Artigos de revistas sobre o tema "Quantum cryptographic protocols"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 50 melhores artigos de revistas para estudos sobre o assunto "Quantum cryptographic protocols".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja os artigos de revistas das mais diversas áreas científicas e compile uma bibliografia correta.
Goyal, Rohit. "Quantum Cryptography: Secure Communication Beyond Classical Limits". Journal of Quantum Science and Technology 1, n.º 1 (31 de março de 2024): 1–5. http://dx.doi.org/10.36676/jqst.v1.i1.01.
Texto completo da fonteChandre, Pankaj R., Bhagyashree D. Shendkar, Sayalee Deshmukh, Sameer Kakade e Suvarna Potdukhe. "Machine Learning-Enhanced Advancements in Quantum Cryptography: A Comprehensive Review and Future Prospects". International Journal on Recent and Innovation Trends in Computing and Communication 11, n.º 11s (10 de outubro de 2023): 642–55. http://dx.doi.org/10.17762/ijritcc.v11i11s.8300.
Texto completo da fonteZhou, Zishuai, Qisheng Guang, Chaohui Gao, Dong Jiang e Lijun Chen. "Measurement-Device-Independent Two-Party Cryptography with Error Estimation". Sensors 20, n.º 21 (7 de novembro de 2020): 6351. http://dx.doi.org/10.3390/s20216351.
Texto completo da fonteBukashkin, S. А., e М. А. Cherepniov. "Quantum Computer and Post-Quantum Cryptography". Programmnaya Ingeneria 12, n.º 4 (14 de julho de 2021): 171–78. http://dx.doi.org/10.17587/prin.12.171-178.
Texto completo da fonteKushwah, Kirti, Akanksha, Aniket Varshney, Arpit Jain e Astitva Singh. "Simulating the BB84 Protocol". International Journal for Research in Applied Science and Engineering Technology 11, n.º 5 (31 de maio de 2023): 5916–20. http://dx.doi.org/10.22214/ijraset.2023.52840.
Texto completo da fonteOkhrimenko, Tetiana, Serhii Dorozhynskyi e Bohdan Horbakha. "ANALYSIS OF QUANTUM SECURE DIRECT COMMUNICATION PROTOCOLS". Computer systems and information technologies, n.º 1 (30 de março de 2023): 62–67. http://dx.doi.org/10.31891/csit-2023-1-8.
Texto completo da fonteMüller, Johannes, e Jan Oupický. "Post-quantum XML and SAML Single Sign-On". Proceedings on Privacy Enhancing Technologies 2024, n.º 4 (outubro de 2024): 525–43. http://dx.doi.org/10.56553/popets-2024-0128.
Texto completo da fonteSong, Yaqi, e Li Yang. "Practical Quantum Bit Commitment Protocol Based on Quantum Oblivious Transfer". Applied Sciences 8, n.º 10 (19 de outubro de 2018): 1990. http://dx.doi.org/10.3390/app8101990.
Texto completo da fonteHallgren, Sean, Adam Smith e Fang Song. "Classical cryptographic protocols in a quantum world". International Journal of Quantum Information 13, n.º 04 (junho de 2015): 1550028. http://dx.doi.org/10.1142/s0219749915500288.
Texto completo da fonteTeja, Penumantra Satya Sai, Mounika Lakshmi P e Vinay Kumar K. "A Secure Communication through Quantum Key Distribution Protocols". International Research Journal of Electronics and Computer Engineering 4, n.º 3 (30 de setembro de 2018): 14. http://dx.doi.org/10.24178/irjece.2018.4.3.14.
Texto completo da fonteOstrianska, Ye V., S. О. Kandiy, I. D. Gorbenko e M. V. Yesina. "Classification and analysis of vulnerabilities of modern information systems from classical and quantum attacks". Radiotekhnika, n.º 211 (30 de dezembro de 2022): 7–21. http://dx.doi.org/10.30837/rt.2022.4.211.01.
Texto completo da fonteRani, Rashmi. "Quantum Cryptography: Fundamentals and Advanced Techniques". International Journal for Research in Applied Science and Engineering Technology 12, n.º 5 (31 de maio de 2024): 5747–51. http://dx.doi.org/10.22214/ijraset.2024.62943.
