Journal articles on the topic 'Quantum security definitions'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Quantum security definitions.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Arapinis, Myrto, Nikolaos Lamprou, Elham Kashefi, and Anna Pappa. "Definitions and Security of Quantum Electronic Voting." ACM Transactions on Quantum Computing 2, no. 1 (2021): 1–33. http://dx.doi.org/10.1145/3450144.
Full textArrazola, Juan Miguel, Petros Wallden, and Erika Andersson. "Multiparty quantum signature schemes." Quantum Information and Computation 16, no. 5&6 (2016): 435–64. http://dx.doi.org/10.26421/qic16.5-6-3.
Full textRENNER, RENATO. "SECURITY OF QUANTUM KEY DISTRIBUTION." International Journal of Quantum Information 06, no. 01 (2008): 1–127. http://dx.doi.org/10.1142/s0219749908003256.
Full textSchanck, John M., William Whyte, and Zhenfei Zhang. "Circuit-extension handshakes for Tor achieving forward secrecy in a quantum world." Proceedings on Privacy Enhancing Technologies 2016, no. 4 (2016): 219–36. http://dx.doi.org/10.1515/popets-2016-0037.
Full textHe, Chenfeng, Fatna Kouider, and Péter Kutas. "Updatable threshold encryption from isogenies." Annales Universitatis Scientiarum Budapestinensis de Rolando Eötvös Nominatae. Sectio computatorica 57 (2024): 69–99. https://doi.org/10.71352/ac.57.069.
Full textAlagic, Gorjan, Tommaso Gagliardoni, and Christian Majenz. "Can you sign a quantum state?" Quantum 5 (December 16, 2021): 603. http://dx.doi.org/10.22331/q-2021-12-16-603.
Full textSoumitra, Bhattacharya. "Cryptology and Information Security - Past, Present, and Future Role in Society." International Journal on Cryptography and Information Security (IJCIS) 9, no. 1/2 (2019): 13–36. https://doi.org/10.5281/zenodo.3341012.
Full textTejesh Raju Peruri, Rajesh Jujjuvarapu, Rishi Macha, Rishi Macha, Dinesh Balusu, and Hari Nagendra Nerusu. "Cryptographic Algorithms and Protocols: Evolution and Future Trend." International Research Journal on Advanced Engineering and Management (IRJAEM) 3, no. 06 (2025): 2253–55. https://doi.org/10.47392/irjaem.2025.0354.
Full textKent, Adrian. "S-money: virtual tokens for a relativistic economy." Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences 475, no. 2225 (2019): 20190170. http://dx.doi.org/10.1098/rspa.2019.0170.
Full textXin, Xiangjun, Qinglan Yang, and Fagen Li. "Quantum proxy signature with provable security." Modern Physics Letters A 35, no. 24 (2020): 2050197. http://dx.doi.org/10.1142/s0217732320501977.
Full textKundu, Srijita, and Ernest Y. Z. Tan. "Device-independent uncloneable encryption." Quantum 9 (January 8, 2025): 1582. https://doi.org/10.22331/q-2025-01-08-1582.
Full textChen, F. L., and Z. F. Han. "Quantum group signature scheme based on controlled quantum teleportation." International Journal of Quantum Information 14, no. 08 (2016): 1650041. http://dx.doi.org/10.1142/s0219749916500416.
Full textCzerwinski, Artur. "Quantum Perspective on Digital Money: Towards a Quantum-Powered Financial System." Telecom 6, no. 3 (2025): 50. https://doi.org/10.3390/telecom6030050.
Full textJiang, Yazhuo, Tao Shang, Yao Tang, and Jianwei Liu. "Quantum Obfuscation of Generalized Quantum Power Functions with Coefficient." Entropy 25, no. 11 (2023): 1524. http://dx.doi.org/10.3390/e25111524.
Full textCao, Zhu. "Quantum private function evaluation." New Journal of Physics 25, no. 10 (2023): 103027. http://dx.doi.org/10.1088/1367-2630/acffec.
Full textPachankis, Y. "Theory on Extremal Nucleon Heuristics to Psychiatry." European Psychiatry 66, S1 (2023): S282. http://dx.doi.org/10.1192/j.eurpsy.2023.637.
Full textZhang, Hongliang, Dongxiao Quan, Changhua Zhu, and Zhigang Li. "A Quantum Cryptography Communication Network Based on Software Defined Network." ITM Web of Conferences 17 (2018): 01008. http://dx.doi.org/10.1051/itmconf/20181701008.
Full textGutoski, Gus, Ansis Rosmanis, and Jamie Sikora. "Fidelity of quantum strategies with applications to cryptography." Quantum 2 (September 3, 2018): 89. http://dx.doi.org/10.22331/q-2018-09-03-89.
