About 8,260 results
Open links in new tab
  1. This document, produced by the Quantum Internet Research Group (QIRG), introduces quantum networks and presents general guidelines for the design and construction of such networks. Overall, …

  2. RFC 8774: The Quantum Bug - Internet Engineering Task Force

    Apr 1, 2020 · With the help of entanglement, implemented in quantum repeaters, quantum networks can transfer information faster than ever before: a state can be transmitted over a long distance instantly, …

  3. www.ietf.org

    "Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems", Physical Review A, American Physical Society, DOI …

  4. RFC 9340: Architectural Principles for a Quantum Internet

    The vision of a quantum internet is to enhance existing Internet technology by enabling quantum communication between any two points on Earth. To achieve this goal, a quantum network stack …

  5. Many others will fail in interesting ways; we coin the term "Quantum Bug" for such failures. In the following section, we will discuss some examples of Quantum Bugs.

  6. This extension makes use of external PSKs to improve resilience against attackers that gain access to a large-scale quantum computer in the future. This extension is always accompanied by the …

  7. RFC 8708: Use of the HSS/LMS Hash-Based Signature Algorithm in …

    Recent advances in cryptanalysis [BH2013] and progress in the development of quantum computers [NAS2019] pose a threat to widely deployed digital signature algorithms.

  8. RFC 9771: Properties of Authenticated Encryption with Associated Data ...

    Most symmetric cryptographic algorithms that are secure in the classical model provide quantum security in the Q1 model, i.e., they are post-quantum secure. Security in the Q1 setting corresponds …

  9. The idea behind this document is that while a quantum computer can easily reconstruct the shared secret of an (EC)DH exchange, it cannot as easily recover a secret from a symmetric exchange.

  10. RFC 9629: Using Key Encapsulation Mechanism (KEM) Algorithms in the ...

    In recent years, cryptographers have been specifying Key Encapsulation Mechanism (KEM) algorithms, including quantum-secure KEM algorithms. This document defines conventions for the use of KEM …