Results 11 to 20 of about 1,726,359 (308)
Quantum key distribution with 2-bit quantum codes
We propose a prepare-and-measure scheme for quantum key distribution with 2-bit quantum codes. The protocol is unconditionally secure under whatever type of intercept-and-resend attack. Given the symmetric and independent errors to the transmitted qubits,
A. M. Steane +5 more
core +2 more sources
Key Stage Three English : the scary bits
Sirve de puente entre primaria y secundaria y explica a los niños conceptos gramaticales y, también, signos de puntuación, así como, ortografía, y una base para el desarrollo de habilidades en la escritura y la lectura. Igualmente, les proporciona ejercicios prácticos de escritura y comprensión lectora. Va dirigido a alumnos de once a catorce años, que
Csáky, Taissa +2 more
openaire +3 more sources
Highlights A systematic summary of current research trends in the development of transition metal disulfides (TMDs) electromagnetic wave (EMW) absorption materials.
Junye Cheng +12 more
doaj +1 more source
Bit Flipping Key Encapsulation for the Post-Quantum Era
It is a matter of time before quantum computers will break the cryptosystems like RSA and ECC underpinning today’s internet protocols. As Post-Quantum Cryptography (PQC) is a low-cost approach compared to others like quantum key distribution, the ...
Mohammad Reza Nosouhi +3 more
doaj +1 more source
An Overhead-Reduced Key Coding Technique for High-Speed Serial Interface
This paper describes a packet-based overhead-reduced (OR) key coding technique for a high-speed serial interface. The 8B10B code is a de facto standard coding technique in the application but its bit-overhead is 25%.
Jaepil Bak +3 more
doaj +1 more source
MEMS Enabled Miniature Two-Photon Microscopy for Biomedical Imaging
Over the last decade, two-photon microscopy (TPM) has been the technique of choice for in vivo noninvasive optical brain imaging for neuroscientific study or intra-vital microendoscopic imaging for clinical diagnosis or surgical guidance because of its ...
Xiaomin Yu +4 more
doaj +1 more source
Mahonia bealei is one of the important members of the genus Mahonia and Traditional Chinese Medicine (TCM). Several compounds isolated from this plant have exhibited useful biological activities.
Mohib Ullah Kakar +9 more
doaj +1 more source
High-bit-rate continuous-variable quantum key distribution [PDF]
Here, we demonstrate that a practical Continuous Variables Quantum Key Distribution (CVQKD) protocol relying on the Gaussian modulation of coherent states features secret key rates that cannot be achieved with standard qubit Discrete Variables (DV) QKD protocols.
Jouguet, Paul +2 more
openaire +4 more sources
This work deals with decentralized optimization problems where a collection of network agents operate selfishly and individually under a set of coupling constraints among them.
Peng Wang, Suli Zou, Zhongjing Ma
doaj +1 more source
PERBANDINGAN APLIKASI MENGGUNAKAN METODE CAMELLIA 128 BIT KEY DAN 256 BIT KEY
The rapid development of the Internet today to easily exchange data. This leads to high levels of risk in the data piracy. One of the ways to secure data is using cryptography camellia. Camellia is known as a method that has the encryption and decryption time is fast.
Santoso, Leo Willyanto +2 more
openaire +3 more sources

