Results 71 to 80 of about 12,882 (191)
Measurement-device-independent QKD with Modified Coherent State
The measurement-device-independent quantum key distribution (MDI-QKD) protocol has been proposed for the purpose of removing the detector side channel attacks.
Chen, Wei +6 more
core +1 more source
ABSTRACT The infiltration of counterfeit, fraudulent, and suspect items into civil nuclear supply chains, notably within power generation and medical isotope production, poses severe safety and security threats. The ever‐increasing growth in nuclear installations (70 power plants are under construction and another 100 are in the planning stage) and the
Hafiz Ahmed
wiley +1 more source
Quantum key distribution (QKD) is regarded as an alternative to traditional cryptography methods for securing data communication by quantum mechanics rather than computational complexity.
Rui Lin +10 more
doaj +1 more source
Coexistence of continuous variable QKD with intense DWDM classical channels
We demonstrate experimentally the feasibility of continuous variable quantum key distribution (CV-QKD) in dense-wavelength-division multiplexing networks (DWDM), where QKD will typically have to coexist with several co- propagating (forward or backward ...
Alléaume, Romain +2 more
core +1 more source
The paper demonstrates a chip scale (4.5 x 4.5 mm2) silicon integrated system that is capable of distributing entangled photons over 160 km single mode fibers without dispersion compensations and external optical filters. The results highlight the potential for massive production and large‐scale deployed quantum integrated circuits for a future ...
Yue Qin, Hongnan Xu, Hon Ki Tsang
wiley +1 more source
Secure Authentication via Quantum Physical Unclonable Functions: A Review
This in‐depth review article examines the origins, development, and evolution of Quantum Physical Unclonable Functions (QPUFs), with a particular focus on their use in secure authentication. The topic is motivated and introduced in detail, addressing both theoretical foundations and practical implementations, and is supported by a systematic article ...
Pol Julià Farré +8 more
wiley +1 more source
Relay QKD Networks & Bit Transport
We show how it is possible to operate end-to-end relays on a QKD network by treating each relay as a trusted eavesdropper operating an intercept/resend strategy. It is shown that, by introducing the concept of bit transport, the key rate compared to that of single-link channels is unaffected. The technique of bit transport extends the capability of QKD
Phoenix, Simon J. D. +1 more
openaire +2 more sources
FPGA Realization of a Novel Hyperchaos Augmented Image Encryption Algorithm
With the rapid growth of multimedia communication, protecting image data has become increasingly critical. This article proposes a novel 3‐stage hyperchaos‐based augmented image encryption technique (3SHAIET) that utilizes a three‐stage process with chaotic systems of increasing dimensionality (e.g., six‐dimensional [6D], 8D, and 9D) to enhance ...
Wassim Alexan +6 more
wiley +1 more source
Secure Quantum Key Distribution
Secure communication plays a crucial role in the Internet Age. Quantum mechanics may revolutionise cryptography as we know it today. In this Review Article, we introduce the motivation and the current state of the art of research in quantum cryptography.
Curty, Marcos +2 more
core +1 more source
Cybersecurity Driven Quantum Digital Twin for Proactive Threat Reversal in Open RAN
This paper presents a novel cybersecurity‐driven quantum digital twin (CQDT) architecture for proactive defence in 6G Open RAN. By integrating quantum observables and reinforcement learning, the framework maintains high fidelity and suppresses entropy under adversarial CPTP noise. CQDT achieves real‐time adaptation with sub‐20 ms latency, meeting URLLC
Yassir Al‐Karawi +2 more
wiley +1 more source

