Results 61 to 70 of about 1,901,421 (313)
Staging quantum cryptography with chocolate balls
Moderated by a director, laymen and students are encouraged to assume the role of quanta and enact a quantum cryptographic protocol. The performance is based on a generalized urn model capable of reproducing complementarity even for classical chocolate ...
Svozil, Karl
core +1 more source
Synchrotron Radiation for Quantum Technology
Materials and interfaces underpin quantum technologies, with synchrotron and FEL methods key to understanding and optimizing them. Advances span superconducting and semiconducting qubits, 2D materials, and topological systems, where strain, defects, and interfaces govern performance.
Oliver Rader +10 more
wiley +1 more source
Magnetic Unclonable Functions Leveraging Remanence and Anhysteretic States
A micrometric array of magnetic pillars provides a stable and unclonable hardware for generating cryptographic keys. From a single device, the ability is demonstrated to produce a 470‐bit key while also offering a reconfigurable mode of operation.
Alessandro Magni +6 more
wiley +1 more source
A Formal Language for Cryptographic Protocol Requirements
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
P. Syverson, C. Meadows
semanticscholar +4 more sources
Physical Unclonable Function (PUF)-Based e-Cash Transaction Protocol (PUF-Cash)
Electronic money (e-money or e-Cash) is the digital representation of physical banknotes augmented by added use cases of online and remote payments. This paper presents a novel, anonymous e-money transaction protocol, built based on physical unclonable ...
Jeff Calhoun +5 more
doaj +1 more source
Oblivious Transfer based on Key Exchange
Key-exchange protocols have been overlooked as a possible means for implementing oblivious transfer (OT). In this paper we present a protocol for mutual exchange of secrets, 1-out-of-2 OT and coin flipping similar to Diffie-Hellman protocol using the ...
Abhishek Parakh +3 more
core +1 more source
A bisimulation method for cryptographic protocols [PDF]
Summary: We introduce a definition of bisimulation for cryptographic protocols. The definition includes a simple and precise model of the knowledge of the environment with which a protocol interacts. Bisimulation is the basis of an effective proof technique, which yields proofs of classical security properties of protocols and also justifies certain ...
Andrew D. Gordon, Martín Abadi
openaire +3 more sources
Recent advances in diagnostics have accelerated the development of miniaturized wearable technologies for the continuous monitoring of diseases. This paradigm is shifting healthcare away from invasive, centralized blood tests toward decentralized monitoring, using alternative body biofluids.
Lanka Tata Rao +2 more
wiley +1 more source
Classical Cryptographic Protocols in a Quantum World [PDF]
Cryptographic protocols, such as protocols for secure function evaluation (SFE), have played a crucial role in the development of modern cryptography. The extensive theory of these protocols, however, deals almost exclusively with classical attackers.
Sean Hallgren, Adam Smith, Fang Song
openaire +5 more sources
An unambiguous quantum state discrimination for two nonorthogonal states is demonstrated using a single ion. By implementing a non‐Hermitian Hamiltonian with parity‐time‐reversal (PT) symmetry, two candidate states evolve with different speed and become orthogonal at specific time, hence can be discriminated unambiguously. Experiments are performed for
Chenhao Zhu +5 more
wiley +1 more source

