Academic literature on the topic 'Pre-quantum and post-quantum'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Pre-quantum and post-quantum.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Pre-quantum and post-quantum"

1

Ranjita and Gautam Kumar Rajput Dr. "Cryptanalysis of pre-quantum and post-quantum cryptography." International Journal of Advance Research in Multidisciplinary 1, no. 1 (2023): 650–54. https://doi.org/10.5281/zenodo.13643131.

Full text
Abstract:
Cryptanalysis, the study of analyzing and breaking cryptographic algorithms, has long been a crucial aspect of securing digital communications. As quantum computing approaches practical implementation, the cryptographic landscape is poised for significant transformation. This paper delves into the cryptanalysis of both pre-quantum and post-quantum cryptographic systems, highlighting the vulnerabilities and strengths of various algorithms in the face of evolving threats. Pre-quantum cryptography, which includes widely used systems like RSA and Elliptic Curve Cryptography (ECC), is based on mathematical problems that are hard to solve using classical computers. However, quantum algorithms, such as Shor's algorithm, pose a direct threat to these systems by potentially breaking their security within a feasible timeframe. In response, post-quantum cryptography is being developed to offer resistance against quantum attacks. This paper examines the cryptanalysis techniques applicable to these new algorithms, including lattice-based, hash-based, code-based, and multivariate polynomial cryptosystems.
APA, Harvard, Vancouver, ISO, and other styles
2

Rayan, Ahmed Mahmoud, Ahmed Aly Abdel-Hafez, Hanady Hussien Issa, and Khaled Aly Shehata. "Pre-Quantum to Post-Quantum Cryptography: An Extensive Survey." Journal of Advanced Research in Applied Sciences and Engineering Technology 62, no. 1 (2024): 234–54. https://doi.org/10.37934/araset.62.1.234254.

Full text
Abstract:
The word “cryptology” was introduced by the ancient Greeks between 900 BC and 500 BC. The two primary branches of cryptology science are cryptanalysis and cryptography. Key-based cryptography, which is lately named "pre-quantum cryptography," is classified based on the number of keys used into three main categories of cryptography: symmetric key cryptography, asymmetric key cryptography and hash functions. This survey paper aims to give an overview of cryptography-related subjects. Descriptive and analytical methods are used in this extensive survey. Pre-quantum cryptography categories, including symmetric key cryptography, asymmetric key cryptography and hash functions, with detailed explanations and a comparison between the first two types. Symmetric key cryptography classification into block cipher and stream cipher, the difference between them, the essential types of stream ciphers, a comparative analysis between these types, the main structures of block ciphers, their design principles in detail and the differences between block cipher encryption algorithms are explained. Asymmetric key cryptography principles, basics and comparison of asymmetric key cryptography algorithms, in addition to the primary differences between symmetric and asymmetric key cryptography, are discussed. However, since the rapid increase in computer processing capabilities and the rise of quantum computers that can solve complicated problems that classical computers (CC) or supercomputers cannot solve in a feasible time, pre-quantum cryptography algorithms like the Advanced Encryption Standard (AES), Ron Rivest, Adi Shamir and Leonard Adleman (RSA) encryption algorithms that are used to interface with current communications protocols and networks are susceptible to attacks from quantum computers. Thus, in the era of quantum computing, pre-quantum cryptography security might be jeopardized. Therefore, post-quantum cryptography (PQC) that is strong against quantum computers has been explored. Accordingly, the recent trend of PQC algorithms, the differences among the varieties of their theoretical techniques and the selected standard mechanisms by the National Institute of Standards and Technology (NIST) are briefly expounded.
APA, Harvard, Vancouver, ISO, and other styles
3

Collins, Daniel. "Teleportation of Post-Selected Quantum States." Quantum 8 (March 14, 2024): 1280. http://dx.doi.org/10.22331/q-2024-03-14-1280.

