Quantum key distribution (QKD) protocols: A survey
AI Nurhadi, NR Syambas - 2018 4th International Conference …, 2018 - ieeexplore.ieee.org
The security strength of key distribution of most conventional cryptography is relied on
mathematical complexity and the irrational time needed to break the algorithm. But it will be …
mathematical complexity and the irrational time needed to break the algorithm. But it will be …
One-time passcodes with asymmetric keys
MS Fiske - US Patent 9,235,697, 2016 - Google Patents
Int. Cl. Protecting the security of an entity by using passcodes is G06F2L/00(2013.01)
disclosed. A user's passcode device generates a passcode. In H04L 29/06(2006.01) an …
disclosed. A user's passcode device generates a passcode. In H04L 29/06(2006.01) an …
Analysis of the Security of BB84 by Model Checking
Quantum Cryptography or Quantum key distribution (QKD) is a technique that allows the
secure distribution of a bit string, used as key in cryptographic protocols. When it was noted …
secure distribution of a bit string, used as key in cryptographic protocols. When it was noted …
[PDF][PDF] Improving TLS security by quantum cryptography
ABSTRACT Quantum Cryptography or Quantum Key Distribution (QKD) solves the key
distribution problem by allowing the exchange of a cryptographic key between two remote …
distribution problem by allowing the exchange of a cryptographic key between two remote …
[PDF][PDF] Integration of quantum key distribution in the TLS protocol
Summary Quantum Key Distribution (QKD) or quantum cryptography has been developed
within the last decade; it is proved that QKD is secure against computer attacks and it is …
within the last decade; it is proved that QKD is secure against computer attacks and it is …
Quantum key distribution over free space optic (FSO) channel using higher order Gaussian beam spatial modes
Quantum key distribution (QKD) has emerged as a secure solution of secret key distribution
utilizing the well established theories of modern physics. Since its introduction in 1984 …
utilizing the well established theories of modern physics. Since its introduction in 1984 …
[PDF][PDF] Verification of quantum cryptography protocols by model checking
Unlike classical cryptography which is based on mathematical functions, Quantum
Cryptography or Quantum Key Distribution (QKD) exploits the laws of quantum physics to …
Cryptography or Quantum Key Distribution (QKD) exploits the laws of quantum physics to …
Quantum key distribution in practice: The state of art
Since it was noted that quantum computers could break public key cryptosystems based on
number theory, extensive studies have been undertaken on Quantum Key Distribution …
number theory, extensive studies have been undertaken on Quantum Key Distribution …
Systems and methods for single chip quantum random number generation
M Vakili - US Patent 10,802,800, 2020 - Google Patents
Abstract Systems, apparatuses, methods, and computer program products are disclosed for
quantum random number generation (QRNG). An example method includes generating, by …
quantum random number generation (QRNG). An example method includes generating, by …
Systems and methods for time-bin quantum session authentication
M Vakili - US Patent 10,855,453, 2020 - Google Patents
Abstract Systems, apparatuses, methods, and computer program products are disclosed for
session authentication. An example method includes determining, by decoding circuitry, a …
session authentication. An example method includes determining, by decoding circuitry, a …