Articoli di riviste sul tema "Quantum cryptographic protocols"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "Quantum cryptographic protocols".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.
Goyal, Rohit. "Quantum Cryptography: Secure Communication Beyond Classical Limits". Journal of Quantum Science and Technology 1, n. 1 (31 marzo 2024): 1–5. http://dx.doi.org/10.36676/jqst.v1.i1.01.
Testo completoChandre, Pankaj R., Bhagyashree D. Shendkar, Sayalee Deshmukh, Sameer Kakade e Suvarna Potdukhe. "Machine Learning-Enhanced Advancements in Quantum Cryptography: A Comprehensive Review and Future Prospects". International Journal on Recent and Innovation Trends in Computing and Communication 11, n. 11s (10 ottobre 2023): 642–55. http://dx.doi.org/10.17762/ijritcc.v11i11s.8300.
Testo completoZhou, Zishuai, Qisheng Guang, Chaohui Gao, Dong Jiang e Lijun Chen. "Measurement-Device-Independent Two-Party Cryptography with Error Estimation". Sensors 20, n. 21 (7 novembre 2020): 6351. http://dx.doi.org/10.3390/s20216351.
Testo completoBukashkin, S. А., e М. А. Cherepniov. "Quantum Computer and Post-Quantum Cryptography". Programmnaya Ingeneria 12, n. 4 (14 luglio 2021): 171–78. http://dx.doi.org/10.17587/prin.12.171-178.
Testo completoKushwah, Kirti, Akanksha, Aniket Varshney, Arpit Jain e Astitva Singh. "Simulating the BB84 Protocol". International Journal for Research in Applied Science and Engineering Technology 11, n. 5 (31 maggio 2023): 5916–20. http://dx.doi.org/10.22214/ijraset.2023.52840.
Testo completoOkhrimenko, Tetiana, Serhii Dorozhynskyi e Bohdan Horbakha. "ANALYSIS OF QUANTUM SECURE DIRECT COMMUNICATION PROTOCOLS". Computer systems and information technologies, n. 1 (30 marzo 2023): 62–67. http://dx.doi.org/10.31891/csit-2023-1-8.
Testo completoMüller, Johannes, e Jan Oupický. "Post-quantum XML and SAML Single Sign-On". Proceedings on Privacy Enhancing Technologies 2024, n. 4 (ottobre 2024): 525–43. http://dx.doi.org/10.56553/popets-2024-0128.
Testo completoSong, Yaqi, e Li Yang. "Practical Quantum Bit Commitment Protocol Based on Quantum Oblivious Transfer". Applied Sciences 8, n. 10 (19 ottobre 2018): 1990. http://dx.doi.org/10.3390/app8101990.
Testo completoHallgren, Sean, Adam Smith e Fang Song. "Classical cryptographic protocols in a quantum world". International Journal of Quantum Information 13, n. 04 (giugno 2015): 1550028. http://dx.doi.org/10.1142/s0219749915500288.
Testo completoTeja, Penumantra Satya Sai, Mounika Lakshmi P e Vinay Kumar K. "A Secure Communication through Quantum Key Distribution Protocols". International Research Journal of Electronics and Computer Engineering 4, n. 3 (30 settembre 2018): 14. http://dx.doi.org/10.24178/irjece.2018.4.3.14.
Testo completoOstrianska, Ye V., S. О. Kandiy, I. D. Gorbenko e M. V. Yesina. "Classification and analysis of vulnerabilities of modern information systems from classical and quantum attacks". Radiotekhnika, n. 211 (30 dicembre 2022): 7–21. http://dx.doi.org/10.30837/rt.2022.4.211.01.
Testo completoRani, Rashmi. "Quantum Cryptography: Fundamentals and Advanced Techniques". International Journal for Research in Applied Science and Engineering Technology 12, n. 5 (31 maggio 2024): 5747–51. http://dx.doi.org/10.22214/ijraset.2024.62943.
