Results 41 to 50 of about 89,748 (273)
Cryptography is used broadly in the digital age, making our communications secure, ensuring our data is safe, and enabling secure transactions on which we rely daily. Our reality is connected, we send an email without thinking about all the underlying protocols, we buy online, and we check the weather on our fridge. Utilizations are countless and so is
openaire +1 more source
Applications of Post-Quantum Cryptography
With the constantly advancing capabilities of quantum computers, conventional cryptographic systems relying on complex math problems may encounter unforeseen vulnerabilities. Unlike regular computers, which are often deemed cost-ineffective in cryptographic attacks, quantum computers have a significant advantage in calculation speed.
Emils Bagirovs +3 more
openaire +2 more sources
Deterministic Detection of Single Ion Implantation
Focused ion beam implantation with high detection efficiencies will enable the rapid and scalable fabrication of advanced spin‐based technologies such as qubits. This work presents the detection efficiencies of a wide range of ions implanted into solid‐state hosts, with efficiencies of >90% recorded for ion species and substrate combinations of ...
Mason Adshead +6 more
wiley +1 more source
Cathodic Cage Plasma Deposition of Nanostructured Cu–Fe–Se Coatings on Poly(methyl Methacrylate)
Nanostructured Cu–Fe–Se coatings are deposited on PMMA by a modified cathodic cage plasma process, enabling low‐temperature deposition on polymer substrates. A transition from discontinuous to compact morphology is observed with temperature, with optimal properties at 200°C, where improved CuFeSe2‐type bonding, lowest sheet resistance, and favorable ...
V. S. S. Sobrinho +8 more
wiley +1 more source
THE STATE OF STANDARDIZATION OF POST-QUANTUM CRYPTO-ALGORITHMS AT THE GLOBAL LEVEL
. In the digital age, cryptography is widely used in various important systems such as financial, military and government ones, medical records etc. The life of modern people is closely connected with the cryptography.
Oleksandra Tsentseria +3 more
doaj +1 more source
Practical cryptographic strategies in the post-quantum era
We review new frontiers in information security technologies in communications and distributed storage technologies with the use of classical, quantum, hybrid classical-quantum, and post-quantum cryptography.
Fedorov, A. K. +3 more
core +1 more source
Maximally Non-Local and Monogamous Quantum Correlations [PDF]
We introduce a version of the chained Bell inequality for an arbitrary number of measurement outcomes, and use it to give a simple proof that the maximally entangled state of two d dimensional quantum systems has no local component.
Barrett, Jonathan +2 more
core +2 more sources
The layer‐by‐layer (LbL) assembly of coordination solids, enabled by the surface‐mounted metal‐organic framework (SURMOF) platform, is on the cusp of generating the organic counterpart of the epitaxy of inorganics. The programmable and sequential SURMOF protocol, optimized by machine learning (ML), is suited for accessing high‐quality thin films of ...
Zhengtao Xu +2 more
wiley +1 more source
No Signalling and Quantum Key Distribution
Standard quantum key distribution protocols are provably secure against eavesdropping attacks, if quantum theory is correct. It is theoretically interesting to know if we need to assume the validity of quantum theory to prove the security of quantum key ...
A. Kent +9 more
core +1 more source
Solving the Shortest Vector Problem in Lattices Faster Using Quantum Search [PDF]
By applying Grover's quantum search algorithm to the lattice algorithms of Micciancio and Voulgaris, Nguyen and Vidick, Wang et al., and Pujol and Stehl\'{e}, we obtain improved asymptotic quantum results for solving the shortest vector problem.
A. Ambainis +39 more
core +2 more sources

