Sok: An evaluation of quantum authentication through systematic literature review
R Majumdar, S Das - Proceedings of the Workshop on Usable …, 2021 - papers.ssrn.com
Quantum computers are considered a blessing to the dynamic technological world that
promises to solve complex problems much faster than their known classical counterparts …
promises to solve complex problems much faster than their known classical counterparts …
A modified key sifting scheme with artificial neural network based key reconciliation analysis in quantum cryptography
C Biswas, MM Haque, UD Gupta - IEEE Access, 2022 - ieeexplore.ieee.org
Quantum Cryptography emerged from the limitations of classical cryptography. It will play a
vital role in information security after the availability of expected powerful quantum …
vital role in information security after the availability of expected powerful quantum …
One time pad generation using quantum superposition states
G Upadhyay, MJ Nene - 2016 IEEE International Conference …, 2016 - ieeexplore.ieee.org
Modern cryptography offers three goals of Confidentiality, Integrity and Availability, known as
CIA triad. Confidentiality of any message or communication is secrecy of its content. All the …
CIA triad. Confidentiality of any message or communication is secrecy of its content. All the …
Exploring the vulnerability of R-LWE encryption to fault attacks
The future advent of quantum computer pushes for the design and implementation of public-
key cryptosystems capable of resisting quantum attacks. Lattice-based cryptography …
key cryptosystems capable of resisting quantum attacks. Lattice-based cryptography …
A survey on the impacts of quantum computers on information security
M Njorbuenwu, B Swar… - 2019 2nd International …, 2019 - ieeexplore.ieee.org
Quantum computers differ from traditional computers because unlike traditional computers
that use and process information in bits (0 or 1), the unit of information in quantum …
that use and process information in bits (0 or 1), the unit of information in quantum …
Lattice-based cryptography: From reconfigurable hardware to ASIC
As progress in technology is predicted to make quantum computers available in the next few
decades, it is imperative to design public-key cryptosystems capable of resisting attacks that …
decades, it is imperative to design public-key cryptosystems capable of resisting attacks that …
Integration of a quantum scheme for key distribution and authentication within EAP-TLS protocol
The extensive deployment of wireless networks has led to a significant progress in security
approaches that aim to protect confidentiality. The current method for exchanging a secret …
approaches that aim to protect confidentiality. The current method for exchanging a secret …
Incorporation and model checking of a quantum authentication and key distribution scheme in EAP-TLS
The prevalent use of wireless networks has led to noteworthy development in security
techniques that aim to protect information. The existing standard for exchanging a secret key …
techniques that aim to protect information. The existing standard for exchanging a secret key …
Applications of Quantum Key Distribution to security protocols
OL Terranova - 2021 - webthesis.biblio.polito.it
Every year, researches and achievements on quantum computing are making more feasible
a future where quantum networks and computers will be an important part of any informative …
a future where quantum networks and computers will be an important part of any informative …
[PDF][PDF] Modified Novel Quantum Key Exchange using BB84 Algorithm
NV Chetty, B Abhijith, G Nihar… - International Journal of …, 2013 - Citeseer
With the increasing number of eavesdroppers on communication channels, securing the
reliability of digital communication has become a herculean task. For any communication …
reliability of digital communication has become a herculean task. For any communication …