Results 41 to 50 of about 6,594 (201)

Photon Number Coherence in Quantum Dot‐Cavity Systems can be Enhanced by Phonons

open access: yesAdvanced Quantum Technologies, EarlyView.
Photon number coherence (PNC) is important for quantum cryptography. Because of that, the PNC within a quantum dot‐cavity system is investigated theoretically. Phonons, which interact with the quantum dot, surprisingly do not necessarily decrease PNC. It is demonstrated that it is possible to optimize other figures of merit without significant penalty ...
Paul C. A. Hagen   +4 more
wiley   +1 more source

cryptographic Primitives: Insertions, Examples and Open Problems

open access: yesБезопасность информационных технологий, 2014
Cryptographic primitives are considered. Each of cryptographic primitives can be the basis for building more complex cryptographic protocol. Examples of insertion of cryptographic primitives are given. The problems arising at the proof of security of the
Stanislav Olegovich Dordzhiev   +1 more
doaj  

Authentication and common key generation cryptographic protocol for vehicle tachographs

open access: yesБезопасность информационных технологий, 2017
We present a public key generation protocol. The key is used for subscriber authentication in tachographs installed on vehicles in order to provide traffic safety. The protocol is based on the well-known Russian cryptographic algorithms.
Victor S. Gorbatov   +2 more
doaj   +1 more source

Fair Exchange in Strand Spaces [PDF]

open access: yesElectronic Proceedings in Theoretical Computer Science, 2009
Many cryptographic protocols are intended to coordinate state changes among principals. Exchange protocols coordinate delivery of new values to the participants, e.g. additions to the set of values they possess. An exchange protocol is fair if it ensures
Joshua D. Guttman
doaj   +1 more source

Hybrid Encoder for Discrete and Continuous Variable QKD

open access: yesAdvanced Quantum Technologies, EarlyView.
This work demonstrates a hybrid QKD encoder that bridges the advantages of discrete and continuous variables. Utilizing a self‐compensating iPOGNAC design, the encoder is compatible with space‐based and terrestrial quantum networks. The approach simplifies system complexity, improves stability, and ensures cost‐effective integration, paving the way for
Mattia Sabatini   +4 more
wiley   +1 more source

A secure mutual authentication procedure, generate the key fiscal basis, and fiscal data protection

open access: yesБезопасность информационных технологий, 2018
The paper describes cryptographic transformation for mutual authentication and creation of the fiscal sign key. This transformation based on using block encryption cipher named «Kuznetchik», described in the national standard of the Russian Federation ...
Igor Y. Zhukov, Oleg N. Murashov
doaj   +1 more source

Open and Closed Loop Approaches for Energy Efficient Quantum Optimal Control

open access: yesAdvanced Quantum Technologies, EarlyView.
Concepts from quantum thermodynamics and optimal control are blended to derive a theoretical framework to quantify and minimize the energetic cost of a pulse for unitary synthesis. Two complementary techniques (based on GRAPE and Reinforce‐DRL) are implemented as open‐source software that co‐optimizes the fidelity and energetic cost within quantum ...
Sebastiaan Fauquenot   +2 more
wiley   +1 more source

LπCET: A Logic Security Analysis for Cryptographic Protocols Based on π-Calculus Extension Theory

open access: yesIET Information Security
The π-calculus is a basic theory of mobile communication based on the notion of interaction, which, is aimed at analyzing and modeling the behaviors of communication processes in communicating and mobile systems, and is widely applied to the security ...
Fusheng Wu   +3 more
doaj   +1 more source

Leveraging Blockchain and Smart Contracts to Combat Greenwashing in Sustainable Development

open access: yesSustainable Development, EarlyView.
ABSTRACT Blockchain technology, when combined with smart contracts, enables buyers to distinguish between greenwashed and genuinely eco‐friendly products. The presence of counterfeit items can severely impact supply chains by diminishing brand value, eroding consumer confidence, and undermining market trust.
Ragnhild Silkoset, Arne Nygaard
wiley   +1 more source

Tailored Growth of Transition Metal Dichalcogenides’ Monolayers by Chemical Vapor Deposition

open access: yesSmall, EarlyView.
Here, results on the tailored growth of various 2D semiconductors’ monolayers of transition metal dichalcogenides are presented using chemical vapor deposition techniques. Basic electronic, photonic and optoelectronic properties of the grown quantum materials are studied by high‐resolution microscopy and spectroscopy techniques and are analyzed for ...
Andrey Turchanin, Antony George
wiley   +1 more source

Home - About - Disclaimer - Privacy