Entanglement Distribution in Quantum Networks Via Swapping of Partially Entangled Pure States
The manuscript establishes a unified theoretical framework for entanglement swapping with partially entangled pure states across diverse quantum‐network topologies. By deriving closed‐form expressions for the full output ensembles and success probabilities, we show that successive swapping operations generate a binomially distributed spectrum of ...
Henrique Guerra +3 more
wiley +1 more source
Protocols for Quantum Weak Coin Flipping [PDF]
Weak coin flipping is an important cryptographic primitive$\unicode{x2013}$it is the strongest known secure two-party computation primitive that classically becomes secure only under certain assumptions (e.g.
Atul Singh Arora +3 more
doaj +1 more source
Materials and System Design for Self‐Decision Bioelectronic Systems
This review highlights how self‐decision bioelectronic systems integrate sensing, computation, and therapy into autonomous, closed‐loop platforms that continuously monitor and treat diseases, marking a major step toward intelligent, self‐regulating healthcare technologies.
Qiankun Zeng +9 more
wiley +1 more source
Parallel Algorithm for Approximate State Graph Exploration With Restricted Memory Footprint
ABSTRACT We investigate the performance of algorithms that explore large state graphs of finite state machines without input by following paths. To improve on anchor‐based and candidate‐based explorations and to avoid the performance overhead of full anchor lists and the tuning sensitivity of timeout‐based methods, we propose and analyze exploration ...
Jörg Keller, Sebastian Litzinger
wiley +1 more source
Image encryption and decryption utilizing physical unclonable function-based key generator by Ta/WTiOx/Pt memristor array [PDF]
In this work, an encryption and decryption system utilizing physical unclonable function (PUF) characteristics of the Ta/WTiOx/Pt memristor array as hardware-level security primitive is demonstrated.
Yaoyao Jin +10 more
doaj +1 more source
Post-Quantum Cryptographic Hardware Primitives
The development and implementation of post-quantum cryptosystems have become a pressing issue in the design of secure computing systems, as general quantum computers have become more feasible in the last two years. In this work, we introduce a set of hardware post-quantum cryptographic primitives (PCPs) consisting of four frequently used security ...
Bu, Lake +3 more
openaire +2 more sources
Explainable AI With Imbalanced Learning Strategies for Blockchain Transaction Fraud Detection
Research methodology pipeline for blockchain fraud detection. ABSTRACT Blockchain networks now support billions of dollars in daily transactions, making reliable and transparent fraud detection essential for maintaining user trust and financial stability.
Ahmed Abbas Jasim Al‐Hchaimi +2 more
wiley +1 more source
A Novel Identity-Based Signcryption Scheme in the Standard Model
Identity-based signcryption is a useful cryptographic primitive that provides both authentication and confidentiality for identity-based crypto systems. It is challenging to build a secure identity-based signcryption scheme that can be proven secure in a
Yueying Huang, Junjie Yang
doaj +1 more source
Block encryption of quantum messages [PDF]
In modern cryptography, block encryption is a fundamental cryptographic primitive. However, it is impossible for block encryption to achieve the same security as one-time pad.
Liang, Min, Yang, Li
core +1 more source
Modeling and Analysis of Advanced Cryptographic Primitives and Security Protocols in Maude-NPA [PDF]
Damián Aparicio Sánchez
openalex +1 more source

