IEEE Organizations related to Quantum Cryptography

Back to Top

No organizations are currently tagged "Quantum Cryptography"



Conferences related to Quantum Cryptography

Back to Top

2020 Optical Fiber Communications Conference and Exhibition (OFC)

The Optical Fiber Communication Conference and Exhibition (OFC) is the largest global conference and exhibition for optical communications and networking professionals. For over 40 years, OFC has drawn attendees from all corners of the globe to meet and greet, teach and learn, make connections and move business forward.OFC attracts the biggest names in the field, offers key networking and partnering opportunities, and provides insights and inspiration on the major trends and technology advances affecting the industry. From technical presentations to the latest market trends and predictions, OFC is a one-stop-shop.


2019 Conference on Lasers and Electro-Optics Europe & European Quantum Electronics Conference (CLEO/Europe-EQEC)

CLEO®/Europe will showcase the latest developments in a wide range of laser and photonics areas including laser source development, materials, ultrafast science, fibre optics, nonlinear optics, terahertz sources, high-field physics, optical telecommunications, nanophotonics, biophotonics.EQEC will feature the fundamentals of quantum optics, quantum information, atom optics, ultrafast optics, nonlinear phenomena and self-organization, plasmonics and metamaterials, fundamental nanooptics, theoretical and computational photonics.


2019 IEEE 19th International Conference on Nanotechnology (IEEE-NANO)

DNA Nanotechnology Micro-to-nano-scale Bridging Nanobiology and Nanomedicine Nanoelectronics Nanomanufacturing and Nanofabrication Nano Robotics and Automation Nanomaterials Nano-optics, Nano-optoelectronics and Nanophotonics Nanofluidics Nanomagnetics Nano/Molecular Heat Transfer & Energy Conversion Nanoscale Communication and Networks Nano/Molecular Sensors, Actuators and Systems


2019 IEEE 49th International Symposium on Multiple-Valued Logic (ISMVL)

Multiple-Valued Logic has many aspects. This yearly event attracts researchers in this area.

  • 2018 IEEE 48th International Symposium on Multiple-Valued Logic (ISMVL)

    The Conference will bring together researchers from computer science, engineering, mathematics, and further disciplines to discuss new developments and directions for future research in the area of multi-valued logic and related fields. Research papers, surveys, or tutorial papers on any subject in these areas are within the scope of the symposium.

  • 2017 IEEE 47th International Symposium on Multiple-Valued Logic (ISMVL)

    The symposium encompasses all aspects of multiple-valued logic and application.

  • 2016 IEEE 46th International Symposium on Multiple-Valued Logic (ISMVL)

    Multiple-valued logic (MVL) is the study of circuits, oftware, architectures, and systems in which information is carried by more than two values, or where information is presented in unconventional, i.e., non-binary-weighted ways. The scope of ISMVL covers a broad range of related topics, including fundamental algebra, theory and philosophy, logic synthesis, decision diagrams, reversible computing, quantum computing, microelectronic circuits, testing andverification, architectures, and modelling of novel devices, all within a multiple-valued framework.

  • 2015 IEEE International Symposium on Multiple-Valued Logic (ISMVL)

    Multiple-valued logic (MVL) is the study of circuits, software, architectures, and systems in which information is carried by more than two values, or where information is represented in unconventional, i.e., non-binary-weighted ways. The scope of ISMVL covers a broad range of related topics, including fundamental algebra, theory and philosophy, logic synthesis, decision diagrams, reversible computing, quantum computing, microelectronic circuits, testing and verification, architectures, and modelling of novel devices, all within a multiple-valued framework.

  • 2014 IEEE 44th International Symposium on Multiple-Valued Logic (ISMVL)

    The aim of the conference is to present and disseminate knowledge in the areas related to multiple-valued logic, that is, to computing that is tolerant of imprecision, uncertainty, partial truth, and approximative reasoning. Specific topics include (but are not limited to):- Algebra and Formal Aspects- Automatic Test Pattern Generation- Automatic Reasoning- Boolean Satisfiability- Circuit/Device Implementation- Communication Systems- Computer Arithmetic- Data Mining- Fuzzy Systems and Soft Computing- Image Processing- Logic Design and Switching Theory- Logic Programming- Machine Learning and Robotics- Mathematical Fuzzy Logic- Nanotechnology- Philosophical Aspects- Quantum Computing- Quantum Cryptography- Reversible Computation- Signal Processing- Spectral Techniques- Verification

  • 2013 IEEE 43rd International Symposium on Multiple-Valued Logic (ISMVL)

    ISMVL is the principal annual meeting for the dissemination and discussion of research in multiple-valued logic and related areas. Topics cover all aspects of theory, implementation and application.

  • 2012 IEEE 42nd International Symposium on Multiple-Valued Logic (ISMVL)

    ISMVL is the principal annual meeting for the dissemination and discussion of research in multiple-valued logic and related areas. Topics cover all aspects of theory, implementation and application.

  • 2011 IEEE 41st International Symposium on Multiple-Valued Logic (ISMVL)

    areas of multiple-valued logic, including but not limited to: Algebra and Formal Aspects, ATPG and SAT, Automatic Reasoning, Circuit/Device Implementation, Communication Systems, Computer Arithmetic, Data Mining, Fuzzy Systems and Soft Computing, Image Processing, Logic Design and Switching Theory, Logic Programming Machine Learning and Robotics, Mathematical Fuzzy Logic, Nano Technology, Philosophical Aspects Quantum Computing, Signal Processing, Spectral Techniques, Verification.

  • 2010 40th IEEE International Symposium on Multiple-Valued Logic (ISMVL 2010)

    The Multiple-Valued Logic Technical Committee of the IEEE Computer Society will hold its 40th annual symposium on May 26-28, 2010 in Casa Convalesc ncia, Barcelona, Spain. The event is sponsored by the IEEE Computer Society, and is organized by the Artificial Intelligence Research Institute of the Spanish National Research Council (IIIA-CSIC), the University of Barcelona, the Autonomous University of Barcelona, and the University of Lleida.

  • 2009 39th IEEE International Symposium on Multiple-Valued Logic (ISMVL 2009)

    The area of multiple-valued logic is covered, including but not limited to: Algebra and Formal Aspects, Automatic Reasoning, Logic Programming, Philosophical Aspects, Fuzzy Logic and Soft Computing, Data Mining, Machine Learning and Robotics, Quantum Computing, Logic Design and Switching Theory, Test and Verification, Spectral Techniques, Circuit/Device Implementation, VLSI Architecture, VLSI Computing, System-on-Chip Technology, Nano Technology.

  • 2008 38th IEEE International Symposium on Multiple-Valued Logic (ISMVL 2008)

    The aim of ISMVL is to publish and disseminate knowledge in the field of multiple-valued logic and related areas. All aspects of MVL are considered at the symposium, ranging form algebra, formal aspects, and philosophy to logic design, verification, and circuit implementation.

  • 2007 37th IEEE International Symposium on Multiple-Valued Logic (ISMVL 2007)

  • 2006 36th IEEE International Symposium on Multiple-Valued Logic (ISMVL 2006)

  • 2005 35th IEEE International Symposium on Multiple-Valued Logic (ISMVL 2005)


2019 IEEE Photonics Conference (IPC)

The IEEE Photonics Conference, previously known as the IEEE LEOS Annual Meeting, offers technical presentations by the world’s leading scientists and engineers in the areas of lasers, optoelectronics, optical fiber networks, and associated lightwave technologies and applications. It also features compelling plenary talks on the industry’s most important issues, weekend events aimed at students and young photonics professionals, and a manufacturer’s exhibition.


