ENSURING THE SECURITY OF QUANTUM SYSTEMS: ALGORITHMS AND METHODS

dc.contributor.authorSaidakhmedov Eldor Islomovich
dc.contributor.authorQahhorova Nargiza Xayit qizi
dc.contributor.authorToshtemirova Sarvara To’lqin qizi
dc.date.accessioned2025-12-29T13:41:58Z
dc.date.issued2025-02-25
dc.description.abstractThis article reviews the main algorithms and methods aimed at ensuring the security of quantum systems. The article provides detailed information about important technologies such as quantum cryptography, post-quantum cryptography, and quantum error correction. Algorithms such as Quantum Key Distribution (QKD), Lattice-based cryptography, Hash-based signatures, and Surface Codes are used to ensure the security of quantum systems. These algorithms ensure the confidentiality, integrity, and availability of information. The article covers the latest achievements in the field of quantum system security and emphasizes the importance of research and development in this area. Along with the development of quantum technologies, algorithms for ensuring their security are also constantly being improved. This article is a useful resource for those interested in the fields of information security, cryptography, and quantum computing.
dc.formatapplication/pdf
dc.identifier.urihttps://webofjournals.com/index.php/12/article/view/3405
dc.identifier.urihttps://asianeducationindex.com/handle/123456789/20543
dc.language.isoeng
dc.publisherWeb of Journals Publishing
dc.relationhttps://webofjournals.com/index.php/12/article/view/3405/3363
dc.rightshttps://creativecommons.org/licenses/by-nc-nd/4.0
dc.sourceWeb of Scientists and Scholars: Journal of Multidisciplinary Research; Vol. 3 No. 2 (2025): WOSS; 287-289
dc.source2938-3811
dc.subjectQuantum systems, quantum security, quantum encryption (Quantum Cryptography), quantum key distribution (QKD), post-quantum cryptography (Post-Quantum Cryptography), Lattice-based cryptography, Hash-based signatures, quantum error correction (Quantum Error Correction), Surface Codes, Cryptographic algorithms, Information security.
dc.titleENSURING THE SECURITY OF QUANTUM SYSTEMS: ALGORITHMS AND METHODS
dc.typeinfo:eu-repo/semantics/article
dc.typeinfo:eu-repo/semantics/publishedVersion
dc.typePeer-reviewed Article

item.page.files

item.page.filesection.original.bundle

pagination.showing.labelpagination.showing.detail
loading.default
thumbnail.default.alt
item.page.filesection.name
islomovich_2025_ensuring_the_security_of_quantum_systems.pdf
item.page.filesection.size
219.56 KB
item.page.filesection.format
Adobe Portable Document Format

item.page.collections