Full textSmushkin, A. B. "Information Security of Electronic Document Flow in Criminal Proceedings." Actual Problems of Russian Law 20, no. 4 (2025): 146–56. https://doi.org/10.17803/1994-1471.2025.173.4.146-156.
Full textWang, Yifan. "State-of-art applications and the function of quantum entanglement in quantum information." Theoretical and Natural Science 10, no. 1 (2023): 9–15. http://dx.doi.org/10.54254/2753-8818/10/20230302.
Full textXie, Congge, Jian Weng, and Jinming Wen. "Scalable Revocable Identity-Based Signature Scheme with Signing Key Exposure Resistance from Lattices." Security and Communication Networks 2020 (January 14, 2020): 1–11. http://dx.doi.org/10.1155/2020/1743421.
Full textTomamichel, Marco, and Anthony Leverrier. "A largely self-contained and complete security proof for quantum key distribution." Quantum 1 (July 14, 2017): 14. http://dx.doi.org/10.22331/q-2017-07-14-14.
Full textBroadbent, Anne. "Delegating private quantum computations." Canadian Journal of Physics 93, no. 9 (2015): 941–46. http://dx.doi.org/10.1139/cjp-2015-0030.
Full textHu, Yanglin, Yingkai Ouyang, and Marco Tomamichel. "Privacy and correctness trade-offs for information-theoretically secure quantum homomorphic encryption." Quantum 7 (April 13, 2023): 976. http://dx.doi.org/10.22331/q-2023-04-13-976.
Full textGorbenko, Yu I., M. V. Yesina, V. A. Ponomar, I. D. Gorbenko, and E. Yu Kapt'ol. "Scientific and methodological bases of analysis, evaluation and results of comparison of existing and promising (post-quantum) asymmetric cryptographic primitives of electronic signature, protocols of asymmetric encryption and key encapsulation protocols." Radiotekhnika, no. 212 (March 28, 2023): 42–65. http://dx.doi.org/10.30837/rt.2023.1.212.05.
Full textAlgazy, Kunbolat, Kairat Sakan, Saule Nyssanbayeva, and Oleg Lizunov. "Syrga2: Post-Quantum Hash-Based Signature Scheme." Computation 12, no. 6 (2024): 125. http://dx.doi.org/10.3390/computation12060125.
Full textLiu, Yonghong. "Group and Cipher in Wormhole and Quantum Entanglement." European Journal of Pure and Applied Mathematics 14, no. 2 (2021): 521–36. http://dx.doi.org/10.29020/nybg.ejpam.v14i2.3972.
Full textSong, Yaqi, and Li Yang. "Practical Quantum Bit Commitment Protocol Based on Quantum Oblivious Transfer." Applied Sciences 8, no. 10 (2018): 1990. http://dx.doi.org/10.3390/app8101990.
Full textYesina, M. V., S. O. Kandiy, E. V. Ostryanska, and I. D. Gorbenko. "Generation of general system parameters for Rainbow electronic signature scheme for 384 and 512 security bits." Radiotekhnika, no. 204 (April 9, 2021): 16–23. http://dx.doi.org/10.30837/rt.2021.1.204.02.
Full textWang, Tianyi, and Zetong Xu. "The application of group theory behind modern cryptography." Theoretical and Natural Science 13, no. 1 (2023): 195–201. http://dx.doi.org/10.54254/2753-8818/13/20240844.
Full textŠkorić, Boris, and Manon de Vries. "Quantum Key Recycling with 8-state encoding (The Quantum One-Time Pad is more interesting than we thought)." International Journal of Quantum Information 15, no. 03 (2017): 1750016. http://dx.doi.org/10.1142/s0219749917500162.
Full textGavrilova, Alla, Iryna Aksonova, Yuliia Khokhlachova, Tetiana Milevska, and Sergii Dunaiev. "RATIONALE FOR IMPROVING AUTHENTICATION PROTOCOLS IN THE CONDITIONS OF POST-QUANTUM CRYPTOGRAPHY." Ukrainian Scientific Journal of Information Security 30, no. 1 (2024): 130–39. http://dx.doi.org/10.18372/2225-5036.30.18614.
Full textAlahmar, Haeder Talib Mahde. "Quantum-enhanced Federated Learning for Ethical Medical Image Analysis." Asian Journal of Research in Computer Science 18, no. 5 (2025): 257–68. https://doi.org/10.9734/ajrcos/2025/v18i5653.
Full textHorlynskyi, Viktor, та Borys Horlynskyi. "Сonstitution of national cyber space and its educational significance for cyber security professionals". Collection "Information Technology and Security" 11, № 1 (2023): 69–83. http://dx.doi.org/10.20535/2411-1031.2023.11.1.283710.
Full textUday, Pratap Singh. "A study of Nuclear Doctrine of India." RESEARCH REVIEW International Journal of Multidisciplinary 03, no. 09 (2018): 639–42. https://doi.org/10.5281/zenodo.1435897.
Full textManduva, Vinay Chowdary. "Advancing AI in Edge Computing with Graph Neural Networks for Predictive Analytics." Research and Analysis Journal 7, no. 05 (2024): 22–45. https://doi.org/10.18535/raj.v7i05.400.
Full textShen, Zepeng, Zhiyuan Wang, Jiajia Chew, Ke Hu, and Yong Wang. "Artificial Intelligence Empowering Robo-Advisors: A Data-Driven Wealth Management Model Analysis." International Journal of Management Science Research 8, no. 3 (2025): 1–12. https://doi.org/10.53469/ijomsr.2025.08(03).01.
Full textNape, Isaac, Valeria Rodríguez-Fajardo, Feng Zhu, Hsiao-Chih Huang, Jonathan Leach, and Andrew Forbes. "Measuring dimensionality and purity of high-dimensional entangled states." Nature Communications 12, no. 1 (2021). http://dx.doi.org/10.1038/s41467-021-25447-0.
Full text"DEFINING ISSUES OF CRYPTOGRAPHIC AND TECHNICAL INFORMATION SECURITY, CYBERSECURITY AND COUNTERING TECHNICAL INTELLIGENCE." State Formation, no. 1 (2022). http://dx.doi.org/10.26565/1992-2337-2022-1-04.
Full textNadeem, Mohd, Masood Ahmad, Syed Anas Ansar, Prabhash Chandra Pathak, Rajeev Kumar, and Raees Ahmad Khan. "Security Evaluation of Software by Using Fuzzy-TOPSIS through Quantum Criteria." Journal of Fuzzy Logic and Modeling in Engineering 02 (August 17, 2023). http://dx.doi.org/10.2174/2666294902666230817162030.
Full textAbdolmaleki, Behzad, Céline Chevalier, Ehsan Ebrahimi, Giulio Malavolta, and Quoc-Huy Vu. "On Quantum Simulation-Soundness." IACR Communications in Cryptology 1, no. 4 (2025). https://doi.org/10.62056/a66ce0iuc.
Full textPan, Chuyue, Tao Shang, and Yuanjing Zhang. "Universal quantum obfuscation for quantum non-linear functions." Frontiers in Physics 10 (January 4, 2023). http://dx.doi.org/10.3389/fphy.2022.1048832.
Full textHyman, Prue. "A Living Wage - The Current New Zealand Campaign and the International Background." Labour, Employment and Work in New Zealand, January 1, 2013. http://dx.doi.org/10.26686/lew.v0i0.1974.
Full textSun, Shi-Hai, Zhi-Yu Tian, Mei-Sheng Zhao, and Yan Ma. "Security evaluation of quantum key distribution with weak basis-choice flaws." Scientific Reports 10, no. 1 (2020). http://dx.doi.org/10.1038/s41598-020-75159-6.
Full textWang, Yang, and Mingqiang Wang. "Improved AB‐CPREs with Revocability and HRA Security under LWE." IET Information Security 2024, no. 1 (2024). http://dx.doi.org/10.1049/2024/4333883.
Full textYesina, M. V., S. G. Vdovenko, and I. D. Gorbenko. "MODELS OF SECURITY OF POST-QUANTUM ASYMMETRIC ENCUSSION BASED ON INDISTINGUISHABILITY." Проблеми створення, випробування, застосування та експлуатації складних інформаційних систем, March 29, 2019, 15–26. http://dx.doi.org/10.46972/2076-1546.2019.16.02.
Full textBansal, Nikhil, Wai-Keong Mok, Kishor Bharti, Dax Enshan Koh, and Tobias Haug. "Pseudorandom Density Matrices." PRX Quantum 6, no. 2 (2025). https://doi.org/10.1103/prxquantum.6.020322.
Full textLeermakers, Daan, and Boris Škorić. "Two-way unclonable encryption with a vulnerable sender." International Journal of Quantum Information 20, no. 02 (2022). http://dx.doi.org/10.1142/s0219749921500374.
Full textElechi, Promise, Solomon Malcolm Ekolama, Ela Okowa, and Shadrack Kukuchuku. "A review of emerging technologies in wireless communication systems." Innovation and Emerging Technologies 12 (January 2025). https://doi.org/10.1142/s2737599425500057.
Full textP., S. Aithal, and Aithal Shubhrajyotsna. "Analysis of Interdependency of ICCT Underlying Technologies and Related New Research Opportunities with Special Emphasis on Cyber Security and Forensic Science." October 11, 2021. https://doi.org/10.5281/zenodo.5560247.
Full text