Search

Your search keyword '"QUANTUM cryptography"' showing total 11,605 results

Search Constraints

Start Over You searched for: Descriptor "QUANTUM cryptography" Remove constraint Descriptor: "QUANTUM cryptography"
11,605 results on '"QUANTUM cryptography"'

Search Results

1. Quantum-Proof Secrets.

2. Uncloneable Cryptography.

3. Engineering the electro-optic effect in HfO2 and ZrO2 through strain and polarization control.

4. Improving the success rate of quantum algorithm attacking RSA encryption system.

5. Quantum Computing Challenges and Impact on Cyber Security

6. A Quantum Physics Approach for Enabling Information-Theoretic Secure Communication Channels

7. Deniable Public-Key Authenticated Quantum Key Exchange

8. Comparative Analysis of Quantum Key Distribution Protocols: Security, Efficiency, and Practicality

9. A Novel Scalable Quantum Protocol for the Dining Cryptographers Problem

10. Building a quantum‐ready ecosystem

11. Modelling and experimental testing of an optical synchronisation beacon designed for high‐loss satellite quantum communication

12. Towards quantum‐secure software defined networks

13. Analysis of Atom against quantum attacks

14. Integrated semi‐quantum layered communication

15. Implementation of Italian industry 4.0 quantum testbed in Turin

16. Progress in the prime factorization of large numbers.

17. Secure data aggregation using quantum key management in IoT networks.

18. Efficient single-state multi-party quantum key agreement.

19. A privacy preserving quantum aggregating technique.

20. Induced turbulence in the quantum channel of high dimensional QKD system using structured light.

21. De Finetti Theorems for Quantum Conditional Probability Distributions with Symmetry.

22. Quantum healthcare analysis based on smart IoT and mobile edge computing: way into network study.

23. Efficient and secure semi-quantum private comparison protocol using three-particle GHZ-like states against participant attack.

24. A novel quantum dialogue without information leakage based on single photons in both polarization and spatial-mode degrees of freedom.

25. Continuous variable quantum teleportation network with star topology.

26. Quantum cryptography with structured photons.

27. Routing in quantum communication networks using reinforcement machine learning.

28. A chosen-plaintext attack on quantum permutation pad.

29. Multipartite Entanglement: A Journey through Geometry.

30. Nature of Nonlocality in Triangle Network based on Elegant Joint Measurement.

31. Optimized quantum computing technique to encrypt medical images.

32. Advances and Vulnerabilities in Modern Cryptographic Techniques: A Comprehensive Survey on Cybersecurity in the Domain of Machine/Deep Learning and Quantum Techniques

33. The quantum internet: A synergy of quantum information technologies and 6G networks

34. Analysis of outage performance in a 6G‐V2X communications system utilising free‐space optical quantum key distribution

35. Quantum protocol for decision making and verifying truthfulness among N‐quantum parties: Solution and extension of the quantum coin flipping game

36. Where Is the Research on Cryptographic Transition and Agility? Gaps facing the industry as quantum safe algorithms move closer to standardization.

37. Faster optimal ate pairings for cyclotomic sparse families of pairing-friendly elliptic curves with embedding degrees k=5,7.

38. Single-photon-based quantum secure protocol for the socialist millionaires’ problem

39. Jet schemes, quantum dilogarithm and Feigin-Stoyanovsky's principal subspaces.

40. Quantitative probability estimation of light-induced inactivation of SARS-CoV-2.

41. Artificial intelligence and quantum cryptography.

42. A rational hierarchical (t,n)-threshold quantum secret sharing scheme.

43. A resilient m-qubit quantum secret sharing scheme using quantum error correction code.

44. Authenticable dynamic quantum multi-secret sharing based on the Chinese remainder theorem.

45. Two-Layer Multiparty Quantum Key Agreement Protocol with Collective Detection.

46. Quantum-resistant public-key encryption and signature schemes with smaller key sizes.

47. Linking QKD Testbeds across Europe.

48. Armed with Faster Crypto: Optimizing Elliptic Curve Cryptography for ARM Processors.

49. Controlled quantum teleportation with the ability to change the destination of qubits.

50. Editorial of Applied Geometric Algebras in Computer Science and Engineering (AGACSE 21).

Catalog

Books, media, physical & digital resources