Search

Your search keyword '"Quantum cryptography"' showing total 11,891 results

Search Constraints

Start Over You searched for: Descriptor "Quantum cryptography" Remove constraint Descriptor: "Quantum cryptography"
11,891 results on '"Quantum cryptography"'

Search Results

1. Quantum-Proof Secrets.

2. Demystifying Quantum.

3. Satellite dish-like nanocomposite as a breakthrough in single photon detection for highly developed optoelectronic applications.

4. Scenarios for Optical Encryption Using Quantum Keys †.

5. Verifiable quantum secret sharing scheme using Bell states for a class of special access structures.

6. Quantum-secure content key delivery mechanism for DRM system.

7. A threshold changeable dynamic quantum secret sharing scheme with cheating identification.

8. Comment on "quantum identity authentication with single photon".

9. Verifiable dynamic quantum secret sharing based on generalized Hadamard gate.

10. Quantum secret sharing with (m, n) threshold: QFT and identity authentication.

11. A novel digital contents privacy scheme based on quantum harmonic oscillator and schrodinger paradox.

12. A novel quantum multiparty blind signature scheme based on χ state.

13. Probabilistic versions of Quantum Private Queries.

14. Paving the Way for SQIsign: Toward Efficient Deployment on 32-bit Embedded Devices.

15. A privacy preserving quantum authentication scheme for secure data sharing in wireless body area networks.

16. Advancing quantum steganography: a secure IoT communication with reversible decoding and customized encryption technique for smart cities.

17. Transforming future technology with quantum-based IoT.

18. Free‐space quantum key distribution transmitter system using WDM filter for channel integration.

19. Privately Generated Key Pairs for Post Quantum Cryptography in a Distributed Network.

20. Enhanced cryptography techniques using inherited process with cyclic crossover operation in big data.

21. QSKCG: Quantum‐based secure key communication and key generation scheme for outsourced data in cloud.

22. Room Temperature Emission Line Narrowing and Long‐Range Photon Transport in Colloidal Quantum Wells Coupled to Metasurface Resonance.

23. Fully controllable time-bin entangled states distributed over 100-km single-mode fibers.

24. Cryptanalysis of a quantum identity-based signature and its improvement.

25. Metalens array for quantum random number.

26. Lattice-Based Post-Quantum Public Key Encryption Scheme Using ElGamal's Principles.

27. QUANTUM-RESISTANT CRYPTOGRAPHIC ALGORITHMS FOR SECURE COMMUNICATION.

28. A New Protocol for Semi‐quantum Private Set of Intersection and Union Mixed Cardinality for Any Tripartite Based on Bell States.

29. Photon Detectors and Emitters for Quantum Communication Systems and Quantum Frequency Standards.

30. A Multiparty Quantum Private Equality Comparison Scheme Relying on | GHZ 3 〉 States.

31. Advances in artificial intelligence and machine learning for quantum communication applications

32. A novel quantum key distribution resistant against large‐pulse attacks

33. Analysis of RSA and Shor's algorithm for cryptography: A quantum perspective.

34. Masked torsion point SIDH-countermeasure for Castryck-Decru attack.

35. Role of hash-based signatures in quantum cryptography.

36. Engineering the electro-optic effect in HfO2 and ZrO2 through strain and polarization control.

37. Improving the success rate of quantum algorithm attacking RSA encryption system.

38. Uncloneable Cryptography.

39. SageMath: A Quick Introduction to Cybersecurity.

42. An efficient quantum oblivious transfer protocol.

43. Lattice-based ring signcryption scheme for smart healthcare management.

44. Designing quantum-secure attribute-based encryption.

45. Multiparty Simultaneous Quantum Identity Authentication: A Measurement-Device-Independent Approach.

46. Prospects for Legal Regulation of Quantum Communication

47. High-capacity device-independent quantum secure direct communication based on hyper-encoding

48. Quantum computing’s paradigm shift : Implications and Opportunities for Cloud Computing

49. Quantum BER estimation modelling and analysis for satellite‐based quantum key distribution scenarios

50. Hybrid quantum key distribution: A novel approach for secure end-to-end communication in network infrastructure.

Catalog

Books, media, physical & digital resources