Tag: cryptography

43 Is it possible for an encryption method to exist which is impossible to crack, even using quantum computers? 2018-03-12T17:12:07.927

21 Is quantum cryptography safer than classical cryptography? 2018-06-14T16:48:47.380

18 Quantum Bitcoin Subdivision 2018-03-25T16:29:37.420

17 How is quantum cryptography different from cryptography used nowadays? 2018-03-12T17:21:33.720

16 Advantage of quantum key distribution over post-quantum cryptography 2018-03-15T19:10:27.307

15 Blind quantum computing — generic structure variable selection 2018-03-12T20:32:49.977

15 Does quantum computing threaten blockchain? 2018-04-11T10:37:54.783

11 Are there any encryption suites which can be cracked by classical computers but not quantum computers? 2018-03-15T15:12:04.687

11 Rigorous security proof for Wiesner's quantum money 2018-03-29T07:16:45.100

11 How many bits do Alice and Bob needs to compare to make sure the channel is secure in BB84? 2018-09-09T16:52:00.597

10 Can we speed up the Grover's Algorithm by running parallel processes? 2018-10-24T20:06:08.157

10 Density matrix after measurement on density matrix 2018-11-30T17:55:57.293

9 Time Entangled Quantum Blockchain 2018-06-16T21:50:42.390

9 How to justify post quantum encryption security? 2018-06-29T01:55:06.777

9 Quantum attack on hash functions 2018-10-25T14:48:49.033

8 Do we have to trust the bank in "Quantum Money from Hidden Subspaces?" 2018-07-13T02:59:55.450

7 How would Blockchain technologies change to survive a post-quantum world? 2018-03-28T08:15:48.983

7 How can we reliably know if a key size is still safe to use as new quantum computers are created? 2018-03-30T04:48:01.183

7 Quantum computing and blockchain technology 2018-04-21T06:05:36.383

7 Can quantum money be reliably "burned?" 2018-07-03T01:54:26.753

7 Are non-secret-based quantum money mini-schemes susceptable to Jogenfors' "reuse attack?" 2018-07-24T00:11:30.247

7 What are the thermodynamic limits of Shor's algorithm 2020-05-27T03:18:58.150

6 BB84 Protocol Alice Choice to Bob 2018-05-28T16:16:56.387

6 What classical public key cryptography protocols exist for which hacking is QMA complete or QMA hard? 2018-06-29T04:59:42.687

6 What measures can be taken against attacks on cryptosystems by quantum computers other than just classifying research? 2018-06-30T20:30:23.520

6 Lattice based cryptography vs BB84 2018-10-07T14:25:43.680

6 Calculating power of a quantum computer --- RSA 2019-06-17T18:01:36.700

6 Could quantum computers be useful for sending encrypted information over a classical channel? 2020-01-02T15:49:34.337

5 Will post quantum crypto come soon enough? 2018-03-28T05:59:41.467

5 Quantum teleportation of a state, from one of two bases 2019-03-27T01:47:09.047

5 Grover's algorithm – DES circuit as oracle? 2019-04-13T16:17:25.000

4 'Rectilinear' and 'Diagonal' Basis in BB84 Protocol 2018-05-16T17:42:16.183

4 How many qubits does it take to break a 10 characters password? 2018-10-02T06:15:37.470

4 BB84 attack with entangled qubits example 2018-10-29T16:21:40.073

4 What does teleportation have to do w/ XOR linked lists? 2018-12-18T01:42:10.423

4 Grover's algorithm: number of searches required to find a key 2019-04-01T09:19:58.050

4 Does a 5-partite state with these entanglement properties exist? 2019-05-08T19:25:41.147

4 What is the difference between intercept-resend attack and measure-resend attack? 2019-11-25T06:05:15.473

4 What authentication protocol to use for BB84 and other QKD protocols? 2019-12-01T15:13:51.730

4 In the BB84 protocol, for what error thresholds can Alice and Bob not establish secure bits? 2020-04-30T16:47:50.447

4 Is Quantum Computing a problem for Cryptography? 2020-05-03T16:56:48.933

4 Is the BB84 protocol an example of "quantum supremacy"? 2020-05-22T20:05:02.517

4 Energy cost of quantum computation 2020-07-07T19:08:53.403

4 (Why) does unconditionally secure multi-party quantum computation imply quantum bit commitment? 2020-11-03T13:39:19.027

