Filter resources
-
Whitepaper
Ensuring Long-Term-Secure Government and Medical Communications with QKD
Toshiba QKD technology has recently been deployed to protect critical confidential data in hospitals and government ministries in Austria.
-
Whitepaper
Quantum Cryptography: a New Age in Data Security
Today’s security challenges and tomorrow’s security fears are driving the adoption of reliable quantum cryptography solutions and services to enable better data security in a quantum age. Dr Andrew Shields contributes to this December 2018 edition of Scientific Computing World with an article examining the importance of technologies like QKD to the future of data security, and methods for putting quantum cryptography into practice.
Article Carousel
Resources
Global-Scale Information-Theoretic Secure Communication using QKD and Distributed Secure Key Establishment
Toshiba researchers have demonstrated a new network architecture for global-scale information-theoretic secure communication, combining QKD and Distributed Symmetric Key Establishment (DSKE), including the extension of draft emerging standards for vendor-interoperable quantum key relay (ETSI 020).
Whitepaper
Hungary’s First Multi-Link Quantum Key Distribution Network
Toshiba has worked with Magyar Telekom and other partners to deploy Hungary's first multi-node QKD network, paving the way for further implementations across Europe as part of the EuroQCI initiative.
Whitepaper
Defence-in-Depth Solutions Today for a Quantum-Safe Tomorrow
QKD and PQC are the two main technologies for protecting against quantum-based attacks. Learn how they can be combined to provide defence-in-depth for communications networks.
Datasheet
Toshiba QKD and Single Quantum SNSPD system datasheet
Latest product features and specifications for the Toshiba QKD and Single Quantum SNSPD system.
Case study
Building Europe’s largest and most complex quantum network with scalable QKD technology and software-defined networking
The sheer power of quantum computing opens up a world of possibilities, especially when compared to the abilities of classical computing, but it comes with great risks. Current methods used…
Latest research
×
To access this document please complete the form below: