Found: 31
Select item for more details and to access through your institution.
Keynote Address.
- Published in:
- 2023
- By:
- Publication type:
- Speech
A synchronous quantum blind signature scheme with entanglement swapping.
- Published in:
- International Journal of Quantum Information, 2019, v. 17, n. 1, p. N.PAG, doi. 10.1142/S0219749919500072
- By:
- Publication type:
- Article
A New Quantum Proxy Signature Model Based on a Series of Genuine Entangled States.
- Published in:
- International Journal of Theoretical Physics, 2019, v. 58, n. 2, p. 591, doi. 10.1007/s10773-018-3957-2
- By:
- Publication type:
- Article
An Optimized Quantum Representation for Color Digital Images.
- Published in:
- International Journal of Theoretical Physics, 2018, v. 57, n. 10, p. 2938, doi. 10.1007/s10773-018-3813-4
- By:
- Publication type:
- Article
An efficient pixel-level chaotic image encryption algorithm.
- Published in:
- Nonlinear Dynamics, 2018, v. 94, n. 1, p. 745, doi. 10.1007/s11071-018-4391-y
- By:
- Publication type:
- Article
Universal quantum encryption for quantum signature using the swap test.
- Published in:
- Quantum Information Processing, 2018, v. 17, n. 10, p. 1, doi. 10.1007/s11128-018-2029-0
- By:
- Publication type:
- Article
Why Maritime Cybersecurity Is Policy Priority and How It Can an Ocean Be Addressed.
- Published in:
- Marine Technology Society Journal, 2018, v. 52, n. 5, p. 44
- By:
- Publication type:
- Article
Multiparty Quantum Direct Secret Sharing of Classical Information with Bell States and Bell Measurements.
- Published in:
- International Journal of Theoretical Physics, 2018, v. 57, n. 5, p. 1559, doi. 10.1007/s10773-018-3681-y
- By:
- Publication type:
- Article
A Novel Quantum Solution to Privacy-Preserving Nearest Neighbor Query in Location-Based Services.
- Published in:
- International Journal of Theoretical Physics, 2018, v. 57, n. 4, p. 1049, doi. 10.1007/s10773-017-3637-7
- By:
- Publication type:
- Article
Is Encryption Dead? Quantum Computing's Impact on Cryptography.
- Published in:
- ISSA Journal, 2017, v. 15, n. 12, p. 27
- By:
- Publication type:
- Article
The Security Problems in Some Novel Arbitrated Quantum Signature Protocols.
- Published in:
- International Journal of Theoretical Physics, 2017, v. 56, n. 8, p. 2433, doi. 10.1007/s10773-017-3394-7
- By:
- Publication type:
- Article
Verifiable Quantum Encryption and its Practical Applications.
- Published in:
- International Journal of Theoretical Physics, 2017, v. 56, n. 4, p. 1208, doi. 10.1007/s10773-016-3263-9
- By:
- Publication type:
- Article
Optimal Symmetric Ternary Quantum Encryption Schemes.
- Published in:
- International Journal of Theoretical Physics, 2016, v. 55, n. 11, p. 4709, doi. 10.1007/s10773-016-3094-8
- By:
- Publication type:
- Article
Bit-oriented quantum public-key encryption based on quantum perfect encryption.
- Published in:
- Quantum Information Processing, 2016, v. 15, n. 8, p. 3285, doi. 10.1007/s11128-016-1339-3
- By:
- Publication type:
- Article
Symmetric weak ternary quantum homomorphic encryption schemes.
- Published in:
- Modern Physics Letters B, 2016, v. 30, n. 7, p. -1, doi. 10.1142/S0217984916500767
- By:
- Publication type:
- Article
Metal dichalcogenides: Two dimensions and one photon.
- Published in:
- Nature Nanotechnology, 2015, v. 10, n. 6, p. 485, doi. 10.1038/nnano.2015.104
- By:
- Publication type:
- Article
Quantum image encryption based on generalized Arnold transform and double random-phase encoding.
- Published in:
- Quantum Information Processing, 2015, v. 14, n. 4, p. 1193, doi. 10.1007/s11128-015-0926-z
- By:
- Publication type:
- Article
Security bound of cheat sensitive quantum bit commitment.
- Published in:
- Scientific Reports, 2015, p. 9398, doi. 10.1038/srep09398
- By:
- Publication type:
- Article
How to re-use a one-time pad safely and almost optimally even if P = NP.
- Published in:
- Natural Computing, 2014, v. 13, n. 4, p. 469, doi. 10.1007/s11047-014-9454-5
- By:
- Publication type:
- Article
Cryptographic encryption scheme based on metastable excited nuclei.
- Published in:
- Natural Computing, 2014, v. 13, n. 4, p. 487, doi. 10.1007/s11047-014-9455-4
- By:
- Publication type:
- Article
Coherence and squeezing in Z<sub>3</sub>-graded spin coherent states.
- Published in:
- Fortschritte der Physik / Progress of Physics, 2014, v. 62, n. 8, p. 619, doi. 10.1002/prop.201400012
- By:
- Publication type:
- Article
Quantum deniable authentication protocol.
- Published in:
- Quantum Information Processing, 2014, v. 13, n. 7, p. 1501, doi. 10.1007/s11128-014-0743-9
- By:
- Publication type:
- Article
A broadcasting multiple blind signature scheme based on quantum teleportation.
- Published in:
- Optical & Quantum Electronics, 2014, v. 46, n. 6, p. 769, doi. 10.1007/s11082-013-9785-y
- By:
- Publication type:
- Article
Novel Quantum Encryption Algorithm Based on Multiqubit Quantum Shift Register and Hill Cipher.
- Published in:
- Advances in High Energy Physics, 2014, p. 1, doi. 10.1155/2014/104325
- By:
- Publication type:
- Article
A Chaos-based Arbitrated Quantum Signature Scheme in Quantum Crypotosystem.
- Published in:
- International Journal of Theoretical Physics, 2014, v. 53, n. 1, p. 28, doi. 10.1007/s10773-013-1780-3
- By:
- Publication type:
- Article
Bit-Oriented Quantum Public Key Probabilistic Encryption Schemes.
- Published in:
- International Journal of Theoretical Physics, 2014, v. 53, n. 1, p. 116, doi. 10.1007/s10773-013-1789-7
- By:
- Publication type:
- Article
A proxy blind signature scheme based on quantum entanglement.
- Published in:
- Optical & Quantum Electronics, 2013, v. 45, n. 12, p. 1297, doi. 10.1007/s11082-013-9753-6
- By:
- Publication type:
- Article
Novel image encryption/decryption based on quantum Fourier transform and double phase encoding.
- Published in:
- Quantum Information Processing, 2013, v. 12, n. 11, p. 3477, doi. 10.1007/s11128-013-0612-y
- By:
- Publication type:
- Article
Counting States in Spacetime.
- Published in:
- Electronic Journal of Theoretical Physics, 2012, v. 9, n. 26, p. 277
- By:
- Publication type:
- Article
NEW EAVESDROPPER DETECTION METHOD IN QUANTUM CRYPTOGRAPHY.
- Published in:
- Annals of the University Dunarea de Jos of Galati Fascicle III: Electrotechnics, Electronics, Automatic Control & Informatics, 2011, v. 34, n. 1, p. 1
- By:
- Publication type:
- Article
10 Minutes with a Quantum Cryptography Expert.
- Published in:
- 2010
- Publication type:
- Interview