<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Adoui, Salah</style></author><author><style face="normal" font="default" size="100%">Benzeghli, Brahim</style></author><author><style face="normal" font="default" size="100%">Noui, Lamnouar</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">SHARING KEYS USING CIRCULANT MATRICES AND LOGISTIC MAPS THROUGH QUANTUMCHANNAL</style></title><secondary-title><style face="normal" font="default" size="100%"> Advances in Mathematics: Scientific Journal </style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2022</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">https://doi.org/10.37418/amsj.11.12.13</style></url></web-urls></urls><volume><style face="normal" font="default" size="100%">11</style></volume><pages><style face="normal" font="default" size="100%">1361–1378</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Toensureconfidentialityandavoidhumainattacksagainstourdata, we exchange encryption and decryption keys. In our proposal scheme, we use the commutative properties of the product of circular matrices to create a com monencryptionkeybyapplyingtheprotocolof Diffie-Hellmanexchangethrough a classic channel. To raise the security level of our system we have introduced the sensibility of chaotic logistic maps in another exchange protocol which is the BB84throuth a quantum channal.</style></abstract><issue><style face="normal" font="default" size="100%">12</style></issue></record></records></xml>