Full text
Abstract:
Teleportation allows Alice to send a pre-prepared quantum state to Bob using only pre-shared entanglement and classical communication. Here we show that it is possible to teleport a state which is also post-selected. Post-selection of a state Φ means that after Alice has finished her experiment she performs a measurement and only keeps runs of the experiment where the measurement outcome is Φ. We also demonstrate pre and post-selected port-based teleportation. Finally we use these protocols to perform instantaneous non-local quantum computation on pre and post-selected systems, and significantly reduce the entanglement required to instantaneously measure an arbitrary non-local variable of spatially separated pre and post-selected systems.
APA, Harvard, Vancouver, ISO, and other styles
4

Cultice, Tyler, and Himanshu Thapliyal. "PUF-Based Post-Quantum CAN-FD Framework for Vehicular Security." Information 13, no. 8 (2022): 382. http://dx.doi.org/10.3390/info13080382.

Full text
Abstract:
The Controller Area Network (CAN) is a bus protocol widely used in Electronic control Units (ECUs) to communicate between various subsystems in vehicles. Insecure CAN networks can allow attackers to control information between vital vehicular subsystems. As vehicles can have lifespans of multiple decades, post-quantum cryptosystems are essential for protecting the vehicle communication systems from quantum attacks. However, standard CAN’s efficiency and payload sizes are too small for post-quantum cryptography. The Controller Area Network Flexible Data-Rate (CAN-FD) is an updated protocol for CAN that increases transmission speeds and maximum payload size. With CAN-FD, higher security standards, such as post-quantum, can be utilized without severely impacting performance. In this paper, we propose PUF-Based Post-Quantum Cryptographic CAN-FD Framework, or PUF-PQC-CANFD. Our framework provides post-quantum security to the CAN network while transmitting and storing less information than other existing pre-quantum and post-quantum CAN frameworks. Our proposal protects against most cryptographic-based attacks while transmitting (at up to 100 ECUs) 25–94% less messages than existing pre-quantum frameworks and 99% less messages than existing post-quantum frameworks. PUF-PQC-CANFD is optimized for smaller post-quantum key sizes, storage requirements, and transmitted information to minimize the impact on resource-restricted ECUs.
APA, Harvard, Vancouver, ISO, and other styles
5

Li, Yan-Bing, Qiao-Yan Wen, Zi-Chen Li, Su-Juan Qin, and Ya-Tao Yang. "Cheat sensitive quantum bit commitment via pre- and post-selected quantum states." Quantum Information Processing 13, no. 1 (2013): 141–49. http://dx.doi.org/10.1007/s11128-013-0566-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kopyciuk, T., M. Lewandowski, and P. Kurzyński. "Pre- and post-selection paradoxes in quantum walks." New Journal of Physics 21, no. 10 (2019): 103054. http://dx.doi.org/10.1088/1367-2630/ab4cf8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Yakovleva, T. S., A. M. Rostom, V. A. Tomilin, and L. V. Ilichev. "Quantum geometric phase under pre- and post-selection." Quantum Electronics 49, no. 5 (2019): 439–42. http://dx.doi.org/10.1070/qel17014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kim, Hyunjun, Wonwoong Kim, Yeajun Kang, Hyunji Kim, and Hwajeong Seo. "Post-Quantum Delegated Proof of Luck for Blockchain Consensus Algorithm." Applied Sciences 14, no. 18 (2024): 8394. http://dx.doi.org/10.3390/app14188394.

Full text
Abstract:
The advancements in quantum computing and the potential for polynomial-time solutions to traditional public key cryptography (i.e., Rivest–Shamir–Adleman (RSA) and elliptic-curve cryptography (ECC)) using Shor’s algorithm pose a serious threat to the security of pre-quantum blockchain technologies. This paper proposes an efficient quantum-safe blockchain that incorporates new quantum-safe consensus algorithms. We integrate post-quantum signature schemes into the blockchain’s transaction signing and verification processes to enhance resistance against quantum attacks. Specifically, we employ the Falcon signature scheme, which was selected during the NIST post-quantum cryptography (PQC) standardization process. Although the integration of the post-quantum signature scheme results in a reduction in the blockchain’s transactions per second (TPSs), we introduce efficient approaches to mitigate this performance degradation. Our proposed post-quantum delegated proof of luck (PQ-DPoL) combines a proof of luck (PoL) mechanism with a delegated approach, ensuring quantum resistance, energy efficiency, and fairness in block generation. Experimental results demonstrate that while post-quantum cryptographic algorithms like Falcon introduce larger signature sizes and slower processing times, the PQ-DPoL algorithm effectively balances security and performance, providing a viable solution for secure blockchain operations in a post-quantum era.
APA, Harvard, Vancouver, ISO, and other styles
9

