Results 101 to 110 of about 65,031 (278)
Multi-exponentiation (cryptographic protocols) [PDF]
In several cryptographic protocols the product of a small number of exponentiations is required, but the separate exponentiation results are not needed. A simultaneous exponentiation algorithm that takes advantage of this situation and that is substantially faster than the ordinary approach using separate exponentiations is presented.
S.-M. Yen, C.-S. Laih, A.K. Lenstra
openaire +2 more sources
Cylindrical vector beam (CVB) multiplexing offers a viable solution to channel capacity, integration, and unidirectional transmission challenges in fiber‐rich sixth‐generation backbone networks. An all‐dielectric fiber meta‐tip‐enabled CVB multiplexing system is proposed and demonstrated, providing high‐capacity, bidirectional optical interconnects and
Jinke Li +3 more
wiley +1 more source
Using of small-scale quantum computers in cryptography with many-qubit entangled states
We propose a new cryptographic protocol. It is suggested to encode information in ordinary binary form into many-qubit entangled states with the help of a quantum computer. A state of qubits (realized, e.g., with photons) is transmitted through a quantum
A. Ekert +16 more
core +1 more source
Detuning modulated composite segmentation (DMCS) enables robust spontaneous parametric down‐conversion with sevenfold improved temperature stability compared to conventional designs, opening new possibilities for stable quantum photon sources. ABSTRACT Spontaneous parametric down conversion (SPDC) holds a pivotal role in quantum physics, facilitating ...
Muhammad Erew +5 more
wiley +1 more source
How to Formalize Loop Iterations in Cryptographic Protocols Using ProVerif
The formal verification of cryptographic protocols has been extensively studied in recent years. To verify the cryptographic protocol security, formal verification tools consider protocol properties as interactive processes involving a cryptographic ...
Takehiko Mieno +3 more
doaj +1 more source
Composable security in relativistic quantum cryptography
Relativistic protocols have been proposed to overcome certain impossibility results in classical and quantum cryptography. In such a setting, one takes the location of honest players into account, and uses the signalling limit given by the speed of light
V Vilasini +2 more
doaj +1 more source
Land‐use intensification is filtering for species, able to cope with anthropogenic landscapes. This was assumed to result in functionally and phylogenetically homogenous communities, but a recent meta‐analysis could not confirm a consistent homogenization response to human pressure and raises open questions.
Marcel Püls +10 more
wiley +1 more source
Statistical Complexity of Quantum Learning
The statistical performance of quantum learning is investigated as a function of the number of training data N$N$, and of the number of copies available for each quantum state in the training and testing data sets, respectively S$S$ and V$V$. Indeed, the biggest difference in quantum learning comes from the destructive nature of quantum measurements ...
Leonardo Banchi +3 more
wiley +1 more source
A Probabilistic Scheduler for the Analysis of Cryptographic Protocols
AbstractWhen modelling cryto-protocols by means of process calculi which express both nondeterministic and probabilistic behavior, it is customary to view the scheduler as an intruder. It has been established that the traditional scheduler needs to be carefully calibrated in order to more accurately reflect the intruder's capabilities for controlling ...
John Mullins +2 more
openaire +3 more sources
Accreditation Against Limited Adversarial Noise
An upgraded accreditation (a variant of quantum verification) scheme is presented, significantly relaxing the assumptions, to allow adversarial noise, while preserving the suitability for near‐term / immediate usage. Abstract An accreditation protocol (a variety of quantum verification) is presented, where error is assumed to be adversarial (in ...
Andrew Jackson
wiley +1 more source

