Narrow your search
Listing 1 - 10 of 24 << page
of 3
>>
Sort by

Book
Holistic approach to quantum cryptography in cyber security
Author:
ISBN: 1003296033 1003296033 100061445X 1000614506 Year: 2023 Publisher: Boca Raton, Florida ; London ; New York : CRC Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

"This new book discusses the concepts while also highlighting the challenges in the field of quantum cryptography, also covering cryptographic techniques and cyber security techniques, in a single volume. It comprehensively covers important topics in the field of quantum cryptography with applications, including quantum key distribution, position-based quantum cryptography, quantum teleportation, quantum e-commerce, quantum cloning, cyber security techniques architectures and design, cyber security techniques management, software defined networks, and cyber security techniques for 5G communication. The text also discusses the security of practical quantum key distribution systems, applications and algorithms developed for quantum cryptography, as well as cyber security through quantum computing and quantum cryptography. The text will be beneficial for graduate students, academic researchers, and professionals working in the fields of electrical engineering, electronics and communications engineering, computer science, and information technology"--


Book
Quantum systems, channels, information : a mathematical introduction
Author:
Year: 2012 Publisher: Berlin : Walter de Gruyter GmbH & Co. KG,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The main emphasis of this work is the mathematical theory of quantum channels and their entropic and information characteristics. Quantum information theory is one of the key research areas, since it leads the way to vastly increased computing speeds by using quantum systems to store and process information. Quantum cryptography allows for secure communication of classified information. Research in the field of quantum informatics, including quantum information theory, is in progress in leading scientific centers throughout the world. The past years were marked with impressive progress made by several researchers in solution of some difficult problems, in particular, the additivity of the entropy characteristics of quantum channels. This suggests a need for a book that not only introduces the basic concepts of quantum information theory, but also presents in detail some of the latest achievements.


Book
Modern Cryptography Volume 2 : A Classical Introduction to Informational and Mathematical Principle.
Authors: --- ---
Year: 2023 Publisher: Singapore : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This open access book covers the most cutting-edge and hot research topics and fields of post-quantum cryptography. The main purpose of this book is to focus on the computational complexity theory of lattice ciphers, especially the reduction principle of Ajtai, in order to fill the gap that post-quantum ciphers focus on the implementation of encryption and decryption algorithms, but the theoretical proof is insufficient. In Chapter 3, Chapter 4 and Chapter 6, author introduces the theory and technology of LWE distribution, LWE cipher and homomorphic encryption in detail. When using random analysis tools, there is a problem of "ambiguity" in both definition and algorithm. The greatest feature of this book is to use probability distribution to carry out rigorous mathematical definition and mathematical demonstration for various unclear or imprecise expressions, so as to make it a rigorous theoretical system for classroom teaching and dissemination. Chapters 5 and 7 further expand and improve the theory of cyclic lattice, ideal lattice and generalized NTRU cryptography. This book is used as a professional book for graduate students majoring in mathematics and cryptography, as well as a reference book for scientific and technological personnel engaged in cryptography research.


Dissertation
Mémoire
Authors: --- --- --- --- --- et al.
Year: 2024 Publisher: Liège Université de Liège (ULiège)

Loading...
Export citation

Choose an application

Bookmark

Abstract

In quantum cryptography, the first secure protocol to have been formalized is the BB84 protocol. In this master's thesis, we analyze its security under dissipation, weak measurements combined with artificial intelligence, and quantum feedback.


