Results 71 to 80 of about 1,801,560 (284)
With the development of artificial intelligence and big data, hardware encryption has emerged as a key technology for secure communication. This study developed an HfAlOx‐based memristor with eight distinguishable resistance states, and realized novel neuromorphic hardware encryption.
Bo Sun+6 more
wiley +1 more source
Abstract Purpose To enhance the accessibility of advanced pulse sequences, or parts thereof, through the open‐source Pulseq framework. This work extends the Pulseq framework to Philips MRI systems and incorporates dynamic parallel‐transmit (pTx) capabilities within the constraints of the existing Pulseq format.
Thomas H. M. Roos+10 more
wiley +1 more source
cryptographic Primitives: Insertions, Examples and Open Problems
Cryptographic primitives are considered. Each of cryptographic primitives can be the basis for building more complex cryptographic protocol. Examples of insertion of cryptographic primitives are given. The problems arising at the proof of security of the
Stanislav Olegovich Dordzhiev+1 more
doaj
Statistical Complexity of Quantum Learning
The statistical performance of quantum learning is investigated as a function of the number of training data N$N$, and of the number of copies available for each quantum state in the training and testing data sets, respectively S$S$ and V$V$. Indeed, the biggest difference in quantum learning comes from the destructive nature of quantum measurements ...
Leonardo Banchi+3 more
wiley +1 more source
On the Reachability Problem in Cryptographic Protocols [PDF]
We study the verification of secrecy and authenticity properties for cryptogra- phic protocols which rely on symmetric shared keys. The verification can be reduced to check whether a certain parallel program which models the protocol and the specification can reach an erroneous state while interacting with the environment.
Amadio, Roberto M., Lugiez, Denis
openaire +4 more sources
This comment is presented to identify the drawbacks in a recently demonstrated scheme by Maitra et al., SAS‐Cloud: doi:10.1049/iet-net.2019.0004, which adopted an ElGamal cryptosystem‐based technique for biometric authentication in cloud‐based IoT ...
Azeem Irshad, Shehzad Ashraf Chaudhry
doaj +1 more source
Photon Number Coherence in Quantum Dot‐Cavity Systems can be Enhanced by Phonons
Photon number coherence (PNC) is important for quantum cryptography. Because of that, the PNC within a quantum dot‐cavity system is investigated theoretically. Phonons, which interact with the quantum dot, surprisingly do not necessarily decrease PNC. It is demonstrated that it is possible to optimize other figures of merit without significant penalty ...
Paul C. A. Hagen+4 more
wiley +1 more source
Hybrid Encoder for Discrete and Continuous Variable QKD
This work demonstrates a hybrid QKD encoder that bridges the advantages of discrete and continuous variables. Utilizing a self‐compensating iPOGNAC design, the encoder is compatible with space‐based and terrestrial quantum networks. The approach simplifies system complexity, improves stability, and ensures cost‐effective integration, paving the way for
Mattia Sabatini+4 more
wiley +1 more source
Open and Closed Loop Approaches for Energy Efficient Quantum Optimal Control
Concepts from quantum thermodynamics and optimal control are blended to derive a theoretical framework to quantify and minimize the energetic cost of a pulse for unitary synthesis. Two complementary techniques (based on GRAPE and Reinforce‐DRL) are implemented as open‐source software that co‐optimizes the fidelity and energetic cost within quantum ...
Sebastiaan Fauquenot+2 more
wiley +1 more source
Specifying a Cryptographical Protocol in Lustre and SCADE [PDF]
In Proceedings MARS 2020, arXiv:2004.12403.
openaire +4 more sources