ARTICLES

Filter  
Active filters 0
Remove
  

Refine your searches by:

Collections
Physical
Technology
Education
Mathematics
Pure sciences
Chemistry
Computing
Research
Computing
Biology
all records (64)

Languages
English
Portuguese
Spanish
German

Countries
Indonesia
USA
Ukraine
Brazil
Switzerland
India
Czech Republic
Vietnam
Italy
Canada
all records (63)

Years
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
all records (24)

Filter  
 
2.455  Articles
1 of 247 pages  |  10  records  |  more records»
In this paper, we briefly review the basic concepts of quantum computation,  entanglement,  quantum cryptography and quantum fourier  transform.   Quantum algorithms like Deutsch Jozsa, Shor’s   factorization and Grover’... see more

Recently, many papers have appeared where it is proposed to use the quantum mechanical properties of interatomic interaction to solve cryptographic problems. In fact, we are talking about transferring the solution of the problem of the stability of inform... see more

The model of quantum computation has advanced very quickly in the last years. This model brings with it an efficient algorithm for factoring, namely the Shor algorithm. This means that the public key infrastructure will soon be obsolete. In this paper we ... see more

We propose a schematic setup of quantum key distribution (QKD) with an improved secret key rate based on high-dimensional quantum states. Two degrees-of-freedom of a single photon, orbital angular momentum modes, and multi-path modes, are used to encode s... see more

With the practical implementation of continuous-variable quantum cryptographic protocols, security problems resulting from measurement-device loopholes are being given increasing attention. At present, research on measurement-device independency analysis ... see more

Oblivious transfer (OT) and bit commitment (BC) are two-party cryptographic protocols which play crucial roles in the construction of various cryptographic protocols. We propose three practical quantum cryptographic protocols in this paper. We first const... see more

Authentication has been adopted in many areas, but most of these authentication schemes are built using traditional cryptographic primitives. It is widely believed that such primitives are not resistant to quantum algorithms. To deal with those quantum at... see more

Context. The development and aplication of cryptographic algorithms based on many-valued logic functions makes it importantto research their cryptographic properties and develop effective criteria for the cryptographic quality of their components. Thedeve... see more

1 of 247 pages  |  10  records  |  more records»