3 How are nonlocal games used in device-independent quantum cryptography? 2018-12-05T21:12:26.920

3 Reversible crypto systems for use in the Grover's algorithm 2019-04-17T09:13:49.057

3 GHZ - measuring particles 2019-06-15T07:59:54.060

3 Secret sharing though quantum operations 2019-11-05T13:33:28.177

3 Theoretical obstacles for a BZK-like quantum algorithm instantiated with a subroutine operates at small block size? 2021-01-28T12:28:24.637

3 How is it possible for Quantum computers to handle encryption if their states are unstable? 2021-02-10T01:43:50.427

2 Lesser qubit computer doing the parts of Shor's against e.g., RSA-2048 sized prime 2018-11-15T18:17:52.730

2 BB84 protocol over LiFi 2018-11-28T15:12:27.340

2 What is the difference between quantum key distribution and quantum key exchange? 2019-01-24T13:54:47.703

2 Consequences of Grover's algorithm 2019-03-29T16:06:52.477

2 Easiest hash function to implement on Qiskit 2020-02-04T18:30:40.720

2 How does a rectilinear filter used for QKD-BB84 detect both horizontal and vertical polarizations? 2020-03-10T21:14:56.693

2 Do we already know some problems, that would be hard to solve for quantum computers, and use them in cryptography? 2020-05-07T20:41:42.923

2 Hadamard gate with two inputs in the circuit for the BB84 protocol? 2020-05-27T08:48:15.477

2 Any good resources for learning about quantum networks and how to do a simulation of BB84 protocol? 2020-08-15T14:34:55.893

2 How exactly does Grovers algorithm "crack" symmetric key encryption? 2020-10-16T13:56:39.450

2 Non-ideal bit commitment and coin tossing 2020-11-01T13:54:02.547

2 How are inputs during the quantum communication between Alice and Bob placed in the Galois Field? 2021-02-02T19:43:07.037

2 Where does the time complexity come from when applying Grover's algorithm to AES? 2021-02-04T02:33:23.463

2 Sources for quantum cryptography and post quantum cryptography 2021-02-27T06:06:12.760

1 How can Shor's algorithm be used to crack 32 bit RSA Encryption? 2018-10-12T14:08:50.037

1 Comprehension questions on quantum cryptography especially BB84 2018-11-20T16:39:18.090

1 How to encode a qubit in standard basis? 2018-11-21T09:21:01.870

1 Clarifying Mosca's Inquality Theorem - parallel vs additive 2019-08-02T18:48:46.533

1 Renting quantum on the cloud: data privacy, adoption and error correction 2019-11-20T14:38:45.667

1 In the BICONF information reconciliation protocol for QKD: should I also run BINARY on the complementary bits subset? 2020-01-07T17:07:24.343

1 Show that if $b'$ and $b$ are uncorrelated, then $a'$ and $a$ are uncorrelated 2020-02-10T01:46:07.230

1 What is the quantum state transmitted to Bob in BB84 protocol? 2020-02-28T16:12:57.247

1 Like blockchains, other than the few quantum algorithms available out there, are quantum computers/algorithms a solution looking for a problem? 2020-03-12T15:58:35.200

1 How to deal with noise in BB84 protocol? 2020-03-20T10:57:29.117

1 Why Alice and Bob don't get the same result when they measure in the same basis? 2020-04-02T19:22:25.443

1 Tips on quantum cryptography? 2020-07-03T03:19:55.920

0 Grover's algorithm and RSA from Nielsen 2019-04-30T15:52:48.750

0 Is it a good idea to publish a research paper about the simulation of BB84 protocol? 2020-06-01T08:51:20.760

0 Is there a notion of “computational security” in quantum cryptography? 2020-07-07T14:24:43.960

-3 Do quantum computers have any security risks associated with them? 2021-01-08T12:07:21.427

-3 Can I have access to break my Windows BitLocker key 2021-02-27T10:42:09.393