Listing 1 - 10 of 24 | << page >> |
Sort by
|
Choose an application
"This new book discusses the concepts while also highlighting the challenges in the field of quantum cryptography, also covering cryptographic techniques and cyber security techniques, in a single volume. It comprehensively covers important topics in the field of quantum cryptography with applications, including quantum key distribution, position-based quantum cryptography, quantum teleportation, quantum e-commerce, quantum cloning, cyber security techniques architectures and design, cyber security techniques management, software defined networks, and cyber security techniques for 5G communication. The text also discusses the security of practical quantum key distribution systems, applications and algorithms developed for quantum cryptography, as well as cyber security through quantum computing and quantum cryptography. The text will be beneficial for graduate students, academic researchers, and professionals working in the fields of electrical engineering, electronics and communications engineering, computer science, and information technology"--
Data encryption (Computer science) --- Computer networks --- Quantum cryptography. --- Security measures.
Choose an application
The main emphasis of this work is the mathematical theory of quantum channels and their entropic and information characteristics. Quantum information theory is one of the key research areas, since it leads the way to vastly increased computing speeds by using quantum systems to store and process information. Quantum cryptography allows for secure communication of classified information. Research in the field of quantum informatics, including quantum information theory, is in progress in leading scientific centers throughout the world. The past years were marked with impressive progress made by several researchers in solution of some difficult problems, in particular, the additivity of the entropy characteristics of quantum channels. This suggests a need for a book that not only introduces the basic concepts of quantum information theory, but also presents in detail some of the latest achievements.
Information theory in physics. --- Quantum entropy. --- Quantum Computing. --- Quantum Cryptography. --- Quantum Information. --- Quantum Systems. --- Quantum Theory.
Choose an application
This open access book covers the most cutting-edge and hot research topics and fields of post-quantum cryptography. The main purpose of this book is to focus on the computational complexity theory of lattice ciphers, especially the reduction principle of Ajtai, in order to fill the gap that post-quantum ciphers focus on the implementation of encryption and decryption algorithms, but the theoretical proof is insufficient. In Chapter 3, Chapter 4 and Chapter 6, author introduces the theory and technology of LWE distribution, LWE cipher and homomorphic encryption in detail. When using random analysis tools, there is a problem of "ambiguity" in both definition and algorithm. The greatest feature of this book is to use probability distribution to carry out rigorous mathematical definition and mathematical demonstration for various unclear or imprecise expressions, so as to make it a rigorous theoretical system for classroom teaching and dissemination. Chapters 5 and 7 further expand and improve the theory of cyclic lattice, ideal lattice and generalized NTRU cryptography. This book is used as a professional book for graduate students majoring in mathematics and cryptography, as well as a reference book for scientific and technological personnel engaged in cryptography research.
Post-Quantum Cryptography --- Gauss Lattice --- Reduction --- Learning With Errors --- FHE --- Fourier transform --- Ideal lattice --- NTRU --- Smoothing parameters --- Discrete Gaussian measure
Choose an application
In quantum cryptography, the first secure protocol to have been formalized is the BB84 protocol. In this master's thesis, we analyze its security under dissipation, weak measurements combined with artificial intelligence, and quantum feedback.
quantum physics --- quantum key distribution --- quantum cryptography --- BB84 --- homodyne measurement --- AI --- Physique, chimie, mathématiques & sciences de la terre > Physique
Choose an application
Quantum communication --- Quantum communication. --- Quantum communications --- Optical communications --- quantum cryptography --- optical fibre networks --- quantum optics --- quantum computing --- quantum wireless communication --- Teoria quàntica --- Teoria quàntica.
Choose an application
Cryptography. --- Quantum cryptography. --- Cryptography --- Quantum theory --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science)
Choose an application
This open access book covers the most cutting-edge and hot research topics and fields of post-quantum cryptography. The main purpose of this book is to focus on the computational complexity theory of lattice ciphers, especially the reduction principle of Ajtai, in order to fill the gap that post-quantum ciphers focus on the implementation of encryption and decryption algorithms, but the theoretical proof is insufficient. In Chapter 3, Chapter 4 and Chapter 6, author introduces the theory and technology of LWE distribution, LWE cipher and homomorphic encryption in detail. When using random analysis tools, there is a problem of "ambiguity" in both definition and algorithm. The greatest feature of this book is to use probability distribution to carry out rigorous mathematical definition and mathematical demonstration for various unclear or imprecise expressions, so as to make it a rigorous theoretical system for classroom teaching and dissemination. Chapters 5 and 7 further expand and improve the theory of cyclic lattice, ideal lattice and generalized NTRU cryptography. This book is used as a professional book for graduate students majoring in mathematics and cryptography, as well as a reference book for scientific and technological personnel engaged in cryptography research.