Schanck, John M., William Whyte, and Zhenfei Zhang. "Circuit-extension handshakes for Tor achieving forward secrecy in a quantum world." Proceedings on Privacy Enhancing Technologies 2016, no. 4 (2016): 219–36. http://dx.doi.org/10.1515/popets-2016-0037.

Full text
Abstract:
Abstract We propose a circuit extension handshake for Tor that is forward secure against adversaries who gain quantum computing capabilities after session negotiation. In doing so, we refine the notion of an authenticated and confidential channel establishment (ACCE) protocol and define pre-quantum, transitional, and post-quantum ACCE security. These new definitions reflect the types of adversaries that a protocol might be designed to resist. We prove that, with some small modifications, the currently deployed Tor circuit extension handshake, ntor, provides pre-quantum ACCE security. We then prove that our new protocol, when instantiated with a post-quantum key encapsulation mechanism, achieves the stronger notion of transitional ACCE security. Finally, we instantiate our protocol with NTRU-Encrypt and provide a performance comparison between ntor, our proposal, and the recent design of Ghosh and Kate.
APA, Harvard, Vancouver, ISO, and other styles
10

Avirmed, Baasanchimed, Kaito Niinomi, and Michele Dall'Arno. "Adversarial guesswork with quantum side information." Quantum Information and Computation 23, no. 13&14 (2023): 1105–18. http://dx.doi.org/10.26421/qic23.13-14-3.

Full text
Abstract:
The guesswork of a classical-quantum channel quantifies the cost incurred in guessing the state transmitted by the channel when only one state can be queried at a time, maximized over any classical pre-processing and minimized over any quantum post-processing. For arbitrary-dimensional covariant classical-quantum channels, we prove the invariance of the optimal pre-processing and the covariance of the optimal ost-processing. In the qubit case, we compute the optimal guesswork for the class of so-called highly symmetric informationally complete classical-quantum channels.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Pre-quantum and post-quantum"

1

Lin, Guan-Yu, and 林冠宇. "InAs Quantum Well MOSFETs Performance Improvemant by Using pre-AlN Passivation Layer and In-Situ PEALD Post Remote Plasma Treatment." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/43685243922155919589.

Full text
Abstract:
碩士<br>國立交通大學<br>影像與生醫光電研究所<br>104<br>When silicon complementary metal oxide semiconductor(CMOS) scaling approaches to the end of the roadmap, III-V compound semiconductors have high electron mobility property and the epitaxial technology has progressed. Therefore, InAs-based QW-MOSFETs are particularly promising for high frequency and low-power logic application. Unlike Si, III-Vs are lack of high-quality native oxide making Si as the mainstream VLSI technology. Choosing suitable gate dielectrics not only makes gate leakage much lower but also has better electrical characteristics. This study demonstrates Al2O3 and HfO2 on InAs-based QW-MOSFETs with interfacial passivation layers, AlN, and post remote-plasma(PRP) treatment. Both of these two passivation methods are of in-situ atomic layer deposition(ALD) process, so our process can avoid from high temperature process and prevent from oxide surface exposing to the air. Thus, oxide quality can be enhanced accordingly. In this study, AlN passivation layer and post remote plasma are applied on the HfO2 device. We got very good electrical characteristics. Subthreshold swing is 90 (mV/dec.). DIBL is 80(mV/V). In the future, the passivation methods could be applied on different device architectures, such as FinFET, gate-all-around, and 2-D materials.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Pre-quantum and post-quantum"

