Modeling One-way and Two-way quantum key distribution protocols

AM Sofy, M Shalaby, HM Dahshan… - 2019 Ninth …, 2019 - ieeexplore.ieee.org
The present cryptography systems security depends on the hardness of factorizing an
integer number with a large number of digits to its prime integer factors. In 1994, Peter Shor …

[PDF][PDF] A Highly Secure Secret Key Encryption Methodology Using Dual Permutation

R Chowdhury, S Ghosh, A Das, SK Bandyopadhyay - academia.edu
This paper describes a novel secret key cryptography algorithm where a dual encryption
methodology has been incorporated. The first level is a block level encryption, where the …