher-rate quantum key expansion scheme.

21. Passive decoy state phase matching quantum key distribution.

22. Simulation and Application Purpose of a Randomized Secret Key with Quantum Key Distribution.

23. Future Development of Quantum Computing and Its Relevance to NATO.

24. Shared Quantum Key Distribution Based on Asymmetric Double Quantum Teleportation.

25. A secure quantum sealed-bid auction protocol based on quantum public key encryption.

26. Measurement-device-independent quantum key distribution with classical Bob and no joint measurement.

27. Guesswork With Quantum Side Information.

28. Finite‐Size Analysis of Thermal States Quantum Cryptography with the Optimal Noise.

29. Three-party reference frame independent quantum key distribution protocol Project supported by the Botswana International University of Science and Technology Research Initiation (Grant Nos. R00015 and S00100).

30. Novel encoding–decoding procedure for quantum key distribution.

31. Key Expanding in Measurement-Device-Independent Quantum Key Distribution.

32. Bell‐GHZ Measurement‐Device‐Independent Quantum Key Distribution.

33. Measurement-device-independent quantum key distribution protocols against collective noise.

34. Intercept/resend and translucent attacks on the quantum key distribution protocol based on the pre- and post-selection effect.

35. Quantum Cryptography: A way of Improving Security of Information.

36. Analysis of multiple overlapping paths algorithms for secure key exchange in large-scale quantum networks.

37. A game-theoretic security framework for quantum cryptography: Performance analysis and application.

38. Lightweight Authentication for Quantum Key Distribution.

39. Quantum key distribution with single-particle and Bell state.

40. High-dimensional quantum key distribution with statistical and intensity fluctuations.

41. Quantum Key‐Distribution Protocols Based on a Quantum Version of the Monty Hall Game.

42. Cryptanalysis and Improvement of Quantum Sealed-Bid Auction.

43. Order statistics and random matrix theory of multicarrier continuous‐variable quantum key distribution.

44. Multicarrier continuous-variable quantum key distribution.

45. Coding in the entanglement domain.

46. Thermal states quantum cryptography with linear optics cloning machine.

47. Singular value decomposition assisted multicarrier continuous-variable quantum key distribution.

48. Composable security against collective attacks of a modified BB84 QKD protocol with information only in one basis.

49. Subcarrier Domain of Multicarrier Continuous-Variable Quantum Key Distribution.

50. 量子計算對當代密碼系統之威脅及對策.

Catalog

Books, media, physical & digital resources