1

Singh, Shivansh Dhar, Tanay Mathur, Vanshita Verma, Rahul Chhabra, Imran Sayyed, and Prashant Vats. "Securing the Digital Frontier: Transitioning from Pre-quantum to Post-quantum Internet Security." In Lecture Notes in Networks and Systems. Springer Nature Singapore, 2025. https://doi.org/10.1007/978-981-97-8591-9_41.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Schwabe, Peter, Douglas Stebila, and Thom Wiggers. "More Efficient Post-quantum KEMTLS with Pre-distributed Public Keys." In Computer Security – ESORICS 2021. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-88418-5_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Liu, Zheng-Hao. "Contextuality and Pre-post-selection Paradoxes: The Exchanged Grins Between Quantum Cheshire Cats." In Exploring Quantum Contextuality with Photons. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-6167-2_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Smith, Benjamin. "Pre- and Post-quantum Diffie–Hellman from Groups, Actions, and Isogenies." In Arithmetic of Finite Fields. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-05153-2_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Sarkar, Ankita, and Mansi Jhamb. "Experimental Perspectives of Post and Pre-quantum Cryptographic Algorithms/Computations for Secured Electronic Health Care Record (EHR) in Sustainable Cyber Physical Systems for IoT." In Innovations in Sustainable Technologies and Computing. Springer Nature Singapore, 2024. https://doi.org/10.1007/978-981-97-7831-7_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Das, Sayan, and Arnav Das. "Pre-Quantum to Post-Quantum Cryptography Transition." In Advances in Mechatronics and Mechanical Engineering. IGI Global, 2024. http://dx.doi.org/10.4018/979-8-3693-7076-6.ch012.

Full text
Abstract:
Quantum cryptography is a promising field for securing information against quantum computers. Shor's algorithm, a quantum algorithm, can factor large prime numbers in polynomial time and solve the discrete logarithm problem, which is the basis for classical cryptographic algorithms like Rivest-Shamir-Adleman algorithm (RSA), Diffie-Hellman key exchange (DHKE), and Elliptic Curve Diffie-Hellman algorithm(ECDH). These algorithms pose a significant threat to their security and reliability. Post-quantum cryptography techniques are being implemented by all industries to address the threat posed by quantum supremacy. The chapter discusses the potential threat of Shor's algorithm on classical cryptographic algorithms and discusses post-quantum cryptographic algorithms like lattice-based, multivariate, code-based, and Hash-based cryptography. It also discusses recent advancements that have improved the security and usefulness of these algorithms.
APA, Harvard, Vancouver, ISO, and other styles
7

Chauhan, Sonam, Shipra Srivastava, Ramveer Singh, Ajay Sharma, and Deo Brat Ojha. "Quantum Cryptography." In Applications and Principles of Quantum Computing. IGI Global, 2024. http://dx.doi.org/10.4018/979-8-3693-1168-4.ch019.

Full text
Abstract:
The world in which we live is heavily reliant on digital communications. Traditional communication methodologies have been replaced with digital communications methods such as e-mail, instant messages, social media, and many more. Every day, terabytes of data are generated and shared around the world. Securing data stored and shared across these networks have evolved into a thriving discipline. Cryptography is an excellent way to secure terabytes of data. The core of cryptography is to transform data into unreadable format. With the introduction of quantum systems, it has been proved that many traditional cryptographic schemes are unsecure and can be broken with quantum computers. This chapter presents a brief review of pre- and post-quantum systems.
APA, Harvard, Vancouver, ISO, and other styles
8

Gundu, Srinivasa Rao, Charan Arur Panem, and Naveen Chaudhary. "Quantum Cryptography for Secured IoT Devices." In Advances in Information Security, Privacy, and Ethics. IGI Global, 2024. http://dx.doi.org/10.4018/979-8-3693-5961-7.ch007.