More Conferences

Periodicals related to Quantum Cryptography

Back to Top

No periodicals are currently tagged "Quantum Cryptography"


Most published Xplore authors for Quantum Cryptography

Back to Top

Xplore Articles related to Quantum Cryptography

Back to Top

Security Verification of Artificial Neural Networks Used to Error Correction in Quantum Cryptography

2018 26th Telecommunications Forum (TELFOR), 2018

Error correction in quantum cryptography based on artificial neural networks is a new and promising solution. In this paper the security verification of this method is discussed and results of many simulations with different parameters are presented. The test scenarios assumed partially synchronized neural networks, typical for error rates in quantum cryptography. The results were also compared with scenarios based ...


A novel approach for secure multi-party secret sharing scheme via Quantum cryptography

2017 International Conference on Communication, Computing and Digital Systems (C-CODE), 2017

Classical secret sharing proposed by Shamir used classical computational power in classical cryptography to achieve secret key sharing, but with the advent of quantum systems, computational power can be overruled. To ensure a secure secret sharing scheme independent of computational power, a scheme independent of computational complexity is needed to achieve security. This paper will provide a protocol dependent on ...


Intercept-Resend Attack on Quantum Key Distribution Protocols with Two, Three and Four-State Systems: Comparative Analysis

2015 2nd International Conference on Information Science and Security (ICISS), 2015

The existing studies proved the importance of quantum key distribution protocols,unfortunately, most of them have been known only as theoretical models. Starting from the mathematical models, this study explores quantum alternatives to traditional key distribution protocols and involves software implementations of the quantum key distribution protocols with two, three and four-state systems. The paper presents the results obtained on case ...


Distributing energy-time entangled photon pairs in demultiplexed channels over 110 km

2015 Conference on Lasers and Electro-Optics (CLEO), 2015

We propose a novel approach to quantum cryptography using the latest demultiplexing technology to distribute photonic entanglement over a fully fibred network. We achieve unprecedented bit-rates, beyond the state of the art for similar approaches.


More efficient implementations of CASCADE information reconciliation protocol

2016 24th Signal Processing and Communication Application Conference (SIU), 2016

In this paper, we present more efficient implementations of CASCADE information reconciliation (IR) protocol, using some inherent information already available in the protocol, exactly known bits and already known parities. Our experiments have shown that our presented protocols are of higher efficiency than both all the previous CASCADE versions and several other more recently proposed IR methods.


More Xplore Articles

Educational Resources on Quantum Cryptography

Back to Top

IEEE.tv Videos

Mario Milicevic - IEEE Theodore W. Hissey Outstanding Young Professional Award, 2019 IEEE Honors Ceremony
Quantum Photonic Networks for Computing and Simulation - Plenary Speaker: Ian Walmsley - IPC 2018
Vital Cybersecurity Skills: Networking and Cryptography - Cybersecurity in a Hyperconnected World
From the Quantum Moore's Law toward Silicon Based Universal Quantum Computing - IEEE Rebooting Computing 2017
How to Think about Cryptography: Common Crypto Flaws and How to Avoid Them - IEEE SecDev 2016
Jean Camp: Calculating and Communicating Online Risk - Industry Forum Panel: WF IoT 2016
Q&A with Travis Humble: IEEE Rebooting Computing Podcast, Episode 27
Superconducting Quantum Computing in China - Applied Superconductivity Conference 2018
Taher Elgamal: Keynote Presentation: WF IoT 2016
Low-Power and Secure Lightweight Cryptography Via TFET-Based Energy Recovery Circuits: IEEE Rebooting Computing 2017
Physical Restraints on Quantum Circuits - IEEE Rebooting Computing 2017
Part 2: Workshop on Benchmarking Quantum Computational Devices and Systems - ICRC 2018
Quantum Technologies in Europe: The Quantum Flagship Initiative - Applied Superconductivity Conference 2018
An Ising Computer Based on Simulated Quantum Annealing by Path Integral Monte Carlo - IEEE Rebooting Computing 2017
Superconducting quantum computing research in Japan - Applied Superconductivity Conference 2018
Developing Our Quantum Future - ICRC 2019 Keynote
Solving Sparse Representation for Image Classification using Quantum D-Wave 2X Machine - IEEE Rebooting Computing 2017
Building a Quantum Computing Community and Ecosystem: Jerry Chow at IEEE Rebooting Computing 2017
The Prospects for Scalable Quantum Computing with Superconducting Circuits - Applied Superconductivity Conference 2018
Quantum Accelerators for High-Performance Computing Systems - IEEE Rebooting Computing 2017

