Skip to main content
Quantum Cryptography (QKD) uses the laws of Quantum Mechanics to create new cryptographic primitives. Precisely, this technique is based on two laws of quantum mechanics, namely uncertainty principle and no-cloning theorem. The best known... more
    • by 
This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY
    • by 
In the last few years, the evolution of new Information and Communication Technologies (ICT) and networks has enabled the appearance and development of several platforms and tools that serve to operate and distribute the learning content.... more
    • by 
    •   2  
      Computer ScienceFuture Internet
Quantum Cryptography (QKD) uses the laws of Quantum Mechanics to create new cryptographic primitives. Precisely, this technique is based on two laws of quantum mechanics, namely uncertainty principle and no-cloning theorem. The best known... more
    • by 
    •   5  
      Computer ScienceCryptographyQuantum CryptographyQuantum Key Distribution
Encryption is critical method to give secrecy while transmitting information over Internet. There are many methods used for encrypting and decrypting text message, image or other important data. This paper deals with a new hybrid... more
    • by 
This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY
    • by 
In this paper a statistical analysis of common qubits(photon) transmitted by Alice and received by Bob in the same basis using BB84 protocol with and without the presence of eavesdroppers are studied. The simulation used here is based on... more
    • by 
    •   2  
      Computer ScienceBb
In this paper, we will study the influence of spies rate measure on the quantum transmission by using the entropy measures and java simulation. The quantum transmission adopted here is the BB84 protocol (Charles Bennett and Gilles... more
    • by 
    •   2  
      Computer ScienceBb