Search

Your search keyword '"Quantum cryptography"' showing total 12,011 results

Search Constraints

Start Over You searched for: Descriptor "Quantum cryptography" Remove constraint Descriptor: "Quantum cryptography"
12,011 results on '"Quantum cryptography"'

Search Results

101. A Review on Quantum Machine Learning and Quantum Cryptography

102. Post Quantum Cryptography Explained.

103. Quantum Cryptography

105. High-capacity device-independent quantum secure direct communication based on hyper-encoding

106. Prospects for Legal Regulation of Quantum Communication

107. Quantum BER estimation modelling and analysis for satellite‐based quantum key distribution scenarios

108. Quantum computing’s paradigm shift : Implications and Opportunities for Cloud Computing

109. SageMath: A Quick Introduction to Cybersecurity.

113. Hybrid quantum key distribution: A novel approach for secure end-to-end communication in network infrastructure.

114. State-of-the-art analysis of quantum cryptography: applications and future prospects.

115. Enhancing Performance of Continuous-Variable Quantum Key Distribution (CV-QKD) and Gaussian Modulation of Coherent States (GMCS) in Free-Space Channels under Individual Attacks with Phase-Sensitive Amplifier (PSA) and Homodyne Detection (HD).

116. Enhanced Elliptic Curve Cryptography (EECC).

117. New Quantum Private Comparison Using Bell States.

118. A New Semi-Quantum Two-Way Authentication Protocol between Control Centers and Neighborhood Gateways in Smart Grids.

119. Technological trajectories in quantum computing to design a quantum ecosystem for industrial change.

120. Implementation of coherent one way protocol for quantum key distribution up to an effective distance of 145 km.

121. Secure Messaging Application Development: Based on Post-Quantum Algorithms CSIDH, Falcon, and AES Symmetric Key Cryptosystem.

122. Reduction of the semigroup-action problem on a module to the hidden-subgroup problem.

123. Zero-correlation linear analysis for block ciphers based on the Bernstein–Vazirani and Grover algorithms.

124. Blockchain data sharing scheme based on quantum re-encryption.

125. Optimizing Quantum Key Distribution Protocols using Decoy State Techniques and Experimental Validation.

126. A new semiring and its cryptographic applications.

127. Quantum-safe multi-server password-based authenticated key exchange protocol.

128. Quantum Computing and Its Implications for Cryptography: Assessing the Security and Efficiency of Quantum Algorithms.

129. Enhancing Cybersecurity with Quantum Cryptography: A Survey of Emerging Protocols.

130. A new bound for the orthogonality defect of HKZ reduced lattices.

131. A Systematic Review: Post Quantum Cryptography to Secure Data Transmission.

132. From the classical Frenet–Serret apparatus to the curvature and torsion of quantum-mechanical evolutions. Part I. Stationary Hamiltonians.

133. Experimental implementation of distributed phase reference quantum key distribution protocols.

134. Detectando un Espía con Criptografía Cuántica.

135. Faster optimal ate pairings for cyclotomic sparse families of pairing-friendly elliptic curves with embedding degrees k=5,7.

136. Compact and Low-Latency FPGA-Based Number Theoretic Transform Architecture for CRYSTALS Kyber Postquantum Cryptography Scheme.

137. КРИПТОГРАФІЯ ПІСЛЯ КВАНТОВОЇ ЕРИ: НОВІ ВИКЛИКИ ТА РІШЕННЯ ДЛЯ ІНФОРМАЦІЙНОЇ БЕЗПЕКИ

138. A new attack resistant encryption method based on hybrid chaotic-quantum key distribution (CQKD).

139. Complete Analysis of Isogeny on Hessian Curve.

140. A Review on Quantum Machine Learning and Quantum Cryptography.

141. Design and Enhancing Security Performance of Image Cryptography System Based on Fixed Point Chaotic Maps Stream Ciphers in FPGA.

142. Enhancing the Security of Classical Communication with Post-Quantum Authenticated-Encryption Schemes for the Quantum Key Distribution.

143. Rozwój technologii kwantowej: wyzwania i aspekty regulacyjne. Przegląd wybranych zagadnień prawnych.

144. Improved Real‐Time Post‐Processing for Quantum Random Number Generators.

145. Verifying Hierarchic Multipartite and Network Nonlocalities with a Unified Method.

146. Quantum private comparison for the socialist millionaire problem.

147. A survey on lattice‐based security and authentication schemes for smart‐grid networks in the post‐quantum era.

148. Multiparty semi-quantum secret sharing protocol based on single photon sequence and permutation.

149. Dynamic Analysis and FPGA Implementation of a New Linear Memristor-Based Hyperchaotic System with Strong Complexity.

150. Performance Analysis of Post-Quantum Cryptography Algorithms for Digital Signature.

Catalog

Books, media, physical & digital resources