Results 81 to 90 of about 11,535 (196)
Resisting Quantum Key Distribution Attacks Using Quantum Machine Learning
Quantum key distribution (QKD) promises secure communication but remains vulnerable to advanced quantum attacks. We propose a hybrid quantum long short‐term memory (QLSTM) model that combines quantum‐enhanced learning with classical deep learning to detect attacks such as photon‐number splitting, Trojan‐Horse and detector blinding.
Ali Al‐Kuwari +4 more
wiley +1 more source
We propose a secure and scalable file-encryption scheme for cloud systems by integrating Post-Quantum Cryptography (PQC), Quantum Key Distribution (QKD), and Advanced Encryption Standard (AES) within a distributed architecture.
Changjong Kim +5 more
doaj +1 more source
Transmon Qubit Designs Toward Giga‐Scale Integration
SmartSys, Volume 2, Issue 1, March 2026.
Shi‐Li Zhang +3 more
wiley +1 more source
Challenges and opportunities on the horizon of post-quantum cryptography
Large quantum computers have the potential to break many cryptographic systems, e.g., Rivest–Shamir–Adleman, Diffie–Hellman key exchange, and the elliptical curve cryptosystem.
Bharat S. Rawal, Peter J. Curry
doaj +1 more source
A Survey of Post-Quantum Cryptography Migration in Vehicles
The advent of quantum computers makes asymmetric cryptographic algorithms insecure and vulnerable. A promising solution to ensure the continued security attributes of confidentiality, integrity, and availability is the use of Post-Quantum Cryptography ...
Nils Lohmiller +3 more
doaj +1 more source
With the emergence of quantum computers, classical cryptography is facing significant challenges. Address this compelling problem, it is the need of hour to develop Post Quantum cryptography (PQC), or quantum-resistant cryptography.
Taniya Hasija +3 more
doaj +1 more source
Energy Consumption Framework and Analysis of Post-Quantum Key-Generation on Embedded Devices
The emergence of quantum computing and Shor’s algorithm necessitates an imminent shift from current public key cryptography techniques to post-quantum-robust techniques.
J. Cameron Patterson +2 more
doaj +1 more source
PHENIX measurements of high transverse momentum ($p_T$) identified hadrons in $d$+Au and Au+Au collisions are presented. The nuclear modification factors ($R_{d{\rm A}}$ and $R_{\rm AA}$) for $\pi^0$ and $\eta$ are found to be very consistent in both ...
Sakaguchi, Takao
core +2 more sources
Towards quantum‐safe blockchain: Exploration of PQC and public‐key recovery on embedded systems
Blockchain technology ensures accountability, transparency, and redundancy, but its reliance on public‐key cryptography makes it vulnerable to quantum computing threats.
Dominik Marchsreiter
doaj +1 more source
Expressibility is a crucial factor of a parameterized quantum circuit (PQC). In the context of variational-quantum-algorithm-based quantum machine learning (QML), a QML model composed of a highly expressible PQC and a sufficient number of qubits is ...
Yu Liu +5 more
doaj +1 more source