Texto completo da fonteAllerstorfer, Rene, Harry Buhrman, Alex May, Florian Speelman e Philip Verduyn Lunel. "Relating non-local quantum computation to information theoretic cryptography". Quantum 8 (27 de junho de 2024): 1387. http://dx.doi.org/10.22331/q-2024-06-27-1387.
Texto completo da fonteWang, Tianyi, e Zetong Xu. "The application of group theory behind modern cryptography". Theoretical and Natural Science 13, n.º 1 (30 de novembro de 2023): 195–201. http://dx.doi.org/10.54254/2753-8818/13/20240844.
Texto completo da fonteYadav, Sonam. "An Extensive Study on Lattice-Based Cryptography and its Applications for RLWE-Based Problems". Universal Research Reports 10, n.º 3 (2023): 104–10. http://dx.doi.org/10.36676/urr.2023-v10i3-014.
Texto completo da fonteWang, Ming-Ming, Jun-Li Liu e Lin-Ming Gong. "Semiquantum secure direct communication with authentication based on single-photons". International Journal of Quantum Information 17, n.º 03 (abril de 2019): 1950024. http://dx.doi.org/10.1142/s0219749919500242.
Texto completo da fonteNajeeb, Mahira, Dr Ammar Masood e Dr Adnan Fazil. "Quantum Key Distribution for Secure Communications". Vol 4 Issue 4 4, n.º 4 (30 de outubro de 2022): 173–83. http://dx.doi.org/10.33411/ijist/2022040406.
Texto completo da fonteKhawasik, Manal, Wagdy Gomaa El-Sayed, M. Z. Rashad e Ahmed Younes. "A Secured Half-Duplex Bidirectional Quantum Key Distribution Protocol against Collective Attacks". Symmetry 14, n.º 12 (23 de novembro de 2022): 2481. http://dx.doi.org/10.3390/sym14122481.
Texto completo da fonteVictor, Melvin, D. David Winster Praveenraj, Sasirekha R, Ahmed Alkhayyat e Abdullayeva Shakhzoda. "Cryptography: Advances in Secure Communication and Data Protection". E3S Web of Conferences 399 (2023): 07010. http://dx.doi.org/10.1051/e3sconf/202339907010.
Texto completo da fonteCherckesova, Larissa V., Olga A. Safaryan, Alexey N. Beskopylny e Elena Revyakina. "Development of Quantum Protocol Modification CSLOE–2022, Increasing the Cryptographic Strength of Classical Quantum Protocol BB84". Electronics 11, n.º 23 (29 de novembro de 2022): 3954. http://dx.doi.org/10.3390/electronics11233954.
Texto completo da fonteYadav, Sonam. "Work in Lattice-Based Cryptography: Key Exchange Protocols under RLWE-Based Problems and Ding Reconciliation Technique". International Journal for Research Publication and Seminars 14, n.º 4 (2023): 178–84. http://dx.doi.org/10.36676/jrps.2023-v14i4-024.
Texto completo da fonteSedat Sonko, Kenneth Ifeanyi Ibekwe, Valentine Ikenna Ilojianya, Emmanuel Augustine Etukudoh e Adefunke Fabuyide. "QUANTUM CRYPTOGRAPHY AND U.S. DIGITAL SECURITY: A COMPREHENSIVE REVIEW: INVESTIGATING THE POTENTIAL OF QUANTUM TECHNOLOGIES IN CREATING UNBREAKABLE ENCRYPTION AND THEIR FUTURE IN NATIONAL SECURITY". Computer Science & IT Research Journal 5, n.º 2 (18 de fevereiro de 2024): 390–414. http://dx.doi.org/10.51594/csitrj.v5i2.790.
Texto completo da fontePham, Hai, Rainer Steinwandt e Adriana Suárez Corona. "Integrating Classical Preprocessing into an Optical Encryption Scheme". Entropy 21, n.º 9 (7 de setembro de 2019): 872. http://dx.doi.org/10.3390/e21090872.
Texto completo da fonteKumar,, Varun. "Challenges and Future Trends of Cryptography in Internet of Things". INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, n.º 04 (10 de abril de 2024): 1–5. http://dx.doi.org/10.55041/ijsrem30505.
