Continuous-variable quantum cryptography using two-way quantum communication
FREE-DOWNLOADS Pirandola, S Mancini, S Lloyd… – Nature Physics, 2008 Quantum cryptography has recently been extended to continuous-variable systems, such as the bosonic modes of the electromagnetic field possessing continuous degrees of freedom. In particular, several cryptographic protocols have been proposed and experimentally
Exploiting the power of GPUs for asymmetric cryptography
FREE-DOWNLOADR Szerwinski… – Cryptographic Hardware and Embedded …, Abstract. Modern Graphics Processing Units (GPU) have reached a dimension with respect to performance and gate count exceeding conven- tional Central Processing Units (CPU) by far. Many modern computer systems include – beside a CPU – such a powerful GPU
Leakage resilient public-key cryptography in the bounded-retrieval model
FREE-DOWNLOAD J Alwen, Y Dodis… – Advances in Cryptology-CRYPTO Abstract. We study the design of cryptographic primitives resilient to key- leakage attacks, where an attacker can repeatedly and adaptively learn informa- tion about the secret key, subject only to the constraint that the overall amount of such information is bounded by some