Results 41 to 50 of about 89,748 (273)

Post-Quantum Cryptography

open access: yesARIS2 - Advanced Research on Information Systems Security, 2022
Cryptography is used broadly in the digital age, making our communications secure, ensuring our data is safe, and enabling secure transactions on which we rely daily. Our reality is connected, we send an email without thinking about all the underlying protocols, we buy online, and we check the weather on our fridge. Utilizations are countless and so is
openaire   +1 more source

Applications of Post-Quantum Cryptography

open access: yesEuropean Conference on Cyber Warfare and Security
With the constantly advancing capabilities of quantum computers, conventional cryptographic systems relying on complex math problems may encounter unforeseen vulnerabilities. Unlike regular computers, which are often deemed cost-ineffective in cryptographic attacks, quantum computers have a significant advantage in calculation speed.
Emils Bagirovs   +3 more
openaire   +2 more sources

Deterministic Detection of Single Ion Implantation

open access: yesAdvanced Engineering Materials, EarlyView.
Focused ion beam implantation with high detection efficiencies will enable the rapid and scalable fabrication of advanced spin‐based technologies such as qubits. This work presents the detection efficiencies of a wide range of ions implanted into solid‐state hosts, with efficiencies of >90% recorded for ion species and substrate combinations of ...
Mason Adshead   +6 more
wiley   +1 more source

Cathodic Cage Plasma Deposition of Nanostructured Cu–Fe–Se Coatings on Poly(methyl Methacrylate)

open access: yesAdvanced Engineering Materials, EarlyView.
Nanostructured Cu–Fe–Se coatings are deposited on PMMA by a modified cathodic cage plasma process, enabling low‐temperature deposition on polymer substrates. A transition from discontinuous to compact morphology is observed with temperature, with optimal properties at 200°C, where improved CuFeSe2‐type bonding, lowest sheet resistance, and favorable ...
V. S. S. Sobrinho   +8 more
wiley   +1 more source

THE STATE OF STANDARDIZATION OF POST-QUANTUM CRYPTO-ALGORITHMS AT THE GLOBAL LEVEL

open access: yesАвтоматизация технологических и бизнес-процессов, 2023
. In the digital age, cryptography is widely used in various important systems such as financial, military and government ones, medical records etc. The life of modern people is closely connected with the cryptography.
Oleksandra Tsentseria   +3 more
doaj   +1 more source

Practical cryptographic strategies in the post-quantum era

open access: yes, 2018
We review new frontiers in information security technologies in communications and distributed storage technologies with the use of classical, quantum, hybrid classical-quantum, and post-quantum cryptography.
Fedorov, A. K.   +3 more
core   +1 more source

Maximally Non-Local and Monogamous Quantum Correlations [PDF]

open access: yes, 2006
We introduce a version of the chained Bell inequality for an arbitrary number of measurement outcomes, and use it to give a simple proof that the maximally entangled state of two d dimensional quantum systems has no local component.
Barrett, Jonathan   +2 more
core   +2 more sources

Advancing Electronic Application of Coordination Solids: Enhancing Electron Transport and Device Integration via Surface‐Mounted MOFs (SURMOFs)

open access: yesAdvanced Functional Materials, EarlyView.
The layer‐by‐layer (LbL) assembly of coordination solids, enabled by the surface‐mounted metal‐organic framework (SURMOF) platform, is on the cusp of generating the organic counterpart of the epitaxy of inorganics. The programmable and sequential SURMOF protocol, optimized by machine learning (ML), is suited for accessing high‐quality thin films of ...
Zhengtao Xu   +2 more
wiley   +1 more source

No Signalling and Quantum Key Distribution

open access: yes, 2005
Standard quantum key distribution protocols are provably secure against eavesdropping attacks, if quantum theory is correct. It is theoretically interesting to know if we need to assume the validity of quantum theory to prove the security of quantum key ...
A. Kent   +9 more
core   +1 more source

Solving the Shortest Vector Problem in Lattices Faster Using Quantum Search [PDF]

open access: yes, 2013
By applying Grover's quantum search algorithm to the lattice algorithms of Micciancio and Voulgaris, Nguyen and Vidick, Wang et al., and Pujol and Stehl\'{e}, we obtain improved asymptotic quantum results for solving the shortest vector problem.
A. Ambainis   +39 more
core   +2 more sources

Home - About - Disclaimer - Privacy