Results 21 to 30 of about 2,499,047 (376)

Trusted Detector Noise Analysis for Discrete Modulation Schemes of Continuous-Variable Quantum Key Distribution [PDF]

open access: yes, 2020
Discrete-modulated continuous-variable quantum key distribution protocols are promising candidates for large-scale deployment due to the large technological overlap with deployed modern optical communication devices.
Jie Lin, N. Lutkenhaus
semanticscholar   +1 more source

Review of ther book entitled Discrete Communication Systems by Stevan Berber, Oxford University Press, 2021

open access: yesVojnotehnički Glasnik, 2023
The book contains the theory of discrete communication systems that are presented in the form of block schematics defined by mathematical operators. For the sake of comparison, the theory of digital communication systems is added to understand better the
Nebojša N. Gaćeša
doaj   +1 more source

Hybrid QKD Protocol Outperforming Both DV- and CV-QKD Protocols

open access: yesIEEE Photonics Journal, 2020
To overcome the limitations of both discrete variable (DV) and continuous variable (CV) QKD protocols, in this paper, a hybrid QKD protocol is proposed.
Ivan B. Djordjevic
doaj   +1 more source

Asymptotic security of discrete-modulation protocols for continuous-variable quantum key distribution [PDF]

open access: yesPhysical Review A, 2019
We consider discrete-modulation protocols for continuous-variable quantum key distribution (CV-QKD) that employ a modulation constellation consisting of a finite number of coherent states and that use a homodyne- or a heterodyne-detection receiver.
Eneet Kaur, S. Guha, M. Wilde
semanticscholar   +1 more source

Performance Improvement of Discretely Modulated Continuous-Variable Quantum Key Distribution with Untrusted Source via Heralded Hybrid Linear Amplifier

open access: yesEntropy, 2020
In practical quantum communication networks, the scheme of continuous-variable quantum key distribution (CVQKD) faces a challenge that the entangled source is controlled by a malicious eavesdropper, and although it still can generate a positive key rate ...
Kunlin Zhou   +5 more
doaj   +1 more source

Discrete-Modulation Continuous-Variable Quantum Key Distribution Enhanced by Quantum Scissors [PDF]

open access: yesIEEE Journal on Selected Areas in Communications, 2019
It is known that quantum scissors, as non-deterministic amplifiers, can enhance the performance of Gaussian-modulated continuous-variable quantum key distribution (CV-QKD) in noisy and long-distance regimes of operation.
M. Ghalaii   +4 more
semanticscholar   +1 more source

Long-distance continuous-variable measurement-device-independent quantum key distribution with discrete modulation [PDF]

open access: yesPhysical Review A, 2018
We propose a long-distance continuous-variable measurement-device-independent quantum key distribution (CV-MDI-QKD) protocol with discrete modulation. This kind of discrete-modulated schemes have good compatibility with efficient error correction code ...
Hongxin Ma   +6 more
semanticscholar   +1 more source

A study of discrete wavelet transform based denoising to reduce the effect of artificial light interferences for indoor optical wireless communication [PDF]

open access: yes, 2010
The optical power penalty (OPP) due to the artificial light interferences (ALIs) can be significantly high in an indoor optical wireless communication (OWC) channel making such link practically infeasible.
Angelova, Maia   +2 more
core   +1 more source

Sensing and Reliability Improvement of Electrostatic-Discharge Transient by Discrete Engineering for High-Voltage 60-V n-Channel Lateral-Diffused MOSFETs with Embedded Silicon-Controlled Rectifiers

open access: yesSensors, 2018
High-voltage n-channel lateral-diffused metal-oxide-semiconductor field-effect transistor (nLDMOS) components, fabricated by a TSMC 0.25-μm 60-V bipolar-CMOS-DMOS (BCD) process with drain-side embedded silicon-controlled rectifier (SCR) of the n-p-n ...
Shen-Li Chen, Yi-Cih Wu
doaj   +1 more source

Digital image watermarking using discrete cosine transformation based linear modulation

open access: yesJournal of Cloud Computing, 2023
The proportion of multimedia traffic in data networks has grown substantially as a result of advancements in IT. As a result, it's become necessary to address the following challenges in protecting multimedia data: prevention of unauthorized disclosure ...
Waleed Alomoush   +6 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy