搜索结果: 1-14 共查到“军事学 quantum cryptography”相关记录14条 . 查询时间(0.085 秒)
Information Conservational Security with “Black Hole” Keypad Compression and Scalable One-Time Pad — A Quantum Intelligence Approach to Pre- and Post-Quantum Cryptography
Pre- and Post-Quantum Cryptography Scalable One-Time Pad (S-OTP) Information Conservational Security (ICS)
font style='font-size:12px;'>
2019/8/14
Whereas it is widely deemed impossible to overcome the optimality of the one-time pad (OTP) cipher in pre- and post-quantum cryptography, this work shows that the optimality of information theoretic s...
On inverse protocols of Post Quantum Cryptography based on pairs of noncommutative multivariate platforms used in tandem
Multivariate Cryptography Noncommutative Cryptography stable transformation groups and semigroups
font style='font-size:12px;'>
2019/8/6
Non-commutative cryptography studies cryptographic primitives and systems which are based on algebraic structures like groups, semigroups and noncommutative rings. We con-tinue to investigate inverse ...
General Linear Group Action on Tensors: A Candidate for Post-Quantum Cryptography
Group actions isomorphism problems signature schemes
font style='font-size:12px;'>
2019/6/12
Starting from the one-way group action framework of Brassard and Yung (Crypto '90), we revisit building cryptography based on group actions. Several previous candidates for one-way group actions no lo...
NIST Post-Quantum Cryptography- A Hardware Evaluation Study
Post-Quantum Cryptography Hardware Implementation
font style='font-size:12px;'>
2019/1/26
Experts forecast that quantum computers can break classical cryptographic algorithms. Scientists are developing post quantum cryptographic (PQC) algorithms, that are invulnerable to quantum computer a...
A publicly verifiable quantum signature scheme based on asymmetric quantum cryptography
Undeniable quantum signature scheme Impersonation attack Quantum asymmetric cryptography
font style='font-size:12px;'>
2019/1/16
In 2018, Shi et al. 's showed that Kaushik et al.'s quantum signature scheme is defective. It suffers from the forgery attack. They further proposed an improvement, trying to avoid the attack. However...
Post-quantum cryptography---dealing with the fallout of physics success
public-key cryptography post-quantum cryptography
font style='font-size:12px;'>
2017/4/17
Post-quantum cryptography is cryptography under the assumption that the attacker has a large quantum computer; post-quantum cryptosystems strive to remain secure even in this scenario. This relatively...
Efficient Finite field multiplication for isogeny based post quantum cryptography
public-key cryptography post quantum cryptography
font style='font-size:12px;'>
2016/12/7
Isogeny based post-quantum cryptography is one of the most recent addition to the family of quantum resistant cryptosystems. In this paper, we propose an efficient modular multiplication algorithm for...
Ring-LWE Ciphertext Compression and Error Correction: Tools for Lightweight Post-Quantum Cryptography
Practical Post-Quantum Cryptography Lattice Cryptography Ring-LWE
font style='font-size:12px;'>
2016/12/7
Some lattice-based public key cryptosystems allow one to transform ciphertext from one lattice or ring representation to another efficiently and without knowledge of public and private keys. In this w...
Quantum Cryptography Beyond Quantum Key Distribution
Quantum cryptography conjugate coding quantum money
font style='font-size:12px;'>
2016/1/26
Quantum cryptography is the art and science of exploiting quantum mechanical effects in
order to perform cryptographic tasks. While the most well-known example of this discipline is
quantum key dist...
Comment on Quantum Cryptography---Which is More Important, Signal Security, Information Security or Communication Reliability
Signal security information security communication reliability
font style='font-size:12px;'>
2016/1/26
Signal security aims to prevent the adversary from copying communication
signals—so it is with quantum cryptography. Information security focuses on
preventing the adversary from knowing plaintext o...
A Note on Quantum Security for Post-Quantum Cryptography
foundations quantum attacks
font style='font-size:12px;'>
2016/1/7
Shor’s quantum factoring algorithm and a few other efficient quantum algorithms break many classical
crypto-systems. In response, people proposed post-quantum cryptography based on computational
pro...
Precomputation Methods for Faster and Greener Post-Quantum Cryptography on Emerging Embedded Platforms
Precomputation Post-Quantum Signatures Hash-based Signatures
font style='font-size:12px;'>
2015/12/31
Precomputation techniques are useful to improve realtime
performance of complex algorithms at the expense of extra
memory, and extra preparatory computations. This practice is neglected
especially ...
Position-Based Quantum Cryptography
foundations Position based cryptography
font style='font-size:12px;'>
2010/7/13
In this work, we initiate the study of position-based cryptography in the quantum setting. The aim of position-based cryptography is to use the geographical position of a party as its only credential....
Why Quantum Cryptography?
Quantum Cryptography QKE Quantum Key Exchange
font style='font-size:12px;'>
2009/3/27
Quantum Key Exchange (QKE, also known as Quantum Key Distribution or QKD) al-
lows communicating parties to securely establish cryptographic keys. It is a well-established
fact that all QKE protocol...