搜索结果: 1-15 共查到“quantum key”相关记录64条 . 查询时间(0.14 秒)
Quantum Alice and Silent Bob: Qubit-based Quantum Key Recycling with almost no classical communication
quantum cryptography quantum key recycling
2019/8/2
We introduce a Quantum Key Recycling (QKR) protocol that needs no classical communication from Alice to Bob. Alice sends only a cipherstate, which consists of qubits that are individually measured by ...
Security proof for Quantum Key Recycling with noise
quantum cryptography quantum key recycling
2018/3/13
Quantum Key Recycling aims to re-use the keys employed in quantum encryption and quantum authentication schemes. We consider QKR protocols where classical information is embedded in qubit states. A pa...
Quantum Key-recovery Attack on Feistel Structures
Quantum-CPA Key-recovery Attack Feistel Structure
2017/12/19
Post-quantum cryptography has attracted much attention from worldwide cryptologists. At Asiacrypt 2017, Leander and May combines Grover and Simon algorithms to quantumly break FX-based block ciphers. ...
Quantum Key-Recovery on full AEZ
block ciphers quantum cryptography authenticated encryption
2017/8/10
AEZ is an authenticated encryption algorithm, submitted to the CAESAR competition. It has been selected for the third round of the competition. While some classical analysis on the algorithm have been...
Post-Quantum Key Exchange on FPGAs
Post-quantum cryptography lattice-based cryptography LWE
2017/7/21
The National Institute of Standards and Technology (NIST) announces the post-quantum crypto project, aiming to select cryptographic standard in the post-quantum era. The key establishment algorithm is...
Post-Quantum Key Exchange on ARMv8-A -- A New Hope for NEON made Simple
ARMv8-A NEON ARM Cortex-A53 Post-Quantum Key Exchange
2017/5/5
NewHope and NewHope-Simple are two recently proposed post-quantum key exchange protocols based on the hardness of the Ring-LWE problem. Due to their high security margins and performance, there have b...
Optimal attacks on qubit-based Quantum Key Recycling
quantum cryptography quantum key recycling
2017/4/19
Quantum Key Recycling (QKR) is a quantum-cryptographic primitive that allows one to re-use keys in an unconditionally secure way. By removing the need to repeatedly generate new keys it improves commu...
Recently, a number of results have been published that show how to combine classical cryptanalysis with quantum algorithms, thereby (potentially) achieving considerable speed-ups. We follow this trend...
Post-Quantum Key Exchange for the Internet and the Open Quantum Safe Project
post-quantum cryptography key exchange implementation
2016/12/8
Designing public key cryptosystems that resist attacks by quantum computers is an important area of current cryptographic research and standardization. To retain confidentiality of today's communicati...
Quantum Key Recycling with eight-state encoding (The Quantum One Time Pad is more interesting than we thought)
quantum cryptography eight-state encoding
2016/12/7
Perfect encryption of quantum states using the Quantum One-Time Pad (QOTP) requires 2 classical key bits per qubit. Almost-perfect encryption, with information-theoretic security, requires only slight...
Speeding up R-LWE post-quantum key exchange
Post-quantum key exchange Ring-LWE software optimization
2016/5/18
Post-quantum cryptography has attracted increased attention in the last couple of years, due to the threat of quantum computers breaking current cryptosystems. In particular, the key size and performa...
Quantum key distribution with combined conjugate coding and information overloading
quantum key distribution conjugate coding
2016/5/9
Current quantum key distribution schemes depend either on a form of conjugate coding or on the principle of putting more information into a quantum state than can possibly be read out with a measureme...
Quantum Cryptography Beyond Quantum Key Distribution
Quantum cryptography conjugate coding quantum money
2016/1/26
Quantum cryptography is the art and science of exploiting quantum mechanical effects in
order to perform cryptographic tasks. While the most well-known example of this discipline is
quantum key dist...
Decoy-state quantum key distribution with biased basis choice
Decoy-state quantum distribution biased basis choice
2016/1/23
Quantum key distribution (QKD) utilizes the laws of quantum mechanics to achieve information-theoretically secure key generation. This field is now approaching the stage of commercialization, but many...
Source attack of decoy-state quantum key distribution using phase information
Source attack decoy-state quantum key distribution phase information
2016/1/23
Quantum key distribution (QKD) utilizes the laws of quantum mechanics to achieve information-theoretically secure key generation. This field is now approaching the stage of commercialization, but many...