Results 101 to 110 of about 11,535 (196)
Quantum computing offers significant potential for tackling complex problems, yet preparing quantum states from real-world data remains a critical challenge.
Xi-Ning Zhuang +11 more
doaj +1 more source
Pulse‐Level Quantum Robust Control with Diffusion‐Based Reinforcement Learning
The pulse‐level quantum control presents a large range of external parameter dependencies, including control field noise, frequency detuning, nonlinearities, and uncertainty of Hamiltonian parameters, which can lead to significant deviation from the ...
Yuanjing Zhang +3 more
doaj +1 more source
Post Quantum Cryptography (PQC) Signatures Without Trapdoors
Some of our current public key methods use a trap door to implement digital signature methods. This includes the RSA method, which uses Fermat's little theorem to support the creation and verification of a digital signature. The problem with a back-door is that the actual trap-door method could, in the end, be discovered.
openaire +2 more sources
The rapid deployment of Internet of Things (IoT) devices across critical infrastructure’s sectors such as healthcare, transportation, and smart cities brings unprecedented security challenges; particularly as quantum computing threatens the classical ...
Ketema Adere +11 more
doaj +1 more source
Hybrid PQC Digital Signatures and SSI
Self-sovereign identity (SSI) and digital credentials are becoming more and more practical, especially in Europe, and as such it is essential for them to be secured against the quantum threat. As we know PQC is a relatively modern area of cryptography and so we have decided to implement both a classical and a PQC digital signature scheme in a hybrid ...
Hieta-aho, Erik, Lipiäinen, Valtteri
openaire +1 more source
PQC tulee, oletko valmis? Katsaus NIST PQC –projektiin ja sen tuloksiin
unknown ...
openaire +1 more source
High Memory Masked Convolutional Codes for PQC
This paper presents a novel post-quantum cryptosystem based on high-memory masked convolutional codes. Unlike conventional code-based schemes that rely on block codes with fixed dimensions and limited error-correction capability, our construction offers both stronger cryptographic security and greater flexibility.
openaire +2 more sources
A "Detachable Polyanionic Protective Shell" Enveloping Photodynamic Cationic Nanoassemblies for Keratitis Treatment. [PDF]
Wei Y +9 more
europepmc +1 more source
The Role of State Perinatal Quality Collaboratives in Addressing Maternal Morbidity and Mortality. [PDF]
Radke S +5 more
europepmc +1 more source
Research on the application of post-quantum cryptographic algorithms in the telecommunications field
As a vital strategic resource, cryptography plays a core role in the field of network and information security. In recent years, the rapid development of quantum computing has effectively promoted the research and application of post-quantum cryptography
WANG Jingran +5 more
doaj