Periodical
IET quantum communication.
Author:
ISSN: 26328925 Year: 2020 Publisher: [Stevenage, Herts, U.K.] : [Hoboken N.J.] : Institution of Engineering and Technology, John Wiley & Sons [on behalf of The Institution of Engineering and Technology]


Book
Quantum cryptography in advanced networks
Author:
ISBN: 1839622504 1839622490 Year: 2019 Publisher: London, England : Intech,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Modern Cryptography Volume 2 : A Classical Introduction to Informational and Mathematical Principle.
Authors: --- ---
Year: 2023 Publisher: Singapore : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This open access book covers the most cutting-edge and hot research topics and fields of post-quantum cryptography. The main purpose of this book is to focus on the computational complexity theory of lattice ciphers, especially the reduction principle of Ajtai, in order to fill the gap that post-quantum ciphers focus on the implementation of encryption and decryption algorithms, but the theoretical proof is insufficient. In Chapter 3, Chapter 4 and Chapter 6, author introduces the theory and technology of LWE distribution, LWE cipher and homomorphic encryption in detail. When using random analysis tools, there is a problem of "ambiguity" in both definition and algorithm. The greatest feature of this book is to use probability distribution to carry out rigorous mathematical definition and mathematical demonstration for various unclear or imprecise expressions, so as to make it a rigorous theoretical system for classroom teaching and dissemination. Chapters 5 and 7 further expand and improve the theory of cyclic lattice, ideal lattice and generalized NTRU cryptography. This book is used as a professional book for graduate students majoring in mathematics and cryptography, as well as a reference book for scientific and technological personnel engaged in cryptography research.


Book
Introduction to quantum cryptography
Authors: ---
ISBN: 9781316515655 Year: 2024 Publisher: Cambridge, United Kingdom : Cambridge University Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

"This book offers an accessible and engaging introduction to quantum cryptography, assuming no prior knowledge in quantum computing. Essential background theory and mathematical techniques are introduced and applied in the analysis and design of quantum cryptographic protocols. The title explores several important applications such as quantum key distribution, quantum money, and delegated quantum computation, while also serving as a self-contained introduction to the field of quantum computing. With frequent illustrations and simple examples relevant to quantum cryptography, this title focuses on building intuition and challenges readers to understand the basis of cryptographic security. Frequent worked examples and mid-chapter exercises allow readers to extend their understanding, and in-text quizzes, end-of-chapter homework problems, and recommended further reading reinforce and broaden understanding. Online resources available to instructors include interactive computational problems in Julia, videos, lecture slides, and a fully worked solutions manual."


Book
Modern Cryptography Volume 2 : A Classical Introduction to Informational and Mathematical Principle.
Authors: --- ---
Year: 2023 Publisher: Singapore : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This open access book covers the most cutting-edge and hot research topics and fields of post-quantum cryptography. The main purpose of this book is to focus on the computational complexity theory of lattice ciphers, especially the reduction principle of Ajtai, in order to fill the gap that post-quantum ciphers focus on the implementation of encryption and decryption algorithms, but the theoretical proof is insufficient. In Chapter 3, Chapter 4 and Chapter 6, author introduces the theory and technology of LWE distribution, LWE cipher and homomorphic encryption in detail. When using random analysis tools, there is a problem of "ambiguity" in both definition and algorithm. The greatest feature of this book is to use probability distribution to carry out rigorous mathematical definition and mathematical demonstration for various unclear or imprecise expressions, so as to make it a rigorous theoretical system for classroom teaching and dissemination. Chapters 5 and 7 further expand and improve the theory of cyclic lattice, ideal lattice and generalized NTRU cryptography. This book is used as a professional book for graduate students majoring in mathematics and cryptography, as well as a reference book for scientific and technological personnel engaged in cryptography research.


Book
Relativistic Quantum Information
Authors: ---
Year: 2020 Publisher: Basel, Switzerland MDPI - Multidisciplinary Digital Publishing Institute

Loading...
Export citation

Choose an application

Bookmark

Abstract

Relativistic quantum information is one of the most exciting fields of physics today. Not only does it open possibilities for new forms of computing but it also calls into question the peaceful coexistence between classical space–time and quantum physics with scenarios that reopen the relationships between locality and nonlocality in the foundational structure of physics. Curated by two international experts Ignazio Licata and Fabrizio Tamburini, this volume hosts a selection of particularly significant essays for the new territories, and is dedicated to the 60th anniversary of Prof. Ignazio Licata.

Listing 1 - 10 of 24 << page
of 3
>>
Sort by