Texto completo da fonteAnnu. "Algebraic Structures and Their Applications in Modern Cryptography". Innovative Research Thoughts 10, n.º 3 (25 de julho de 2024): 52–59. http://dx.doi.org/10.36676/irt.v10.i3.1433.
Texto completo da fonteLongo, Riccardo, Carla Mascia, Alessio Meneghetti, Giordano Santilli e Giovanni Tognolini. "Adaptable Cryptographic Primitives in Blockchains via Smart Contracts". Cryptography 6, n.º 3 (29 de junho de 2022): 32. http://dx.doi.org/10.3390/cryptography6030032.
Texto completo da fonteChen, K., e H. K. Lo. "Multi-partite quantum cryptographic protocols with noisy GHZ states". Quantum Information and Computation 7, n.º 8 (novembro de 2007): 689–715. http://dx.doi.org/10.26421/qic7.8-1.
Texto completo da fonteSubbarao, Kondapalli V. V., e Manas Kumar Yogi. "An Investigative Study on Variants of Post-Quantum RSA". Journal of Cryptography and Network Security, Design and Codes 1, n.º 1 (9 de abril de 2024): 19–31. http://dx.doi.org/10.46610/jocnsdc.2024.v01i01.003.
Texto completo da fonteChen, Geng, Yuqi Wang, Liya Jian, Yi Zhou, Shiming Liu, Jiawei Luo e Kun Yang. "Quantum identity authentication protocol based on flexible quantum homomorphic encryption with qubit rotation". Journal of Applied Physics 133, n.º 6 (14 de fevereiro de 2023): 064402. http://dx.doi.org/10.1063/5.0135896.
Texto completo da fonteSabani, Maria E., Ilias K. Savvas e Georgia Garani. "Learning with Errors: A Lattice-Based Keystone of Post-Quantum Cryptography". Signals 5, n.º 2 (13 de abril de 2024): 216–43. http://dx.doi.org/10.3390/signals5020012.
Texto completo da fonteChen, Na, Dong Xiao Quan, Chang Xing Pei e Hong Yang. "Arbitrated Quantum Signature Scheme with Message Bits Intertwined". Applied Mechanics and Materials 481 (dezembro de 2013): 7–13. http://dx.doi.org/10.4028/www.scientific.net/amm.481.7.
Texto completo da fonteR, Mr Suresh. "A Survey on Quantum-Cryptographic Image Encryption for Secure Storage". INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, n.º 04 (3 de abril de 2024): 1–5. http://dx.doi.org/10.55041/ijsrem29461.
Texto completo da fonteFeltovic, Milan. "FROM THEORY TO PRACTICE: THE ROLE OF CRYPTOGRAPHY IN SECURING BLOCKCHAIN NETWORKS". MEST Journal 12, n.º 2 (15 de julho de 2024): 93–102. http://dx.doi.org/10.12709/mest.12.12.02.12.
Texto completo da fonteLo, H.-K., e T.-M. Ko. "Some attacks on quantum-based cryptographic protocols". Quantum Information and Computation 5, n.º 1 (janeiro de 2005): 40–47. http://dx.doi.org/10.26421/qic5.1-4.
Texto completo da fonteKuhn, D. R. "A quantum cryptographic protocol with detection of compromised server". Quantum Information and Computation 5, n.º 7 (novembro de 2005): 551–60. http://dx.doi.org/10.26421/qic5.7-3.
Texto completo da fonteOpiłka, Filip, Marcin Niemiec, Maria Gagliardi e Michail Alexandros Kourtis. "Performance Analysis of Post-Quantum Cryptography Algorithms for Digital Signature". Applied Sciences 14, n.º 12 (7 de junho de 2024): 4994. http://dx.doi.org/10.3390/app14124994.
Texto completo da fonteShukla, Chitra, Anindita Banerjee, Anirban Pathak e R. Srikanth. "Secure quantum communication with orthogonal states". International Journal of Quantum Information 14, n.º 06 (setembro de 2016): 1640021. http://dx.doi.org/10.1142/s0219749916400219.
