Results 101 to 110 of about 24,566 (328)

Enhancing the Security of Classical Communication with Post-Quantum Authenticated-Encryption Schemes for the Quantum Key Distribution

open access: yesComputers
This research aims to establish a secure system for key exchange by using post-quantum cryptography (PQC) schemes in the classic channel of quantum key distribution (QKD).
Farshad Rahimi Ghashghaei   +3 more
doaj   +1 more source

Experimental authentication of quantum key distribution with post-quantum cryptography [PDF]

open access: gold, 2021
Liujun Wang   +11 more
openalex   +1 more source

Synthetic Aspects and Characterization Needs in MOF Chemistry – from Discovery to Applications

open access: yesAdvanced Materials, EarlyView.
Overcoming the challenges of phase discovery, synthesis optimization and scale‐up, characterization, and computational studies is essential to accelerate the large‐scale application of MOFs. Life‐cycle analyses and techno‐economic analyses need to be performed to realistically assess their potential for industrial relevance.
Bastian Achenbach   +4 more
wiley   +1 more source

Continuous variable quantum key distribution with two-mode squeezed states

open access: yes, 2012
Quantum key distribution (QKD) enables two remote parties to grow a shared key which they can use for unconditionally secure communication [1]. The applicable distance of a QKD protocol depends on the loss and the excess noise of the connecting quantum ...
C Silberhorn   +29 more
core   +1 more source

Retrospective Review on Reticular Materials: Facts and Figures Over the Last 30 Years

open access: yesAdvanced Materials, EarlyView.
To shape the future course of research in reticular materials, this work reflects on the progress over the past 30 years, complemented by input from the community of 228 active researchers through a global, crowdsourced survey: ranging from demographics, how it works, publish and interact, to highlights on both academic and industrial milestones, as ...
Aamod V. Desai   +8 more
wiley   +1 more source

Quantum vs post‐quantum security for future networks: Survey

open access: yesCyber Security and Applications
Classical cryptography (crypt) schemes (sche) have been compromised by the practical results on quantum (q) computers in recent years. Nowadays these sche ‘s can be compromised by using the Shor's methodology. This paper provides a detailed survey of the
Savo Glisic
doaj   +1 more source

A Note on Quantum Security for Post-Quantum Cryptography [PDF]

open access: yes, 2014
Shor's quantum factoring algorithm and a few other efficient quantum algorithms break many classical crypto-systems. In response, people proposed post-quantum cryptography based on computational problems that are believed hard even for quantum computers. However, security of these schemes against \emph{quantum} attacks is elusive.
openaire   +3 more sources

Two Material Properties from One Wavelength‐Orthogonal Photoresin Enabled by a Monochromatic Laser Integrated Stereolithographic Apparatus (Mono LISA)

open access: yesAdvanced Materials, Volume 37, Issue 13, April 2, 2025.
A single object with dual properties – degradable and non‐degradable – is fabricated in a single print simply by switching the printing colors. The advanced multi‐material printing is enabled by the combination of a fully wavelength‐orthogonal photoresin and a monochromatic tunable laser printer, paving the way for precise multi‐material ...
Xingyu Wu   +5 more
wiley   +1 more source

DNA‑Directed Assembly of Photonic Nanomaterials for Diagnostic and Therapeutic Applications

open access: yesAdvanced Materials, EarlyView.
DNA‐directed assembly offers a powerful strategy for constructing structured photonic nanomaterials with precise spatial control. This review provides a comprehensive overview of recent advancements in DNA‐assembled photonic nanomaterials for diagnostics and therapeutics, highlighting key design principles, functionalization strategies, and optical ...
Longjiang Ding   +5 more
wiley   +1 more source

Energy Consumption Framework and Analysis of Post-Quantum Key-Generation on Embedded Devices

open access: yesJournal of Cybersecurity and Privacy
The emergence of quantum computing and Shor’s algorithm necessitates an imminent shift from current public key cryptography techniques to post-quantum-robust techniques.
J. Cameron Patterson   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy