Zobrazeno 1 - 6
of 6
pro vyhledávání: '"Olaf Grote"'
Publikováno v:
Sensors, Vol 24, Iss 14, p 4474 (2024)
Quantum mechanical phenomena are revolutionizing classical engineering fields such as signal processing or cryptography. When randomness plays an important role, like in cryptography where random bit sequences guarantee certain levels of security, qu
Externí odkaz:
https://doaj.org/article/78129a1bcb1b47acbd185721d81755cc
Autor:
Olaf Grote, Andreas Ahrens
Publikováno v:
Electrical, Control and Communication Engineering, ISSN 2255-9159, 2023-01-19, Vol. 18, No. 1
The Quantum Key Distribution (QKD) is a well-researched secure communication method for exchanging cryptographic keys only known by the shared participants. The vulnerable problem of a secret key distribution is the negotiation and the transfer over
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::08bfd8e8fe3a3b800f4f354cbe380c31
https://oa.upm.es/72432/
https://oa.upm.es/72432/
Publikováno v:
International Conference on Engineering and Emerging Technologies (ICEET) | 2021 International Conference on Engineering and Emerging Technologies (ICEET) | 27-28 Oct 2021 | Istanbul, Turkey
Cloud services will have a high priority in IT and parts of digitisation in the following years. Furthermore, other areas such as medicine, agriculture, Industry 4.0 use cloud services for collecting, processing, and primarily storing data and combin
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::74a0bf88240b5eeacac899f492bd598c
https://oa.upm.es/72436/
https://oa.upm.es/72436/
Publikováno v:
2021 IEEE Microwave Theory and Techniques in Wireless Communications (MTTW) | 2021 IEEE Microwave Theory and Techniques in Wireless Communications (MTTW) | 7-8 Oct 2021 | Riga, Latvia
We present a simulation approach to creating a symmetric key material with a Quantum Key Distribution (QKD) protocol. We also give an applied cryptographic purpose to realise quantum cryptography with standard programs. The QKD methodology guarantees
Publikováno v:
Proceedings of the 9th International Conference on Pervasive and Embedded Computing and Communication Systems (PECCS 2019) | Proceedings of the 9th International Conference on Pervasive and Embedded Computing and Communication Systems, PECCS 2019, Vienna, Austria, September 19-20, 2019 | 19 Seb-20 Seb 2019 | Vienna, Austria
PECCS
Scopus-Elsevier
PECCS
Scopus-Elsevier
Current security protocols use cryptographic methods based on asymmetric and symmetric schemes. These are used for encrypted communication of information or for general data encryption. The security of these methods is based on well researched method
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e75b4ece594bf4995627fdc1f455d10a
https://oa.upm.es/72437/
https://oa.upm.es/72437/
Publikováno v:
2019 International Interdisciplinary PhD Workshop (IIPhDW) | 2019 International Interdisciplinary PhD Workshop (IIPhDW) | 15-17 May 2019 | Wismar, Germany
The established cryptographic asymmetric methods are not prepared for possible attacks by a quantum computer and quantum algorithm. The challenge is to define new cryptographic primitives, quantum computer resistant security protocols and processes.