Texto completo da fonteSabani, Maria E., Ilias K. Savvas, Dimitrios Poulakis, Georgia Garani e Georgios C. Makris. "Evaluation and Comparison of Lattice-Based Cryptosystems for a Secure Quantum Computing Era". Electronics 12, n.º 12 (12 de junho de 2023): 2643. http://dx.doi.org/10.3390/electronics12122643.
Texto completo da fonteNeupane, Kashi. "Two-party key establishment: From passive to active security without introducing new assumptions". gcc 4, n.º 1 (maio de 2012): 1–17. http://dx.doi.org/10.1515/gcc-2012-0005.
Texto completo da fontePaul, Surjit, Sanjay Kumar e Rajiv Ranjan Suman. "A Quantum Secure Entity Authentication Protocol Design for Network Security". International Journal of Information Security and Privacy 13, n.º 4 (outubro de 2019): 1–11. http://dx.doi.org/10.4018/ijisp.2019100101.
Texto completo da fonteAlborch, Ferran, Ramiro Martínez e Paz Morillo. "R-LWE-Based Distributed Key Generation and Threshold Decryption". Mathematics 10, n.º 5 (25 de fevereiro de 2022): 728. http://dx.doi.org/10.3390/math10050728.
Texto completo da fonteLiu, Bin, Zhifeng Gao, Di Xiao, Wei Huang, Zhiqing Zhang e Bingjie Xu. "Quantum Identity Authentication in the Counterfactual Quantum Key Distribution Protocol". Entropy 21, n.º 5 (23 de maio de 2019): 518. http://dx.doi.org/10.3390/e21050518.
Texto completo da fonteGrosshans, F., N. J. Cerf, J. Wenger, R. Tualle-Brouri e Ph Grangier. "Virtual entanglement and reconciliation protocols for quantum cryptography with continuous variables". Quantum Information and Computation 3, special (outubro de 2003): 535–52. http://dx.doi.org/10.26421/qic3.s-6.
Texto completo da fonteHernández-Álvarez, Luis, Juan José Bullón Pérez, Farrah Kristel Batista e Araceli Queiruga-Dios. "Security Threats and Cryptographic Protocols for Medical Wearables". Mathematics 10, n.º 6 (10 de março de 2022): 886. http://dx.doi.org/10.3390/math10060886.
Texto completo da fonteDolgochub, Evgeny A., e Alexey N. Polikanin. "ANALYSIS OF QUANTUM BB84 AND B92 ENCRYPTION ALGORITHMS". Interexpo GEO-Siberia 6, n.º 1 (8 de julho de 2020): 125–30. http://dx.doi.org/10.33764/2618-981x-2020-6-1-125-130.
Texto completo da fonteSaxena, Ashwin, Kishore Thapliyal e Anirban Pathak. "Continuous variable controlled quantum dialogue and secure multiparty quantum computation". International Journal of Quantum Information 18, n.º 04 (junho de 2020): 2050009. http://dx.doi.org/10.1142/s0219749920500094.
Texto completo da fonteGreen, Adrien, Jeremy Lawrence, George Siopsis, Nicholas A. Peters e Ali Passian. "Quantum Key Distribution for Critical Infrastructures: Towards Cyber-Physical Security for Hydropower and Dams". Sensors 23, n.º 24 (14 de dezembro de 2023): 9818. http://dx.doi.org/10.3390/s23249818.
Texto completo da fontePastorello, Davide. "Open-loop quantum control as a resource for secure communications". International Journal of Quantum Information 14, n.º 02 (março de 2016): 1650010. http://dx.doi.org/10.1142/s0219749916500106.
Texto completo da fonteKurysheva, A. A. "OVERVIEW OF CANDIDATES FOR QUANTUM-RESISTANT CIPHERS". Vestnik komp'iuternykh i informatsionnykh tekhnologii, n.º 226 (abril de 2023): 49–60. http://dx.doi.org/10.14489/vkit.2023.04.pp.049-060.
Texto completo da fonteMihalkovich, Aleksejus, Eligijus Sakalauskas e Kestutis Luksys. "Key Exchange Protocol Defined over a Non-Commuting Group Based on an NP-Complete Decisional Problem". Symmetry 12, n.º 9 (20 de agosto de 2020): 1389. http://dx.doi.org/10.3390/sym12091389.
Texto completo da fonte