Quantum key distribution (QKD) protocols: A survey

AI Nurhadi, NR Syambas - 2018 4th International Conference …, 2018 - ieeexplore.ieee.org
The security strength of key distribution of most conventional cryptography is relied on
mathematical complexity and the irrational time needed to break the algorithm. But it will be …

One-time passcodes with asymmetric keys

MS Fiske - US Patent 9,235,697, 2016 - Google Patents
Int. Cl. Protecting the security of an entity by using passcodes is G06F2L/00(2013.01)
disclosed. A user's passcode device generates a passcode. In H04L 29/06(2006.01) an …

Analysis of the Security of BB84 by Model Checking

M Elboukhari, M Azizi, A Azizi - arXiv preprint arXiv:1005.4504, 2010 - arxiv.org
Quantum Cryptography or Quantum key distribution (QKD) is a technique that allows the
secure distribution of a bit string, used as key in cryptographic protocols. When it was noted …

[PDF][PDF] Improving TLS security by quantum cryptography

M Elboukhari, M Azizi, A Azizi - … Journal of Network Security & Its …, 2010 - academia.edu
ABSTRACT Quantum Cryptography or Quantum Key Distribution (QKD) solves the key
distribution problem by allowing the exchange of a cryptographic key between two remote …

[PDF][PDF] Integration of quantum key distribution in the TLS protocol

M Elboukhari, M Azizi, A Azizi - IJCSNS, 2009 - researchgate.net
Summary Quantum Key Distribution (QKD) or quantum cryptography has been developed
within the last decade; it is proved that QKD is secure against computer attacks and it is …

Quantum key distribution over free space optic (FSO) channel using higher order Gaussian beam spatial modes

M Kamran, DR KHAN, T Malik… - Turkish Journal of …, 2020 - journals.tubitak.gov.tr
Quantum key distribution (QKD) has emerged as a secure solution of secret key distribution
utilizing the well established theories of modern physics. Since its introduction in 1984 …

[PDF][PDF] Verification of quantum cryptography protocols by model checking

M Elboukhari, M Azizi, A Azizi - Int. J. Network Security & Appl, 2010 - academia.edu
Unlike classical cryptography which is based on mathematical functions, Quantum
Cryptography or Quantum Key Distribution (QKD) exploits the laws of quantum physics to …

Quantum key distribution in practice: The state of art

M Elboukhari, A Azizi, M Azizi - 2010 5th International …, 2010 - ieeexplore.ieee.org
Since it was noted that quantum computers could break public key cryptosystems based on
number theory, extensive studies have been undertaken on Quantum Key Distribution …

Systems and methods for single chip quantum random number generation

M Vakili - US Patent 10,802,800, 2020 - Google Patents
Abstract Systems, apparatuses, methods, and computer program products are disclosed for
quantum random number generation (QRNG). An example method includes generating, by …

Systems and methods for time-bin quantum session authentication

M Vakili - US Patent 10,855,453, 2020 - Google Patents
Abstract Systems, apparatuses, methods, and computer program products are disclosed for
session authentication. An example method includes determining, by decoding circuitry, a …