IEEE-USA E-Books

  • Security Verification of Artificial Neural Networks Used to Error Correction in Quantum Cryptography

    Error correction in quantum cryptography based on artificial neural networks is a new and promising solution. In this paper the security verification of this method is discussed and results of many simulations with different parameters are presented. The test scenarios assumed partially synchronized neural networks, typical for error rates in quantum cryptography. The results were also compared with scenarios based on the neural networks with random chosen weights to show the difficulty of passive attacks.

  • A novel approach for secure multi-party secret sharing scheme via Quantum cryptography

    Classical secret sharing proposed by Shamir used classical computational power in classical cryptography to achieve secret key sharing, but with the advent of quantum systems, computational power can be overruled. To ensure a secure secret sharing scheme independent of computational power, a scheme independent of computational complexity is needed to achieve security. This paper will provide a protocol dependent on inherent secure nature of quantum cryptography (quantum no cloning theorem and quantum measurement rule). A secure multiparty quantum secret sharing scheme has been proposed to ensure that no one can eavesdrop or extract any share of the secret message via inherent security provided by quantum entanglement swapping and quantum teleportation. Entanglement swapping is a process that allows two non-interacting quantum systems to be entangled. Whereas, Quantum teleportation allows a party to send a qubit to another entangled party without sending the qubit over the channel. Moreover, in order to ensure security against possible active attacks, sender himself will generate and distribute EPR pairs to be used in the scheme. Result will be a secure multiparty QSS scheme which will be secure against internal and external eavesdropping, masquerading and brute-force attacks.

  • Intercept-Resend Attack on Quantum Key Distribution Protocols with Two, Three and Four-State Systems: Comparative Analysis

    The existing studies proved the importance of quantum key distribution protocols,unfortunately, most of them have been known only as theoretical models. Starting from the mathematical models, this study explores quantum alternatives to traditional key distribution protocols and involves software implementations of the quantum key distribution protocols with two, three and four-state systems. The paper presents the results obtained on case of the cybernetic attack simulation, type Intercept-Resend - the well known attack on quantum world, over the each protocol. Presence of the eavesdropper is determined by calculating the errors obtained at the end of transmission through quantum channel. The method Quantum Error Rate for detecting the eavesdropper can be applied to the majority key distribution systems, each system having its own acceptable error rate. Starting from the same size of input data, the paper presents an analysis of the data obtained on cybernetic attack simulations and analyzes the percentage of errors by comparison with the dimensions of the cryptographic keys obtained in the case of each protocol.

  • Distributing energy-time entangled photon pairs in demultiplexed channels over 110 km

    We propose a novel approach to quantum cryptography using the latest demultiplexing technology to distribute photonic entanglement over a fully fibred network. We achieve unprecedented bit-rates, beyond the state of the art for similar approaches.

  • More efficient implementations of CASCADE information reconciliation protocol

    In this paper, we present more efficient implementations of CASCADE information reconciliation (IR) protocol, using some inherent information already available in the protocol, exactly known bits and already known parities. Our experiments have shown that our presented protocols are of higher efficiency than both all the previous CASCADE versions and several other more recently proposed IR methods.

