Results 81 to 90 of about 23,331 (249)

Entanglement Distribution in Quantum Networks Via Swapping of Partially Entangled Pure States

open access: yesAnnalen der Physik, Volume 538, Issue 3, March 2026.
The manuscript establishes a unified theoretical framework for entanglement swapping with partially entangled pure states across diverse quantum‐network topologies. By deriving closed‐form expressions for the full output ensembles and success probabilities, we show that successive swapping operations generate a binomially distributed spectrum of ...
Henrique Guerra   +3 more
wiley   +1 more source

Protocols for Quantum Weak Coin Flipping [PDF]

open access: yesTheoretiCS
Weak coin flipping is an important cryptographic primitive$\unicode{x2013}$it is the strongest known secure two-party computation primitive that classically becomes secure only under certain assumptions (e.g.
Atul Singh Arora   +3 more
doaj   +1 more source

Materials and System Design for Self‐Decision Bioelectronic Systems

open access: yesAdvanced Materials, Volume 38, Issue 9, 12 February 2026.
This review highlights how self‐decision bioelectronic systems integrate sensing, computation, and therapy into autonomous, closed‐loop platforms that continuously monitor and treat diseases, marking a major step toward intelligent, self‐regulating healthcare technologies.
Qiankun Zeng   +9 more
wiley   +1 more source

Parallel Algorithm for Approximate State Graph Exploration With Restricted Memory Footprint

open access: yesConcurrency and Computation: Practice and Experience, Volume 38, Issue 1, January 2026.
ABSTRACT We investigate the performance of algorithms that explore large state graphs of finite state machines without input by following paths. To improve on anchor‐based and candidate‐based explorations and to avoid the performance overhead of full anchor lists and the tuning sensitivity of timeout‐based methods, we propose and analyze exploration ...
Jörg Keller, Sebastian Litzinger
wiley   +1 more source

Image encryption and decryption utilizing physical unclonable function-based key generator by Ta/WTiOx/Pt memristor array [PDF]

open access: yesAIP Advances
In this work, an encryption and decryption system utilizing physical unclonable function (PUF) characteristics of the Ta/WTiOx/Pt memristor array as hardware-level security primitive is demonstrated.
Yaoyao Jin   +10 more
doaj   +1 more source

Post-Quantum Cryptographic Hardware Primitives

open access: yesCoRR, 2019
The development and implementation of post-quantum cryptosystems have become a pressing issue in the design of secure computing systems, as general quantum computers have become more feasible in the last two years. In this work, we introduce a set of hardware post-quantum cryptographic primitives (PCPs) consisting of four frequently used security ...
Bu, Lake   +3 more
openaire   +2 more sources

Explainable AI With Imbalanced Learning Strategies for Blockchain Transaction Fraud Detection

open access: yesEngineering Reports, Volume 8, Issue 1, January 2026.
Research methodology pipeline for blockchain fraud detection. ABSTRACT Blockchain networks now support billions of dollars in daily transactions, making reliable and transparent fraud detection essential for maintaining user trust and financial stability.
Ahmed Abbas Jasim Al‐Hchaimi   +2 more
wiley   +1 more source

A Novel Identity-Based Signcryption Scheme in the Standard Model

open access: yesInformation, 2017
Identity-based signcryption is a useful cryptographic primitive that provides both authentication and confidentiality for identity-based crypto systems. It is challenging to build a secure identity-based signcryption scheme that can be proven secure in a
Yueying Huang, Junjie Yang
doaj   +1 more source

Block encryption of quantum messages [PDF]

open access: yes, 2018
In modern cryptography, block encryption is a fundamental cryptographic primitive. However, it is impossible for block encryption to achieve the same security as one-time pad.
Liang, Min, Yang, Li
core   +1 more source

Home - About - Disclaimer - Privacy