Results 71 to 80 of about 1,801,560 (284)

CMOS compatible multi‐state memristor for neuromorphic hardware encryption with low operation voltage

open access: yesInfoMat, EarlyView.
With the development of artificial intelligence and big data, hardware encryption has emerged as a key technology for secure communication. This study developed an HfAlOx‐based memristor with eight distinguishable resistance states, and realized novel neuromorphic hardware encryption.
Bo Sun   +6 more
wiley   +1 more source

pTx‐Pulseq in hybrid sequences: Accessible and advanced hybrid open‐source MRI sequences on Philips scanners

open access: yesMagnetic Resonance in Medicine, EarlyView.
Abstract Purpose To enhance the accessibility of advanced pulse sequences, or parts thereof, through the open‐source Pulseq framework. This work extends the Pulseq framework to Philips MRI systems and incorporates dynamic parallel‐transmit (pTx) capabilities within the constraints of the existing Pulseq format.
Thomas H. M. Roos   +10 more
wiley   +1 more source

cryptographic Primitives: Insertions, Examples and Open Problems

open access: yesБезопасность информационных технологий, 2014
Cryptographic primitives are considered. Each of cryptographic primitives can be the basis for building more complex cryptographic protocol. Examples of insertion of cryptographic primitives are given. The problems arising at the proof of security of the
Stanislav Olegovich Dordzhiev   +1 more
doaj  

Statistical Complexity of Quantum Learning

open access: yesAdvanced Quantum Technologies, EarlyView.
The statistical performance of quantum learning is investigated as a function of the number of training data N$N$, and of the number of copies available for each quantum state in the training and testing data sets, respectively S$S$ and V$V$. Indeed, the biggest difference in quantum learning comes from the destructive nature of quantum measurements ...
Leonardo Banchi   +3 more
wiley   +1 more source

On the Reachability Problem in Cryptographic Protocols [PDF]

open access: yes, 2000
We study the verification of secrecy and authenticity properties for cryptogra- phic protocols which rely on symmetric shared keys. The verification can be reduced to check whether a certain parallel program which models the protocol and the specification can reach an erroneous state while interacting with the environment.
Amadio, Roberto M., Lugiez, Denis
openaire   +4 more sources

Comment on ‘ElGamal cryptosystem‐based secure authentication system for cloud‐based IoT applications’

open access: yesIET Networks, 2021
This comment is presented to identify the drawbacks in a recently demonstrated scheme by Maitra et al., SAS‐Cloud: doi:10.1049/iet-net.2019.0004, which adopted an ElGamal cryptosystem‐based technique for biometric authentication in cloud‐based IoT ...
Azeem Irshad, Shehzad Ashraf Chaudhry
doaj   +1 more source

Photon Number Coherence in Quantum Dot‐Cavity Systems can be Enhanced by Phonons

open access: yesAdvanced Quantum Technologies, EarlyView.
Photon number coherence (PNC) is important for quantum cryptography. Because of that, the PNC within a quantum dot‐cavity system is investigated theoretically. Phonons, which interact with the quantum dot, surprisingly do not necessarily decrease PNC. It is demonstrated that it is possible to optimize other figures of merit without significant penalty ...
Paul C. A. Hagen   +4 more
wiley   +1 more source

Hybrid Encoder for Discrete and Continuous Variable QKD

open access: yesAdvanced Quantum Technologies, EarlyView.
This work demonstrates a hybrid QKD encoder that bridges the advantages of discrete and continuous variables. Utilizing a self‐compensating iPOGNAC design, the encoder is compatible with space‐based and terrestrial quantum networks. The approach simplifies system complexity, improves stability, and ensures cost‐effective integration, paving the way for
Mattia Sabatini   +4 more
wiley   +1 more source

Open and Closed Loop Approaches for Energy Efficient Quantum Optimal Control

open access: yesAdvanced Quantum Technologies, EarlyView.
Concepts from quantum thermodynamics and optimal control are blended to derive a theoretical framework to quantify and minimize the energetic cost of a pulse for unitary synthesis. Two complementary techniques (based on GRAPE and Reinforce‐DRL) are implemented as open‐source software that co‐optimizes the fidelity and energetic cost within quantum ...
Sebastiaan Fauquenot   +2 more
wiley   +1 more source

Specifying a Cryptographical Protocol in Lustre and SCADE [PDF]

open access: yesElectronic Proceedings in Theoretical Computer Science, 2020
In Proceedings MARS 2020, arXiv:2004.12403.
openaire   +4 more sources

Home - About - Disclaimer - Privacy