D Lou, A He, M Redding, M Geitz, R Toth… - IEEE …, 2022 - ieeexplore.ieee.org
Quantum permutation pad or QPP is a set of quantum permutation gates. QPP has been demonstrated for quantum secure encryption in both classical and quantum computing …
A Wilke, D Fabian, I Komarov - US Patent 11,664,972, 2023 - Google Patents
H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or …
A Kipnis - US Patent 11,405,366, 2022 - Google Patents
A method for collecting data from a group of entitled members. The method may include receiving, by a collection unit, a message and a message signature; validating, by the …
C Ciobanu, A Tanase - US Patent 11,469,996, 2022 - Google Patents
In implementations of systems for session-based routing, a computing device implements a routing system to receive session data describing a session ID as a character sequence …
J Schrage - US Patent 11,909,859, 2024 - Google Patents
Access to blockchain data may be removed by deleting an encryption key held in a remote server. Incoming data is stored in the blockchain after being encrypted at the key server. An …
A Krishnamoorthy, B Ruvaitha - US Patent App. 16/772,080, 2020 - Google Patents
Embodiments disclosed herein relate to methods and apparatus for determining whether a wireless device should perform validation of one or more of a pool of un-validated …
PH Griffin, JJ Stapleton - US Patent 11,646,881, 2023 - Google Patents
Systems and methods for securely sharing and authenticating a last secret can include generating, by a cryptographic module on a first network node, a seed configured for …
JJ Stapleton - US Patent 12,200,114, 2025 - freepatentsonline.com
Systems, apparatuses, methods, and computer program products are disclosed for mobile quantum key distribution (MQKD). An example method includes establishing a first …
PH Griffin, JJ Stapleton - US Patent 11,997,201, 2024 - Google Patents
Abstract Systems and methods for securely sharing and authenticating a last secret can include generating, by a cryptographic module on a first network node, a seed configured for …