Search

Your search keyword '"Quantum cryptography"' showing total 278 results

Search Constraints

Start Over You searched for: Descriptor "Quantum cryptography" Remove constraint Descriptor: "Quantum cryptography" Publication Type Magazines Remove constraint Publication Type: Magazines
278 results on '"Quantum cryptography"'

Search Results

1. Quantum-Proof Secrets.

2. Uncloneable Cryptography.

3. SageMath: A Quick Introduction to Cybersecurity.

6. Where Is the Research on Cryptographic Transition and Agility? Gaps facing the industry as quantum safe algorithms move closer to standardization.

7. Hacking the unhackable?

8. The quantum leap in secure communication networks.

9. Quantum continues to be a buoyant field where photonics will play a critical role: Now is the time to invest in quantum technologies.

10. Making Waves Quietly: China’s Quantum Technology Policy Momentum.

11. What's Happening in the Field of Quantum Computing?

12. DATA'S NEW DAWN.

13. Are spies sabotaging encryption?

14. Elsewhere on New Scientist.

15. Cyber Security in the Quantum Era.

16. Fully Device Independent Quantum Key Distribution.

17. "Quantum cryptography is something you'll have to get used to sooner or later".

18. ISACA Foundation – Interview mit der Masterstudentin und Stipendiatin Somaye Hoseinpur.

19. Quantum non-locality: from denigration to the nobel prize, via quantum cryptography.

20. Understand This.

21. New security protocol shields data from attackers during cloud-based computation.

22. Protocol-based state estimation of two-time-scale complex networks with nonhomogeneous sojourn probabilities.

23. Quantum takes a leap of faith.

24. A quantum blockchain-enabled framework for secure private electronic medical records in Internet of Medical Things.

25. DPCrypto: Acceleration of Post-Quantum Cryptography Using Dot-Product Instructions on GPUs.

26. Quantum Cryptanalysis on a Multivariate Cryptosystem Based on Clipped Hopfield Neural Network.

27. Efficient Hardware Arithmetic for Inverted Binary Ring-LWE Based Post-Quantum Cryptography.

28. Public-Key Cryptography in the Era of Quantum Computing.

29. WHAT'S QUANTUM COMPUTING GOT TO DO WITH IT?

30. Science@Work: DAKSHITA KHURANA.

31. Quantum Technology Forgoes Unconditional Security to Extend Its Reach.

32. How quantum computing can fight climate change.

33. Instruction-Set Accelerated Implementation of CRYSTALS-Kyber.

34. Q&A: Exploring the Promise of Quantum Computing: ACM Computing Prize recipient Scott Aaronson discusses his work in quantum complexity.

35. TRUST NO ONE.

36. High-Speed FPGA Implementation of SIKE Based on an Ultra-Low-Latency Modular Multiplier.

37. Quantum Computing: Insights From a Senior Research Scientist.

38. Data from Department of Computer Sciences and Engineering Provide New Insights into Engineering (Quantum-based Privacy-preserving Techniques for Secure and Trustworthy Internet of Medical Things: an Extensive Analysis).

39. iMessage security boost.

40. Reports on Physics from National University of Singapore Provide New Insights (Fundamental Limits On Quantum Cloning From the No-signaling Principle).

41. Steady progress in approaching the quantum advantage.

42. Quantum Computing: Exploring Supremacy, Advantage & Practicality.

43. Aliro Quantum attracts investment from Accenture.

44. Cryptanalysis and improvement of "Game theoretic security of quantum bit commitment".

45. Where worlds collide.

46. Implementation of Supersingular Isogeny-Based Diffie-Hellman and Key Encapsulation Using an Efficient Scheduling.

47. Optimized Implementation of SIKE Round 2 on 64-bit ARM Cortex-A Processors.

48. ECC2: Error correcting code and elliptic curve based cryptosystem.

49. An Efficient Implementation of the NewHope Key Exchange on FPGAs.

50. Latest DigiCert Study Reveals Widening Gap Between Organizations Benefiting from Digital Trust and Those Losing Out.

Catalog

Books, media, physical & digital resources