Search

Your search keyword '"quantum cryptography"' showing total 11,819 results

Search Constraints

Start Over You searched for: Descriptor "quantum cryptography" Remove constraint Descriptor: "quantum cryptography"
11,819 results on '"quantum cryptography"'

Search Results

1. Quantum-Proof Secrets.

2. Masked torsion point SIDH-countermeasure for Castryck-Decru attack.

3. Uncloneable Cryptography.

4. Engineering the electro-optic effect in HfO2 and ZrO2 through strain and polarization control.

5. A privacy preserving quantum authentication scheme for secure data sharing in wireless body area networks.

6. Advancing quantum steganography: a secure IoT communication with reversible decoding and customized encryption technique for smart cities.

7. Transforming future technology with quantum-based IoT.

8. QSKCG: Quantum‐based secure key communication and key generation scheme for outsourced data in cloud.

9. Room Temperature Emission Line Narrowing and Long‐Range Photon Transport in Colloidal Quantum Wells Coupled to Metasurface Resonance.

10. Fully controllable time-bin entangled states distributed over 100-km single-mode fibers.

11. Cryptanalysis of a quantum identity-based signature and its improvement.

12. Metalens array for quantum random number.

13. Lattice-Based Post-Quantum Public Key Encryption Scheme Using ElGamal's Principles.

14. A Multiparty Quantum Private Equality Comparison Scheme Relying on | GHZ 3 〉 States.

15. Hybrid quantum key distribution: A novel approach for secure end-to-end communication in network infrastructure.

16. State-of-the-art analysis of quantum cryptography: applications and future prospects.

17. Enhancing Performance of Continuous-Variable Quantum Key Distribution (CV-QKD) and Gaussian Modulation of Coherent States (GMCS) in Free-Space Channels under Individual Attacks with Phase-Sensitive Amplifier (PSA) and Homodyne Detection (HD).

18. Reduction of the semigroup-action problem on a module to the hidden-subgroup problem.

19. Zero-correlation linear analysis for block ciphers based on the Bernstein–Vazirani and Grover algorithms.

20. Blockchain data sharing scheme based on quantum re-encryption.

21. Secure Messaging Application Development: Based on Post-Quantum Algorithms CSIDH, Falcon, and AES Symmetric Key Cryptosystem.

22. Technological trajectories in quantum computing to design a quantum ecosystem for industrial change.

23. Implementation of coherent one way protocol for quantum key distribution up to an effective distance of 145 km.

24. New Quantum Private Comparison Using Bell States.

25. A New Semi-Quantum Two-Way Authentication Protocol between Control Centers and Neighborhood Gateways in Smart Grids.

26. A new semiring and its cryptographic applications.

27. Optimizing Quantum Key Distribution Protocols using Decoy State Techniques and Experimental Validation.

28. Role of hash-based signatures in quantum cryptography.

29. A comprehensive survey for cryptography implementation using quantum computing.

30. Improving the success rate of quantum algorithm attacking RSA encryption system.

31. Hacking the unhackable?

32. The quantum leap in secure communication networks.

33. An efficient quantum oblivious transfer protocol.

34. Lattice-based ring signcryption scheme for smart healthcare management.

35. Designing quantum-secure attribute-based encryption.

36. Multiparty Simultaneous Quantum Identity Authentication: A Measurement-Device-Independent Approach.

37. High-capacity device-independent quantum secure direct communication based on hyper-encoding

38. Quantum computing’s paradigm shift : Implications and Opportunities for Cloud Computing

39. Quantum BER estimation modelling and analysis for satellite‐based quantum key distribution scenarios

40. Quantum-safe multi-server password-based authenticated key exchange protocol.

41. A new bound for the orthogonality defect of HKZ reduced lattices.

42. A Systematic Review: Post Quantum Cryptography to Secure Data Transmission.

43. From the classical Frenet–Serret apparatus to the curvature and torsion of quantum-mechanical evolutions. Part I. Stationary Hamiltonians.

44. A new attack resistant encryption method based on hybrid chaotic-quantum key distribution (CQKD).

45. Compact and Low-Latency FPGA-Based Number Theoretic Transform Architecture for CRYSTALS Kyber Postquantum Cryptography Scheme.

46. Experimental implementation of distributed phase reference quantum key distribution protocols.

47. Faster optimal ate pairings for cyclotomic sparse families of pairing-friendly elliptic curves with embedding degrees k=5,7.

48. Complete Analysis of Isogeny on Hessian Curve.

49. Quantum private comparison for the socialist millionaire problem.

50. Design and Enhancing Security Performance of Image Cryptography System Based on Fixed Point Chaotic Maps Stream Ciphers in FPGA.

Catalog

Books, media, physical & digital resources