Sok: An evaluation of quantum authentication through systematic literature review

R Majumdar, S Das - Proceedings of the Workshop on Usable …, 2021 - papers.ssrn.com
Quantum computers are considered a blessing to the dynamic technological world that
promises to solve complex problems much faster than their known classical counterparts …

A modified key sifting scheme with artificial neural network based key reconciliation analysis in quantum cryptography

C Biswas, MM Haque, UD Gupta - IEEE Access, 2022 - ieeexplore.ieee.org
Quantum Cryptography emerged from the limitations of classical cryptography. It will play a
vital role in information security after the availability of expected powerful quantum …

One time pad generation using quantum superposition states

G Upadhyay, MJ Nene - 2016 IEEE International Conference …, 2016 - ieeexplore.ieee.org
Modern cryptography offers three goals of Confidentiality, Integrity and Availability, known as
CIA triad. Confidentiality of any message or communication is secrecy of its content. All the …

Exploring the vulnerability of R-LWE encryption to fault attacks

F Valencia, T Oder, T Güneysu… - Proceedings of the Fifth …, 2018 - dl.acm.org
The future advent of quantum computer pushes for the design and implementation of public-
key cryptosystems capable of resisting quantum attacks. Lattice-based cryptography …

A survey on the impacts of quantum computers on information security

M Njorbuenwu, B Swar… - 2019 2nd International …, 2019 - ieeexplore.ieee.org
Quantum computers differ from traditional computers because unlike traditional computers
that use and process information in bits (0 or 1), the unit of information in quantum …

Lattice-based cryptography: From reconfigurable hardware to ASIC

T Oder, T Güneysu, F Valencia, A Khalid… - 2016 International …, 2016 - ieeexplore.ieee.org
As progress in technology is predicted to make quantum computers available in the next few
decades, it is imperative to design public-key cryptosystems capable of resisting attacks that …

Integration of a quantum scheme for key distribution and authentication within EAP-TLS protocol

A Ghilen, M Azizi - International Journal of Information and …, 2019 - inderscienceonline.com
The extensive deployment of wireless networks has led to a significant progress in security
approaches that aim to protect confidentiality. The current method for exchanging a secret …

Incorporation and model checking of a quantum authentication and key distribution scheme in EAP-TLS

A Ghilen, H Belmabrouk, M Azizi - Proceedings of the Mediterranean …, 2016 - Springer
The prevalent use of wireless networks has led to noteworthy development in security
techniques that aim to protect information. The existing standard for exchanging a secret key …

Applications of Quantum Key Distribution to security protocols

OL Terranova - 2021 - webthesis.biblio.polito.it
Every year, researches and achievements on quantum computing are making more feasible
a future where quantum networks and computers will be an important part of any informative …

[PDF][PDF] Modified Novel Quantum Key Exchange using BB84 Algorithm

NV Chetty, B Abhijith, G Nihar… - International Journal of …, 2013 - Citeseer
With the increasing number of eavesdroppers on communication channels, securing the
reliability of digital communication has become a herculean task. For any communication …