R Kuang, M Perepechaenko - EPJ Quantum Technology, 2022 - epjqt.epj.org
Quantum permutation pad or QPP is a quantum-safe symmetric cryptographic algorithm proposed by Kuang and Bettenburg in 2020. The theoretical foundation of QPP leverages …
R Kuang, M Barbeau - Quantum Information Processing, 2022 - Springer
Classical cryptographic techniques are currently under the growing quantum computing threat. New techniques that quantum computing algorithms cannot break are urgently …
M Perepechaenko, R Kuang - EPJ Quantum Technology, 2023 - epjqt.epj.org
We present an implementation of Kuang and Bettenburg's Quantum Permutation Pad (QPP) used to encrypt superposition states. The project was conducted on currently available IBM …
R Kuang, M Perepechaenko - J. Commun, 2022 - pdfs.semanticscholar.org
We present a functioning implementation of Kuang et al.'s Quantum Permutation Pad (QPP) using the Qiskit developmental kit on the currently available International Business …
D Lou, A He, M Redding, M Geitz, R Toth… - IEEE …, 2022 - ieeexplore.ieee.org
Quantum permutation pad or QPP is a set of quantum permutation gates. QPP has been demonstrated for quantum secure encryption in both classical and quantum computing …
R Kuang, A Chan - EPJ Quantum Technology, 2023 - epjqt.epj.org
In photonic computing, the quantum systems consist of coherent states and squeezed coherent states. Common quantum gates found in these systems are: phase shift …
Optical layer attacks on optical fiber communication networks are one of the weakest reinforced areas of the network, allowing attackers to overcome security software or firewalls …
E Pelofske - IEEE Transactions on Information Forensics and …, 2024 - ieeexplore.ieee.org
Quantum devices offer a highly useful function-that is generating random numbers in a non- deterministic way since the measurement of a quantum state is not deterministic. This means …
A Chan, M Khalil, KA Shahriar, LR Chen… - … on computer and …, 2021 - ieeexplore.ieee.org
Twin-field quantum key distribution (TF-QKD) has recently attracted attention for its ability to overcome the fundamental limits of secret key rate for point-to-point connectivity without …