Results 111 to 120 of about 24,566 (328)

Quantum Cryptography Protocols Ensuring Secure Communication in the Era of Quantum Computing [PDF]

open access: yesITM Web of Conferences
Quantum cryptography has emerged as a revolutionary technology for ensuring secure communication in the era of quantum computing. While existing research primarily focuses on theoretical frameworks and small-scale experimental setups, significant ...
J Kamalakumari   +5 more
doaj   +1 more source

Post quantum proxy signature scheme based on the multivariate public key cryptographic signature [PDF]

open access: gold, 2020
Jiahui Chen   +6 more
openalex   +1 more source

A quantum key distribution protocol for rapid denial of service detection [PDF]

open access: yes, 2017
We introduce a quantum key distribution protocol designed to expose fake users that connect to Alice or Bob for the purpose of monopolising the link and denying service. It inherently resists attempts to exhaust Alice and Bob's initial shared secret, and
Erven, Chris   +2 more
core   +2 more sources

The Engineering of a Scalable Multi-Site Communications System Utilizing Quantum Key Distribution (QKD)

open access: yes, 2017
Quantum Key Distribution (QKD) is a means of generating keys between a pair of computing hosts that is theoretically secure against cryptanalysis, even by a quantum computer. Although there is much active research into improving the QKD technology itself,
Ling, Xinhua   +3 more
core   +1 more source

Light‐Harvesting Nanomaterials Based on Dyes for Energy Transfer and Amplified Biosensing

open access: yesAdvanced Materials, EarlyView.
Light harvesting (LH) in plants inspires researchers to develop artificial LH nanomaterials. Here, LH nanomaterials based on organic dyes are reviewed, considering fundamental challenges on aggregation‐caused quenching, excitation energy transfer, and exciton migration length.
Andrey S. Klymchenko   +2 more
wiley   +1 more source

Post-Quantum Cryptography: Challenges and Opportunities for Robust and Secure HW Design [PDF]

open access: green, 2021
Davide Bellizia   +7 more
openalex   +1 more source

Quantum Key Distribution using Continuous-variable non-Gaussian States

open access: yes, 2015
In this work we present a quantum key distribution protocol using continuous-variable non-Gaussian states, homodyne detection and post-selection. The employed signal states are the Photon Added then Subtracted Coherent States (PASCS) in which one photon ...
Aguiar, L. S.   +3 more
core   +1 more source

Harnessing Photo‐Energy Conversion in Nanomaterials for Precision Theranostics

open access: yesAdvanced Materials, EarlyView.
Harnessing photo‐energy conversion in nanomaterials enables precision theranostics through light‐driven mechanisms such as photoluminescence, photothermal, photoelectric, photoacoustic, photo‐triggered surface‐enhanced Raman scattering (SERS), and photodynamic processes. This review explores six fundamental principles of photo‐energy conversion, recent
Jingyu Shi   +4 more
wiley   +1 more source

A Hybrid Key Generator Model Based on Multiscale Prime Sieve and Quantum-Inspired Approaches

open access: yesApplied Sciences
This article examines a hybrid generation of cryptographic keys, whose novelty lies in the fusion of a multiscale subkey generation with prime sieve and subkeys inspired by quantum mechanics.
Gerardo Iovane, Elmo Benedetto
doaj   +1 more source

Survey of Lattice to Design Post Quantum Cryptographic Algorithm Using Lattice [PDF]

open access: green, 2021
Uma Pujeri   +2 more
openalex   +1 more source

Home - About - Disclaimer - Privacy