Testo completoAllerstorfer, Rene, Harry Buhrman, Alex May, Florian Speelman e Philip Verduyn Lunel. "Relating non-local quantum computation to information theoretic cryptography". Quantum 8 (27 giugno 2024): 1387. http://dx.doi.org/10.22331/q-2024-06-27-1387.
Testo completoWang, Tianyi, e Zetong Xu. "The application of group theory behind modern cryptography". Theoretical and Natural Science 13, n. 1 (30 novembre 2023): 195–201. http://dx.doi.org/10.54254/2753-8818/13/20240844.
Testo completoYadav, Sonam. "An Extensive Study on Lattice-Based Cryptography and its Applications for RLWE-Based Problems". Universal Research Reports 10, n. 3 (2023): 104–10. http://dx.doi.org/10.36676/urr.2023-v10i3-014.
Testo completoWang, Ming-Ming, Jun-Li Liu e Lin-Ming Gong. "Semiquantum secure direct communication with authentication based on single-photons". International Journal of Quantum Information 17, n. 03 (aprile 2019): 1950024. http://dx.doi.org/10.1142/s0219749919500242.
Testo completoNajeeb, Mahira, Dr Ammar Masood e Dr Adnan Fazil. "Quantum Key Distribution for Secure Communications". Vol 4 Issue 4 4, n. 4 (30 ottobre 2022): 173–83. http://dx.doi.org/10.33411/ijist/2022040406.
Testo completoKhawasik, Manal, Wagdy Gomaa El-Sayed, M. Z. Rashad e Ahmed Younes. "A Secured Half-Duplex Bidirectional Quantum Key Distribution Protocol against Collective Attacks". Symmetry 14, n. 12 (23 novembre 2022): 2481. http://dx.doi.org/10.3390/sym14122481.
Testo completoVictor, Melvin, D. David Winster Praveenraj, Sasirekha R, Ahmed Alkhayyat e Abdullayeva Shakhzoda. "Cryptography: Advances in Secure Communication and Data Protection". E3S Web of Conferences 399 (2023): 07010. http://dx.doi.org/10.1051/e3sconf/202339907010.
Testo completoCherckesova, Larissa V., Olga A. Safaryan, Alexey N. Beskopylny e Elena Revyakina. "Development of Quantum Protocol Modification CSLOE–2022, Increasing the Cryptographic Strength of Classical Quantum Protocol BB84". Electronics 11, n. 23 (29 novembre 2022): 3954. http://dx.doi.org/10.3390/electronics11233954.
Testo completoYadav, Sonam. "Work in Lattice-Based Cryptography: Key Exchange Protocols under RLWE-Based Problems and Ding Reconciliation Technique". International Journal for Research Publication and Seminars 14, n. 4 (2023): 178–84. http://dx.doi.org/10.36676/jrps.2023-v14i4-024.
Testo completoSedat Sonko, Kenneth Ifeanyi Ibekwe, Valentine Ikenna Ilojianya, Emmanuel Augustine Etukudoh e Adefunke Fabuyide. "QUANTUM CRYPTOGRAPHY AND U.S. DIGITAL SECURITY: A COMPREHENSIVE REVIEW: INVESTIGATING THE POTENTIAL OF QUANTUM TECHNOLOGIES IN CREATING UNBREAKABLE ENCRYPTION AND THEIR FUTURE IN NATIONAL SECURITY". Computer Science & IT Research Journal 5, n. 2 (18 febbraio 2024): 390–414. http://dx.doi.org/10.51594/csitrj.v5i2.790.
Testo completoPham, Hai, Rainer Steinwandt e Adriana Suárez Corona. "Integrating Classical Preprocessing into an Optical Encryption Scheme". Entropy 21, n. 9 (7 settembre 2019): 872. http://dx.doi.org/10.3390/e21090872.
Testo completoKumar,, Varun. "Challenges and Future Trends of Cryptography in Internet of Things". INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, n. 04 (10 aprile 2024): 1–5. http://dx.doi.org/10.55041/ijsrem30505.
Testo completoAnnu. "Algebraic Structures and Their Applications in Modern Cryptography". Innovative Research Thoughts 10, n. 3 (25 luglio 2024): 52–59. http://dx.doi.org/10.36676/irt.v10.i3.1433.
Testo completoLongo, Riccardo, Carla Mascia, Alessio Meneghetti, Giordano Santilli e Giovanni Tognolini. "Adaptable Cryptographic Primitives in Blockchains via Smart Contracts". Cryptography 6, n. 3 (29 giugno 2022): 32. http://dx.doi.org/10.3390/cryptography6030032.
Testo completoChen, K., e H. K. Lo. "Multi-partite quantum cryptographic protocols with noisy GHZ states". Quantum Information and Computation 7, n. 8 (novembre 2007): 689–715. http://dx.doi.org/10.26421/qic7.8-1.
Testo completoSubbarao, Kondapalli V. V., e Manas Kumar Yogi. "An Investigative Study on Variants of Post-Quantum RSA". Journal of Cryptography and Network Security, Design and Codes 1, n. 1 (9 aprile 2024): 19–31. http://dx.doi.org/10.46610/jocnsdc.2024.v01i01.003.
Testo completoChen, Geng, Yuqi Wang, Liya Jian, Yi Zhou, Shiming Liu, Jiawei Luo e Kun Yang. "Quantum identity authentication protocol based on flexible quantum homomorphic encryption with qubit rotation". Journal of Applied Physics 133, n. 6 (14 febbraio 2023): 064402. http://dx.doi.org/10.1063/5.0135896.
Testo completoSabani, Maria E., Ilias K. Savvas e Georgia Garani. "Learning with Errors: A Lattice-Based Keystone of Post-Quantum Cryptography". Signals 5, n. 2 (13 aprile 2024): 216–43. http://dx.doi.org/10.3390/signals5020012.
Testo completoChen, Na, Dong Xiao Quan, Chang Xing Pei e Hong Yang. "Arbitrated Quantum Signature Scheme with Message Bits Intertwined". Applied Mechanics and Materials 481 (dicembre 2013): 7–13. http://dx.doi.org/10.4028/www.scientific.net/amm.481.7.
Testo completoR, Mr Suresh. "A Survey on Quantum-Cryptographic Image Encryption for Secure Storage". INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, n. 04 (3 aprile 2024): 1–5. http://dx.doi.org/10.55041/ijsrem29461.
Testo completoFeltovic, Milan. "FROM THEORY TO PRACTICE: THE ROLE OF CRYPTOGRAPHY IN SECURING BLOCKCHAIN NETWORKS". MEST Journal 12, n. 2 (15 luglio 2024): 93–102. http://dx.doi.org/10.12709/mest.12.12.02.12.
Testo completoLo, H.-K., e T.-M. Ko. "Some attacks on quantum-based cryptographic protocols". Quantum Information and Computation 5, n. 1 (gennaio 2005): 40–47. http://dx.doi.org/10.26421/qic5.1-4.
Testo completoKuhn, D. R. "A quantum cryptographic protocol with detection of compromised server". Quantum Information and Computation 5, n. 7 (novembre 2005): 551–60. http://dx.doi.org/10.26421/qic5.7-3.
Testo completoOpiłka, Filip, Marcin Niemiec, Maria Gagliardi e Michail Alexandros Kourtis. "Performance Analysis of Post-Quantum Cryptography Algorithms for Digital Signature". Applied Sciences 14, n. 12 (7 giugno 2024): 4994. http://dx.doi.org/10.3390/app14124994.
Testo completoShukla, Chitra, Anindita Banerjee, Anirban Pathak e R. Srikanth. "Secure quantum communication with orthogonal states". International Journal of Quantum Information 14, n. 06 (settembre 2016): 1640021. http://dx.doi.org/10.1142/s0219749916400219.
Testo completoSabani, Maria E., Ilias K. Savvas, Dimitrios Poulakis, Georgia Garani e Georgios C. Makris. "Evaluation and Comparison of Lattice-Based Cryptosystems for a Secure Quantum Computing Era". Electronics 12, n. 12 (12 giugno 2023): 2643. http://dx.doi.org/10.3390/electronics12122643.
Testo completoNeupane, Kashi. "Two-party key establishment: From passive to active security without introducing new assumptions". gcc 4, n. 1 (maggio 2012): 1–17. http://dx.doi.org/10.1515/gcc-2012-0005.
Testo completoPaul, Surjit, Sanjay Kumar e Rajiv Ranjan Suman. "A Quantum Secure Entity Authentication Protocol Design for Network Security". International Journal of Information Security and Privacy 13, n. 4 (ottobre 2019): 1–11. http://dx.doi.org/10.4018/ijisp.2019100101.
Testo completoAlborch, Ferran, Ramiro Martínez e Paz Morillo. "R-LWE-Based Distributed Key Generation and Threshold Decryption". Mathematics 10, n. 5 (25 febbraio 2022): 728. http://dx.doi.org/10.3390/math10050728.
Testo completoLiu, Bin, Zhifeng Gao, Di Xiao, Wei Huang, Zhiqing Zhang e Bingjie Xu. "Quantum Identity Authentication in the Counterfactual Quantum Key Distribution Protocol". Entropy 21, n. 5 (23 maggio 2019): 518. http://dx.doi.org/10.3390/e21050518.
Testo completoGrosshans, F., N. J. Cerf, J. Wenger, R. Tualle-Brouri e Ph Grangier. "Virtual entanglement and reconciliation protocols for quantum cryptography with continuous variables". Quantum Information and Computation 3, special (ottobre 2003): 535–52. http://dx.doi.org/10.26421/qic3.s-6.
Testo completoHernández-Álvarez, Luis, Juan José Bullón Pérez, Farrah Kristel Batista e Araceli Queiruga-Dios. "Security Threats and Cryptographic Protocols for Medical Wearables". Mathematics 10, n. 6 (10 marzo 2022): 886. http://dx.doi.org/10.3390/math10060886.
Testo completoDolgochub, Evgeny A., e Alexey N. Polikanin. "ANALYSIS OF QUANTUM BB84 AND B92 ENCRYPTION ALGORITHMS". Interexpo GEO-Siberia 6, n. 1 (8 luglio 2020): 125–30. http://dx.doi.org/10.33764/2618-981x-2020-6-1-125-130.
Testo completoSaxena, Ashwin, Kishore Thapliyal e Anirban Pathak. "Continuous variable controlled quantum dialogue and secure multiparty quantum computation". International Journal of Quantum Information 18, n. 04 (giugno 2020): 2050009. http://dx.doi.org/10.1142/s0219749920500094.
Testo completoGreen, Adrien, Jeremy Lawrence, George Siopsis, Nicholas A. Peters e Ali Passian. "Quantum Key Distribution for Critical Infrastructures: Towards Cyber-Physical Security for Hydropower and Dams". Sensors 23, n. 24 (14 dicembre 2023): 9818. http://dx.doi.org/10.3390/s23249818.
Testo completoPastorello, Davide. "Open-loop quantum control as a resource for secure communications". International Journal of Quantum Information 14, n. 02 (marzo 2016): 1650010. http://dx.doi.org/10.1142/s0219749916500106.
Testo completoKurysheva, A. A. "OVERVIEW OF CANDIDATES FOR QUANTUM-RESISTANT CIPHERS". Vestnik komp'iuternykh i informatsionnykh tekhnologii, n. 226 (aprile 2023): 49–60. http://dx.doi.org/10.14489/vkit.2023.04.pp.049-060.
Testo completoMihalkovich, Aleksejus, Eligijus Sakalauskas e Kestutis Luksys. "Key Exchange Protocol Defined over a Non-Commuting Group Based on an NP-Complete Decisional Problem". Symmetry 12, n. 9 (20 agosto 2020): 1389. http://dx.doi.org/10.3390/sym12091389.
Testo completo