Search

Your search keyword '"QUANTUM cryptography"' showing total 1,978 results

Search Constraints

Start Over You searched for: Descriptor "QUANTUM cryptography" Remove constraint Descriptor: "QUANTUM cryptography"
1,978 results on '"QUANTUM cryptography"'

Search Results

51. Assisted Postselective Quantum Transformations and an Improved Photon Number Splitting Attack Strategy.

52. An efficient and secure dynamic quantum direct two-secrets sharing scheme.

53. Time Synchronization in Satellite Quantum Key Distribution.

54. A novel quantum private set intersection scheme with a semi-honest third party.

55. Discussion on the initial states of controlled bidirectional quantum secure direct communication.

56. Semantic embedding for quantum algorithms.

57. A Post-Quantum Digital Signature Using Verkle Trees and Lattices.

58. One-to-Many Simultaneous Secure Quantum Information Transmission.

59. On the Security of Quantum Key Distribution Networks.

60. A High-Efficiency Modular Multiplication Digital Signal Processing for Lattice-Based Post-Quantum Cryptography.

61. A Secure Multi-Party Computation Protocol for Graph Editing Distance against Malicious Attacks.

62. Robustness of entanglement-based discrete- and continuous-variable quantum key distribution against channel noise.

63. Semi-quantum key distribution using qudit systems and security proof.

64. Slow Subscribers: a novel IoT-MQTT based denial of service attack.

65. A Survey on Exotic Signatures for Post-quantum Blockchain: Challenges and Research Directions.

66. Device-independent quantum randomness-enhanced zero-knowledge proof.

67. PQC CSIKE Algorithm on Non-Cyclic Edwards Curves.

68. Lattice-Based Cryptography: A Survey.

69. Experimental Demonstration of Secure Relay in Quantum Secure Direct Communication Network.

70. Quantum Obfuscation of Generalized Quantum Power Functions with Coefficient.

71. Quantum coherence-assisted secure communication of internet of things information via Landau-quantized graphene.

72. A quantum key distribution on qudits using quantum operators.

73. Review of recent challenges and solutions in quantum internet.

74. Quantum delegated computing ciphertext retrieval scheme.

75. Are spies sabotaging encryption?

76. Secure quantum computing for healthcare sector: A short analysis.

77. K-XMSS and K-SPHINCS + : Enhancing Security in Next-Generation Mobile Communication and Internet Systems with Hash Based Signatures Using Korean Cryptography Algorithms.

78. Two intercept-and-resend attacks on a bidirectional quantum secure direct communication and its improvement.

79. Optimized quantum implementation of AES.

80. Quantum based flexible secure authentication protocol (SAP) for device to device (D2D) communication.

81. Insecurity of Quantum Blockchains Based on Entanglement in Time.

82. A Semi-Quantum Private Comparison Base on W-States.

83. Applications of Neural Network-Based AI in Cryptography.

84. A Survey of Post-Quantum Cryptography: Start of a New Race.

85. Boosting Quantum Key Distribution via the End-to-End Loss Control.

86. Resource guide for teaching post-quantum cryptography.

87. A Semi-Quantum Private Comparison with High-Level Security Third Party.

88. Dynamic hierarchical quantum secret sharing with general access structure.

89. Dynamic full quantum one-way function based on quantum circuit mapping.

90. PSMECS: A provably secure ID‐based communication in mobile edge computing.

91. A novel and quantum-resistant handover authentication protocol in IoT environment.

92. Security Loophole and Improvement of Quantum Private Query Protocol Based on W State.

93. Algebraic Attacks against Grendel : An Arithmetization-Oriented Primitive with the Legendre Symbol.

94. Experimental Guesswork with Quantum Side Information Using Twisted Light.

95. Free-Space Quantum Teleportation with Orbital Angular Momentum Multiplexed Continuous Variable Entanglement.

96. Efficient multiparty quantum private comparison protocol based on single photons and rotation encryption.

97. Decoherence mitigation by embedding a logical qubit in a qudit.

98. Security analysis for single-state circular mediated semi-quantum key distribution.

99. Security of Hash Functions against Attacks Using Quantum Computers.

100. Functional Encryption Enabling Secure Leasing of Private Keys.

Catalog

Books, media, physical & digital resources