Quantum Cryptography or Quantum key distribution (QKD) is a technique that allows the secure distribution of a bit string, used as key in cryptographic protocols. When it was noted that quantum computers could break public key cryptosystems based on number theory extensive studies have been undertaken on QKD. Based on quantum mechanics, QKD offers… (More)
Unlike classical cryptography which is based on mathematical functions, Quantum Cryptography or Quantum Key Distribution (QKD) exploits the laws of quantum physics to offer unconditionally secure communication. The progress of research in this field allows the anticipation of QKD to be available outside of laboratories within the next few years and efforts… (More)
Quantum Key Distribution (QKD) or quantum cryptography has been developed within the last decade; it is proved that QKD is secure against computer attacks and it is considered as a promising solution towards absolute security within long-term cryptosystems. Currently, research efforts are required to make strongly secure the existing communication… (More)
—Most cryptographic mechanisms, such as symmetric and asymmetric cryptography, often involve the use of cryptographic keys. However, all cryptographic techniques will be ineffective if the key distribution mechanism is weak. The security of most modern cryptographic systems of key distribution mechanism is based on computational complexity and the… (More)
For measuring complex industrial objects using vision metrology systems, automatic optimum network design is a real challenge. In the absence of given or simulated 3D CAD models of the objects and the workspace, the complexity of objects introduces several uncertainty factors into the camera placement decision making process. These uncertainty factors… (More)
Recently, Farhi showed that every natural number N ≡ 2 (mod 24) can be written as the sum of three numbers of the form n 2 3 (n ∈ N). He conjectured that this result remains true even if N ≡ 2 (mod 24). In this note, we prove this statement.
— Using watermarking techniques to embed the Electronics Patient Records (EPR) data in the medical images improves the confidentiality of the patient data. However, this technique has some limitations if it is used alone; it will not be efficient in term of patient data security which is a primordial goal. In this paper, we will introduce a new mechanism to… (More)