You are currently viewing a new version of our website. To view the old version click .

Cryptography, Volume 4, Issue 1

March 2020 - 10 articles

Cover Story: Graph states are a germane resource for quantum information, with applications from universal quantum computation, error correction to secret sharing, anonymous communication, quantum metrology, and more. In this work, we provide simple and effective tests of these states, which in turn can be used to verify quantum advantages in all these applications. In a future of connected quantum devices of varying size and power, these tests can already be implemented in the laboratory and pave the way for verified quantum technologies. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (10)

  • Article
  • Open Access
7 Citations
7,585 Views
31 Pages

On Quantum Chosen-Ciphertext Attacks and Learning with Errors

  • Gorjan Alagic,
  • Stacey Jeffery,
  • Maris Ozols and
  • Alexander Poremba

Large-scale quantum computing poses a major threat to classical public-key cryptography. Recently, strong “quantum access” security models have shown that numerous symmetric-key cryptosystems are also vulnerable. In this paper, we conside...

  • Article
  • Open Access
2 Citations
5,624 Views
34 Pages

We present attacks on 21-rounds of Simon 32/64, 21-rounds of Simon 48/96, 25-rounds of Simon 64/128, 35-rounds of Simon 96/144 and 43-rounds of Simon 128/256, often with direct recovery of the full master key without repeating the attack over multipl...

  • Article
  • Open Access
15 Citations
8,003 Views
20 Pages

The edge devices connected to the Internet of Things (IoT) infrastructures are increasingly susceptible to piracy. These pirated edge devices pose a serious threat to security, as an adversary can get access to the private network through these non-a...

  • Article
  • Open Access
72 Citations
13,427 Views
25 Pages

QUARC: Quantum Research Cubesat—A Constellation for Quantum Communication

  • Luca Mazzarella,
  • Christopher Lowe,
  • David Lowndes,
  • Siddarth Koduru Joshi,
  • Steve Greenland,
  • Doug McNeil,
  • Cassandra Mercury,
  • Malcolm Macdonald,
  • John Rarity and
  • Daniel Kuan Li Oi

Quantum key distribution (QKD) offers future proof security based on fundamental laws of physics. Long-distance QKD spanning regions such as the United Kingdom (UK) may employ a constellation of satellites. Small satellites, CubeSats in particular, i...

  • Article
  • Open Access
1 Citations
5,851 Views
32 Pages

New large classes of permutations over ℤ 2 n based on T-Functions as Self-Inverting Permutation Functions (SIPFs) are presented. The presented classes exhibit negligible or low complexity when implemented in emerging FPGA technologies....

  • Article
  • Open Access
25 Citations
6,959 Views
10 Pages

We present a simple protocol for certifying graph states in quantum networks using stabiliser measurements. The certification statements can easily be applied to different protocols using graph states. We see, for example, how it can be used for meas...

  • Article
  • Open Access
4 Citations
5,039 Views
10 Pages

Loophole-free violations of Bell inequalities are crucial for fundamental tests of quantum nonlocality. They are also important for future applications in quantum information processing, such as device-independent quantum key distribution. Based on a...

  • Article
  • Open Access
6 Citations
9,094 Views
22 Pages

Physical Security for Fleet Management Systems

  • Emad Hamadaqa,
  • Ayoub Mars and
  • Wael Adi

Fleet Management (FM) deals with the management of transport, distribution, and logistics of national and international goods exchange, in which many operators worldwide are involved. Fleet management involves many security-relevant participating ent...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Cryptography - ISSN 2410-387X