Full text
Abstract:
The Internet of Things (IoT) is revolutionizing the industrial revolution by connecting objects through communication protocols and sensors. However, the integration of these networks with the traditional Internet poses potential risks. Researchers are developing post-quantum cryptography (PQC) to address these issues. Quantum computing, including entanglement trading and the no-cloning theorem, is essential for creating safe cryptocurrencies. Pre-quantum security solutions for IoT applications should prioritize quantum-safe encryption. Traditional cryptosystems are at risk due to quantum computing's resource-constrained nature. Quantum entanglement allows for odd correlations between states, leading to new protocols for applications like quantum teleportation, superdense coding, and cryptography. The no-cloning theorem is the foundation for various quantum technologies.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Pre-quantum and post-quantum"

1

Shi, Xihang, Ron Ruimy, Amnon Balanov, and Ido Kaminer. "Electron-Heralded Quantum X-ray Source." In CLEO: Fundamental Science. Optica Publishing Group, 2024. http://dx.doi.org/10.1364/cleo_fs.2024.fm4b.5.

Full text
Abstract:
We present a concept for creating quantum X-ray radiation heralded by free electrons, showing conditions for squeezed vacuum and Schrodinger cat states of X-rays, created by post-selected pre-bunched electrons.
APA, Harvard, Vancouver, ISO, and other styles
2

Joshi, Sandeep, Amit Kumar Bairwa, Anton Pavlovich Pljonkin, Pradumn Garg, and Kshitij Agrawal. "From Pre-Quantum to Post-Quantum RSA." In NISS 2023: The 6th International Conference on Networking, Intelligent Systems & Security. ACM, 2023. http://dx.doi.org/10.1145/3607720.3607721.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Chantasri, A., J. Dressel, and A. N. Jordan. "Stochastic Path Integral for Pre-/Post-selected Continuous Quantum Measurement." In Quantum Information and Measurement. OSA, 2013. http://dx.doi.org/10.1364/qim.2013.w6.43.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

You, C., T. Gerrits, P. Bierhorst, et al. "Multiphoton quantum metrology without pre-and post-selected measurements." In Frontiers in Optics. OSA, 2019. http://dx.doi.org/10.1364/fio.2019.fw6b.1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ali, Arshad. "A Pragmatic Analysis of Pre- and Post-Quantum Cyber Security Scenarios." In 2021 International Bhurban Conference on Applied Sciences and Technologies (IBCAST). IEEE, 2021. http://dx.doi.org/10.1109/ibcast51254.2021.9393278.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Raya, Ali, and K. Mariyappn. "Diffie-Hellman Instantiations in Pre- and Post- Quantum World: A Review Paper." In 2020 Fifth International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN). IEEE, 2020. http://dx.doi.org/10.1109/icrcicn50933.2020.9296172.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Tollaksen, Jeff. "Pre and post-selection, weak measurements and the flow of time in quantum mechanics." In ADVANCES IN QUANTUM THEORY: Proceedings of the International Conference on Advances in Quantum Theory. AIP, 2011. http://dx.doi.org/10.1063/1.3567447.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Prantl, Thomas, Dominik Prantl, Andre Bauer, et al. "Benchmarking of Pre- and Post-Quantum Group Encryption Schemes with Focus on IoT." In 2021 IEEE International Performance, Computing, and Communications Conference (IPCCC). IEEE, 2021. http://dx.doi.org/10.1109/ipccc51483.2021.9679365.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Shafiee, Ashkan, Elham Ghadiri, Muhamad Mat Salleh, and Muhammad Yahaya. "Inkjet Printed Hybrid Organic-Quantum Dots Solar Cells: Effects of Pre- And Post-Printing Activities." In 2018 International Flexible Electronics Technology Conference (IFETC). IEEE, 2018. http://dx.doi.org/10.1109/ifetc.2018.8584008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sarkar, Ankita, and Mansi Jhamb. "Experimental Perspectives of Post and Pre Quantum Cryptographic Algorithm for Cyber Physical Systems in IoT." In 2023 10th IEEE Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering (UPCON). IEEE, 2023. http://dx.doi.org/10.1109/upcon59197.2023.10434849.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!