Macroeconomics --- Applied mathematics --- Post-Quantum Cryptography --- Gauss Lattice --- Reduction --- Learning With Errors --- FHE --- Fourier transform --- Ideal lattice --- NTRU --- Smoothing parameters --- Discrete Gaussian measure
Choose an application
"This book offers an accessible and engaging introduction to quantum cryptography, assuming no prior knowledge in quantum computing. Essential background theory and mathematical techniques are introduced and applied in the analysis and design of quantum cryptographic protocols. The title explores several important applications such as quantum key distribution, quantum money, and delegated quantum computation, while also serving as a self-contained introduction to the field of quantum computing. With frequent illustrations and simple examples relevant to quantum cryptography, this title focuses on building intuition and challenges readers to understand the basis of cryptographic security. Frequent worked examples and mid-chapter exercises allow readers to extend their understanding, and in-text quizzes, end-of-chapter homework problems, and recommended further reading reinforce and broaden understanding. Online resources available to instructors include interactive computational problems in Julia, videos, lecture slides, and a fully worked solutions manual."
Quantum cryptography --- Quantum computing --- Cryptographie quantique --- Informatique quantique --- Mathematics. --- Security measures. --- Mathématiques. --- Mesures de sûreté. --- Mathématiques. --- Mesures de sûreté.
Choose an application
This open access book covers the most cutting-edge and hot research topics and fields of post-quantum cryptography. The main purpose of this book is to focus on the computational complexity theory of lattice ciphers, especially the reduction principle of Ajtai, in order to fill the gap that post-quantum ciphers focus on the implementation of encryption and decryption algorithms, but the theoretical proof is insufficient. In Chapter 3, Chapter 4 and Chapter 6, author introduces the theory and technology of LWE distribution, LWE cipher and homomorphic encryption in detail. When using random analysis tools, there is a problem of "ambiguity" in both definition and algorithm. The greatest feature of this book is to use probability distribution to carry out rigorous mathematical definition and mathematical demonstration for various unclear or imprecise expressions, so as to make it a rigorous theoretical system for classroom teaching and dissemination. Chapters 5 and 7 further expand and improve the theory of cyclic lattice, ideal lattice and generalized NTRU cryptography. This book is used as a professional book for graduate students majoring in mathematics and cryptography, as well as a reference book for scientific and technological personnel engaged in cryptography research.
Macroeconomics --- Applied mathematics --- Post-Quantum Cryptography --- Gauss Lattice --- Reduction --- Learning With Errors --- FHE --- Fourier transform --- Ideal lattice --- NTRU --- Smoothing parameters --- Discrete Gaussian measure --- Post-Quantum Cryptography --- Gauss Lattice --- Reduction --- Learning With Errors --- FHE --- Fourier transform --- Ideal lattice --- NTRU --- Smoothing parameters --- Discrete Gaussian measure
Choose an application
Relativistic quantum information is one of the most exciting fields of physics today. Not only does it open possibilities for new forms of computing but it also calls into question the peaceful coexistence between classical space–time and quantum physics with scenarios that reopen the relationships between locality and nonlocality in the foundational structure of physics. Curated by two international experts Ignazio Licata and Fabrizio Tamburini, this volume hosts a selection of particularly significant essays for the new territories, and is dedicated to the 60th anniversary of Prof. Ignazio Licata.
spacetime entanglement entropy --- Unruh effect --- gravitational force --- thermodynamics --- holographic principle --- simultaneous --- classical communication --- quantum key distribution --- plug-and-play configuration --- optical amplifier --- relativistic quantum information --- quantum cryptography --- summoning --- no-cloning --- no-signalling --- bit commitment --- quantum electrodynamics --- analogue gravity --- Bose-Einstein condensation --- information loss --- cosmological particle creation --- wormholes --- entanglement --- ER = EPR --- Planck scales --- colliding black holes --- quantum hair --- bohr-likr black holes --- n/a
Listing 1 - 10 of 24 | << page >> |
Sort by
|