Security of quantum protocols against coherent measurements
STOC '95 Proceedings of the twenty-seventh annual ACM symposium on Theory of computing
Cryptanalysis of short secret exponents modulo RSA primes
Information Sciences—Informatics and Computer Science: An International Journal
ACM SIGACT News - A special issue on cryptography
The logic of optics and the optics of logic
Information Sciences: an International Journal - Special issue: Optics and information sciences
Pseudo information entropy of a single trapped ion interacting with a laser field
Information Sciences: an International Journal - Special issue: Optics and information sciences
An escrow electronic cash system with limited traceability
Information Sciences—Informatics and Computer Science: An International Journal
Information Sciences—Informatics and Computer Science: An International Journal
Classification methods in the detection of new malicious emails
Information Sciences—Informatics and Computer Science: An International Journal
Distribution of digital contents based on public key considering execution speed and security
Information Sciences: an International Journal
On labeling in graph visualization
Information Sciences: an International Journal
A knapsack-based probabilistic encryption scheme
Information Sciences: an International Journal
Threshold cryptography based on Asmuth-Bloom secret sharing
Information Sciences: an International Journal
Standards and verification for fair-exchange and atomicity in e-commerce transactions
Information Sciences: an International Journal
Ownership-attached unblinding of blind signatures for untraceable electronic cash
Information Sciences: an International Journal
OR Forum---Quantum Mechanics and Human Decision Making
Operations Research
Hi-index | 0.07 |
Most modern cryptographic studies design cryptosystems and algorithms using mathematical concepts. In designing and analyzing cryptosystems and protocols, mathematical concepts are critical in supporting the claim that the intended cryptosystem is secure. Most early cryptographic algorithms are based either on factorization or on discrete logarithm problem. Such systems generally adopt rather simple mathematics, and, therefore, need extensive secondary index computation. This study discusses quantum cryptosystems, protection of system security, and optimization of system efficiency. Quantum cryptography detects intrusion and wiretap. In quantum mechanics, a wiretap is neither external nor passive; rather it modifies its entity based on the internal component of the system. The status of the quantum system changes once a wiretap is detected. Hence, only the designer of the system can discover the quantum status of the system; an eavesdropper can neither determine the quantum state nor duplicate the system. The quantum cryptosystem can achieve unconditional security, and thus guarantees secure communication.