Results 71 to 80 of about 25,460 (262)

Bacteria‐Responsive Nanostructured Drug Delivery Systems for Targeted Antimicrobial Therapy

open access: yesAdvanced Materials, EarlyView.
Bacteria‐responsive nanocarriers are designed to release antimicrobials only in the presence of infection‐specific cues. This selective activation ensures drug release precisely at the site of infection, avoiding premature or indiscriminate release, and enhancing efficacy.
Guillermo Landa   +3 more
wiley   +1 more source

Quantum cryptography: key distribution and beyond

open access: yes, 2018
Uniquely among the sciences, quantum cryptography has driven both foundational research as well as practical real-life applications. We review the progress of quantum cryptography in the last decade, covering quantum key distribution and other ...
H., Akshata Shenoy   +2 more
core   +1 more source

Water Permeates and Plasticizes Amorphous Carbon Dots: Unraveling the Inner Accessibility of the Nanoparticles by Glass Transition Studies

open access: yesAdvanced Materials, EarlyView.
The water permeability of amorphous carbon dots (CDs) is demonstrated by investigating their plasticization. Novel polyamide‐based and amorphous nanoparticles are synthesized by controlling their inner packing density. Water plasticization is evidenced by the decrease of the CDs glass transition temperature with increasing the hydration degree.
Elisa Sturabotti   +8 more
wiley   +1 more source

Synthesis and Optimization of Reversible Circuits - A Survey

open access: yes, 2013
Reversible logic circuits have been historically motivated by theoretical research in low-power electronics as well as practical improvement of bit-manipulation transforms in cryptography and computer graphics.
Arabzadeh M.   +32 more
core   +1 more source

Solvent‐Free Thermal Defect Engineering in Molecular Frameworks With Volatile Linkers

open access: yesAdvanced Materials, EarlyView.
Thermal removal of neutral volatile linkers enables precise and solvent‐free generation of metal vacancies in MOFs. This strategy affords redox‐stable, coordinatively unsaturated FeII sites with tunable spin, ligand coordination, and catalytic behavior. The approach offers a general route to design defect‐functional materials through local coordination
Sonia Martínez‐Giménez   +9 more
wiley   +1 more source

Using Simon's Algorithm to Attack Symmetric-Key Cryptographic Primitives [PDF]

open access: yes, 2017
We present new connections between quantum information and the field of classical cryptography. In particular, we provide examples where Simon's algorithm can be used to show insecurity of commonly used cryptographic symmetric-key primitives ...
Santoli, Thomas, Schaffner, Christian
core   +1 more source

Full-field implementation of a perfect eavesdropper on a quantum cryptography system [PDF]

open access: yes, 2011
Quantum key distribution (QKD) allows two remote parties to grow a shared secret key. Its security is founded on the principles of quantum mechanics, but in reality it significantly relies on the physical implementation.
A Kerckhoffs   +26 more
core   +2 more sources

Opportunities of Semiconducting Oxide Nanostructures as Advanced Luminescent Materials in Photonics

open access: yesAdvanced Materials, EarlyView.
The review discusses the challenges of wide and ultrawide bandgap semiconducting oxides as a suitable material platform for photonics. They offer great versatility in terms of tuning microstructure, native defects, doping, anisotropy, and micro‐ and nano‐structuring. The review focuses on their light emission, light‐confinement in optical cavities, and
Ana Cremades   +7 more
wiley   +1 more source

Cost-Efficient Pipelined Modular Polynomial Multiplier for Post-Quantum Cryptography Saber

open access: yesQuantum Reports
The development of quantum computers presents a great challenge for current cryptographic algorithms. Post-quantum cryptography has been proposed to secure against quantum computers in the near future.
Hua Li
doaj   +1 more source

Decoy state quantum key distribution with two-way classical post-processing [PDF]

open access: yes, 2006
Decoy states have recently been proposed as a useful method for substantially improving the performance of quantum key distribution protocols when a coherent state source is used.
C. H. Bennett   +14 more
core   +1 more source

Home - About - Disclaimer - Privacy