Journal articles on the topic 'Quantum cryptographic protocols'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Quantum cryptographic protocols.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Goyal, Rohit. "Quantum Cryptography: Secure Communication Beyond Classical Limits." Journal of Quantum Science and Technology 1, no. 1 (March 31, 2024): 1–5. http://dx.doi.org/10.36676/jqst.v1.i1.01.
Full textChandre, Pankaj R., Bhagyashree D. Shendkar, Sayalee Deshmukh, Sameer Kakade, and Suvarna Potdukhe. "Machine Learning-Enhanced Advancements in Quantum Cryptography: A Comprehensive Review and Future Prospects." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 11s (October 10, 2023): 642–55. http://dx.doi.org/10.17762/ijritcc.v11i11s.8300.
Full textZhou, Zishuai, Qisheng Guang, Chaohui Gao, Dong Jiang, and Lijun Chen. "Measurement-Device-Independent Two-Party Cryptography with Error Estimation." Sensors 20, no. 21 (November 7, 2020): 6351. http://dx.doi.org/10.3390/s20216351.
Full textBukashkin, S. А., and М. А. Cherepniov. "Quantum Computer and Post-Quantum Cryptography." Programmnaya Ingeneria 12, no. 4 (July 14, 2021): 171–78. http://dx.doi.org/10.17587/prin.12.171-178.
Full textKushwah, Kirti, Akanksha, Aniket Varshney, Arpit Jain, and Astitva Singh. "Simulating the BB84 Protocol." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (May 31, 2023): 5916–20. http://dx.doi.org/10.22214/ijraset.2023.52840.
Full textOkhrimenko, Tetiana, Serhii Dorozhynskyi, and Bohdan Horbakha. "ANALYSIS OF QUANTUM SECURE DIRECT COMMUNICATION PROTOCOLS." Computer systems and information technologies, no. 1 (March 30, 2023): 62–67. http://dx.doi.org/10.31891/csit-2023-1-8.
Full textMüller, Johannes, and Jan Oupický. "Post-quantum XML and SAML Single Sign-On." Proceedings on Privacy Enhancing Technologies 2024, no. 4 (October 2024): 525–43. http://dx.doi.org/10.56553/popets-2024-0128.
Full textSong, Yaqi, and Li Yang. "Practical Quantum Bit Commitment Protocol Based on Quantum Oblivious Transfer." Applied Sciences 8, no. 10 (October 19, 2018): 1990. http://dx.doi.org/10.3390/app8101990.
Full textHallgren, Sean, Adam Smith, and Fang Song. "Classical cryptographic protocols in a quantum world." International Journal of Quantum Information 13, no. 04 (June 2015): 1550028. http://dx.doi.org/10.1142/s0219749915500288.
Full textTeja, Penumantra Satya Sai, Mounika Lakshmi P, and Vinay Kumar K. "A Secure Communication through Quantum Key Distribution Protocols." International Research Journal of Electronics and Computer Engineering 4, no. 3 (September 30, 2018): 14. http://dx.doi.org/10.24178/irjece.2018.4.3.14.
Full textOstrianska, Ye V., S. О. Kandiy, I. D. Gorbenko, and M. V. Yesina. "Classification and analysis of vulnerabilities of modern information systems from classical and quantum attacks." Radiotekhnika, no. 211 (December 30, 2022): 7–21. http://dx.doi.org/10.30837/rt.2022.4.211.01.
Full textRani, Rashmi. "Quantum Cryptography: Fundamentals and Advanced Techniques." International Journal for Research in Applied Science and Engineering Technology 12, no. 5 (May 31, 2024): 5747–51. http://dx.doi.org/10.22214/ijraset.2024.62943.
Full textAllerstorfer, Rene, Harry Buhrman, Alex May, Florian Speelman, and Philip Verduyn Lunel. "Relating non-local quantum computation to information theoretic cryptography." Quantum 8 (June 27, 2024): 1387. http://dx.doi.org/10.22331/q-2024-06-27-1387.
Full textWang, Tianyi, and Zetong Xu. "The application of group theory behind modern cryptography." Theoretical and Natural Science 13, no. 1 (November 30, 2023): 195–201. http://dx.doi.org/10.54254/2753-8818/13/20240844.
Full textYadav, Sonam. "An Extensive Study on Lattice-Based Cryptography and its Applications for RLWE-Based Problems." Universal Research Reports 10, no. 3 (2023): 104–10. http://dx.doi.org/10.36676/urr.2023-v10i3-014.
Full textWang, Ming-Ming, Jun-Li Liu, and Lin-Ming Gong. "Semiquantum secure direct communication with authentication based on single-photons." International Journal of Quantum Information 17, no. 03 (April 2019): 1950024. http://dx.doi.org/10.1142/s0219749919500242.
Full textNajeeb, Mahira, Dr Ammar Masood, and Dr Adnan Fazil. "Quantum Key Distribution for Secure Communications." Vol 4 Issue 4 4, no. 4 (October 30, 2022): 173–83. http://dx.doi.org/10.33411/ijist/2022040406.
Full textKhawasik, Manal, Wagdy Gomaa El-Sayed, M. Z. Rashad, and Ahmed Younes. "A Secured Half-Duplex Bidirectional Quantum Key Distribution Protocol against Collective Attacks." Symmetry 14, no. 12 (November 23, 2022): 2481. http://dx.doi.org/10.3390/sym14122481.
Full textVictor, Melvin, D. David Winster Praveenraj, Sasirekha R, Ahmed Alkhayyat, and Abdullayeva Shakhzoda. "Cryptography: Advances in Secure Communication and Data Protection." E3S Web of Conferences 399 (2023): 07010. http://dx.doi.org/10.1051/e3sconf/202339907010.
Full textCherckesova, Larissa V., Olga A. Safaryan, Alexey N. Beskopylny, and Elena Revyakina. "Development of Quantum Protocol Modification CSLOE–2022, Increasing the Cryptographic Strength of Classical Quantum Protocol BB84." Electronics 11, no. 23 (November 29, 2022): 3954. http://dx.doi.org/10.3390/electronics11233954.
Full textYadav, Sonam. "Work in Lattice-Based Cryptography: Key Exchange Protocols under RLWE-Based Problems and Ding Reconciliation Technique." International Journal for Research Publication and Seminars 14, no. 4 (2023): 178–84. http://dx.doi.org/10.36676/jrps.2023-v14i4-024.
Full textSedat Sonko, Kenneth Ifeanyi Ibekwe, Valentine Ikenna Ilojianya, Emmanuel Augustine Etukudoh, and Adefunke Fabuyide. "QUANTUM CRYPTOGRAPHY AND U.S. DIGITAL SECURITY: A COMPREHENSIVE REVIEW: INVESTIGATING THE POTENTIAL OF QUANTUM TECHNOLOGIES IN CREATING UNBREAKABLE ENCRYPTION AND THEIR FUTURE IN NATIONAL SECURITY." Computer Science & IT Research Journal 5, no. 2 (February 18, 2024): 390–414. http://dx.doi.org/10.51594/csitrj.v5i2.790.
Full textPham, Hai, Rainer Steinwandt, and Adriana Suárez Corona. "Integrating Classical Preprocessing into an Optical Encryption Scheme." Entropy 21, no. 9 (September 7, 2019): 872. http://dx.doi.org/10.3390/e21090872.
Full textKumar,, Varun. "Challenges and Future Trends of Cryptography in Internet of Things." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (April 10, 2024): 1–5. http://dx.doi.org/10.55041/ijsrem30505.
Full textAnnu. "Algebraic Structures and Their Applications in Modern Cryptography." Innovative Research Thoughts 10, no. 3 (July 25, 2024): 52–59. http://dx.doi.org/10.36676/irt.v10.i3.1433.
Full textLongo, Riccardo, Carla Mascia, Alessio Meneghetti, Giordano Santilli, and Giovanni Tognolini. "Adaptable Cryptographic Primitives in Blockchains via Smart Contracts." Cryptography 6, no. 3 (June 29, 2022): 32. http://dx.doi.org/10.3390/cryptography6030032.
Full textChen, K., and H. K. Lo. "Multi-partite quantum cryptographic protocols with noisy GHZ states." Quantum Information and Computation 7, no. 8 (November 2007): 689–715. http://dx.doi.org/10.26421/qic7.8-1.
Full textSubbarao, Kondapalli V. V., and Manas Kumar Yogi. "An Investigative Study on Variants of Post-Quantum RSA." Journal of Cryptography and Network Security, Design and Codes 1, no. 1 (April 9, 2024): 19–31. http://dx.doi.org/10.46610/jocnsdc.2024.v01i01.003.
Full textChen, Geng, Yuqi Wang, Liya Jian, Yi Zhou, Shiming Liu, Jiawei Luo, and Kun Yang. "Quantum identity authentication protocol based on flexible quantum homomorphic encryption with qubit rotation." Journal of Applied Physics 133, no. 6 (February 14, 2023): 064402. http://dx.doi.org/10.1063/5.0135896.
Full textSabani, Maria E., Ilias K. Savvas, and Georgia Garani. "Learning with Errors: A Lattice-Based Keystone of Post-Quantum Cryptography." Signals 5, no. 2 (April 13, 2024): 216–43. http://dx.doi.org/10.3390/signals5020012.
Full textChen, Na, Dong Xiao Quan, Chang Xing Pei, and Hong Yang. "Arbitrated Quantum Signature Scheme with Message Bits Intertwined." Applied Mechanics and Materials 481 (December 2013): 7–13. http://dx.doi.org/10.4028/www.scientific.net/amm.481.7.
Full textR, Mr Suresh. "A Survey on Quantum-Cryptographic Image Encryption for Secure Storage." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (April 3, 2024): 1–5. http://dx.doi.org/10.55041/ijsrem29461.
Full textFeltovic, Milan. "FROM THEORY TO PRACTICE: THE ROLE OF CRYPTOGRAPHY IN SECURING BLOCKCHAIN NETWORKS." MEST Journal 12, no. 2 (July 15, 2024): 93–102. http://dx.doi.org/10.12709/mest.12.12.02.12.
Full textLo, H.-K., and T.-M. Ko. "Some attacks on quantum-based cryptographic protocols." Quantum Information and Computation 5, no. 1 (January 2005): 40–47. http://dx.doi.org/10.26421/qic5.1-4.
Full textKuhn, D. R. "A quantum cryptographic protocol with detection of compromised server." Quantum Information and Computation 5, no. 7 (November 2005): 551–60. http://dx.doi.org/10.26421/qic5.7-3.
Full textOpiłka, Filip, Marcin Niemiec, Maria Gagliardi, and Michail Alexandros Kourtis. "Performance Analysis of Post-Quantum Cryptography Algorithms for Digital Signature." Applied Sciences 14, no. 12 (June 7, 2024): 4994. http://dx.doi.org/10.3390/app14124994.
Full textShukla, Chitra, Anindita Banerjee, Anirban Pathak, and R. Srikanth. "Secure quantum communication with orthogonal states." International Journal of Quantum Information 14, no. 06 (September 2016): 1640021. http://dx.doi.org/10.1142/s0219749916400219.
Full textSabani, Maria E., Ilias K. Savvas, Dimitrios Poulakis, Georgia Garani, and Georgios C. Makris. "Evaluation and Comparison of Lattice-Based Cryptosystems for a Secure Quantum Computing Era." Electronics 12, no. 12 (June 12, 2023): 2643. http://dx.doi.org/10.3390/electronics12122643.
Full textNeupane, Kashi. "Two-party key establishment: From passive to active security without introducing new assumptions." gcc 4, no. 1 (May 2012): 1–17. http://dx.doi.org/10.1515/gcc-2012-0005.
Full textPaul, Surjit, Sanjay Kumar, and Rajiv Ranjan Suman. "A Quantum Secure Entity Authentication Protocol Design for Network Security." International Journal of Information Security and Privacy 13, no. 4 (October 2019): 1–11. http://dx.doi.org/10.4018/ijisp.2019100101.
Full textAlborch, Ferran, Ramiro Martínez, and Paz Morillo. "R-LWE-Based Distributed Key Generation and Threshold Decryption." Mathematics 10, no. 5 (February 25, 2022): 728. http://dx.doi.org/10.3390/math10050728.
Full textLiu, Bin, Zhifeng Gao, Di Xiao, Wei Huang, Zhiqing Zhang, and Bingjie Xu. "Quantum Identity Authentication in the Counterfactual Quantum Key Distribution Protocol." Entropy 21, no. 5 (May 23, 2019): 518. http://dx.doi.org/10.3390/e21050518.
Full textGrosshans, F., N. J. Cerf, J. Wenger, R. Tualle-Brouri, and Ph Grangier. "Virtual entanglement and reconciliation protocols for quantum cryptography with continuous variables." Quantum Information and Computation 3, special (October 2003): 535–52. http://dx.doi.org/10.26421/qic3.s-6.
Full textHernández-Álvarez, Luis, Juan José Bullón Pérez, Farrah Kristel Batista, and Araceli Queiruga-Dios. "Security Threats and Cryptographic Protocols for Medical Wearables." Mathematics 10, no. 6 (March 10, 2022): 886. http://dx.doi.org/10.3390/math10060886.
Full textDolgochub, Evgeny A., and Alexey N. Polikanin. "ANALYSIS OF QUANTUM BB84 AND B92 ENCRYPTION ALGORITHMS." Interexpo GEO-Siberia 6, no. 1 (July 8, 2020): 125–30. http://dx.doi.org/10.33764/2618-981x-2020-6-1-125-130.
Full textSaxena, Ashwin, Kishore Thapliyal, and Anirban Pathak. "Continuous variable controlled quantum dialogue and secure multiparty quantum computation." International Journal of Quantum Information 18, no. 04 (June 2020): 2050009. http://dx.doi.org/10.1142/s0219749920500094.
Full textGreen, Adrien, Jeremy Lawrence, George Siopsis, Nicholas A. Peters, and Ali Passian. "Quantum Key Distribution for Critical Infrastructures: Towards Cyber-Physical Security for Hydropower and Dams." Sensors 23, no. 24 (December 14, 2023): 9818. http://dx.doi.org/10.3390/s23249818.
Full textPastorello, Davide. "Open-loop quantum control as a resource for secure communications." International Journal of Quantum Information 14, no. 02 (March 2016): 1650010. http://dx.doi.org/10.1142/s0219749916500106.
Full textKurysheva, A. A. "OVERVIEW OF CANDIDATES FOR QUANTUM-RESISTANT CIPHERS." Vestnik komp'iuternykh i informatsionnykh tekhnologii, no. 226 (April 2023): 49–60. http://dx.doi.org/10.14489/vkit.2023.04.pp.049-060.
Full textMihalkovich, Aleksejus, Eligijus Sakalauskas, and Kestutis Luksys. "Key Exchange Protocol Defined over a Non-Commuting Group Based on an NP-Complete Decisional Problem." Symmetry 12, no. 9 (August 20, 2020): 1389. http://dx.doi.org/10.3390/sym12091389.
Full text