  • Stochastic routing in quantum cryptography communication network based on cognitive resources

    In quantum cryptography network routing selection is an important task for performing end-to-end key agreement. In the paper, we propose a stochastic routing algorithm based on distance vector and residual key bits. The main idea is that after all the shortest paths have been obtained, the communication key bits can be transmitted randomly in any path with enough residual key bits. Simulation results show that under stochastic routing algorithm a higher security level can be provided than the one under traditional routing algorithm, e.g. Routing Information Protocol (RIP), in quantum cryptography network.

  • Efficiency increasing method for quantum secure direct communication protocols

    Particularly vulnerable spot for violation of information security is a data network, since it is impossible to guarantee the data protection when transferring them through a public environment (Internet, telephone lines, radio). Therefore, the information transmitted on different networks, particularly in need of security and the main way of providing it, is using the cryptographic methods. However, recent research has shown that classical cryptography gives a cause to look for new prospects and it could be quantum cryptography. Among all possible quantum cryptography technologies, quantum secure direct communication (e.g. Ping-Pong protocol) does not use any cryptographic transformations, so there is no key distribution problem and eavesdropping can be detected during transfer, thereby improving information transmitting reliability. In this paper security amplification method for Ping-Pong protocol was proposed. This method uses generated ternary pseudorandom sequence and transformations in Galois field. Accordingly, this could increase the protocol asymptotical security and accelerate its work at least 3 times.

  • Security Analysis of Electronic Payment Protocols Based on Quantum Cryptography

    Electronic payment protocols play a vital role in electronic commerce to ensure the security of transaction process. Current electronic payment protocols based on complex mathematical problems will be vulnerable facing a quantum computer. In order to enhance the security against quantum computers, quantum cryptography is introduced into electronic payment protocols. Although the quantum cryptography is claimed to be unconditionally secure, Logical defects are still likely to cause serious problems. We introduced formal analysis to verify the security of electronic payment protocols based on quantum cryptography. Formal analysis methods can discover the vulnerabilities of protocols and help to improve the security of protocols. In this paper, we analyze an electronic payment protocol based on quantum cryptography and the result shows that the protocol is not secure even adopting unconditionally secure quantum cryptography. We found that both the accountability and fairness of the original protocol are not satisfied. Then we proposed an improved protocol to meet the requirement of accountability and fairness and verified it through formal analysis method.

  • A Novel Quantum Cryptography Protocol

    Quantum key distribution is a sub topic under quantum cryptography where two parties distribute a shared random bit string known only to them and which can be used as a key to encrypt and decrypt messages. This paper proposes a novel method of QKD to distribute the secret key. The basic concept of QKD remains the same but the process by which the key is exchanged between the two parties is different and is much more secure than the existing QKD protocols. The proposed method exploits the concept of hamming weight.

  • Quantum IoT: A Quantum Approach in IoT Security Maintenance

    Securing Internet of things is a major concern as it deals with data that are personal, needed to be reliable, can direct and manipulate device decisions in a harmful way. Also regarding data generation process is heterogeneous, data being immense in volume, complex management. Quantum Computing and Internet of Things (IoT) coined as Quantum IoT defines a concept of greater security design which harness the virtue of quantum mechanics laws in Internet of Things (IoT) security management. Also it ensures secured data storage, processing, communication, data dynamics. In this paper, an IoT security infrastructure is introduced which is a hybrid one, with an extra layer, which ensures quantum state. This state prevents any sort of harmful actions from the eavesdroppers in the communication channel and cyber side, by maintaining its state, protecting the key by quantum cryptography BB84 protocol. An adapted version is introduced specific to this IoT scenario. A classical cryptography system `One-Time pad (OTP)' is used in the hybrid management. The novelty of this paper lies with the integration of classical and quantum communication for Internet of Things (IoT) security.



Standards related to Quantum Cryptography

Back to Top

No standards are currently tagged "Quantum Cryptography"


Jobs related to Quantum Cryptography

Back to Top