Results 91 to 100 of about 47,878 (305)
Probabilistic foundations of quantum mechanics and quantum information
We discuss foundation of quantum mechanics (interpretations, superposition, principle of complementarity, locality, hidden variables) and quantum information theory.Comment: Contextual probabilistic viewpoint to quantum cryptography ...
Khrennikov, Andrei
core +1 more source
Off‐centering of cations in pavonite‐structured Ag1.75InSb5.75Se11 (AISS) breaks crystal symmetry, inducing Rashba‐like band splitting and high band degeneracy, thus enhancing Seebeck coefficients. Soft bonds between off‐centered cations and Se atoms increase phonon scattering, achieving low lattice thermal conductivity (0.22 W m−1K−1 at 723 K). Doping
Chenghao Xie+7 more
wiley +1 more source
Block encryption of quantum messages [PDF]
In modern cryptography, block encryption is a fundamental cryptographic primitive. However, it is impossible for block encryption to achieve the same security as one-time pad.
Liang, Min, Yang, Li
core +1 more source
Key distribution in PKC through Quantas
Cryptography literally means "The art & science of secret writing & sending a message between two parties in such a way that its contents cannot be understood by someone other than the intended recipient". and Quantum word is related with "Light".
Goel, Aditya
core +1 more source
Fluorine‐functionalized organic spacers (2F, 3F, 5F) are investigated to identify as optimal passivation agents for 3D MAPI perovskite solar cells (PSCs). The study highlights how altering fluorine positioning affects defect passivation, low‐dimensional phase (LDP) formation, and stability, emphasizing its role in molecular interactions and offering ...
Ali Semerci+15 more
wiley +1 more source
Evaluation of Post-Quantum Distributed Ledger Cryptography
This paper evaluates the current cybersecurity vulnerability of the prolific use of Elliptical Curve Digital Signature Algorithm (**ECDSA**) cryptography in use by the Bitcoin Core, Ethereum, Bitcoin Cash, and enterprise blockchains such as Multi-Chain ...
Robert Campbell Sr.
doaj +2 more sources
Quantum Cryptography as a Retrodiction Problem [PDF]
We propose a quantum key distribution protocol based on a quantum retrodiction protocol, known as the Mean King problem. The protocol uses a two way quantum channel. We show security against coherent attacks in a transmission-error free scenario, even if Eve is allowed to attack both transmissions. This establishes a connection between retrodiction and
Werner, A. H., Franz, T., Werner, R. F.
openaire +5 more sources
This study examines the surface characteristics of AlInP (001), crucial for advanced solar cells and photoelectrochemical devices. Using theoretical modeling and experiments, it identifies how phosphorus‐rich and indium‐rich surfaces create mid‐gap states that pin the Fermi level and influence ultrafast electron dynamics.
Mohammad Amin Zare Pour+11 more
wiley +1 more source
Quantum asymmetric cryptography with symmetric keys
Based on quantum encryption, we present a new idea for quantum public-key cryptography (QPKC) and construct a whole theoretical framework of a QPKC system.
A. Kawachi+41 more
core +1 more source
Self‐organized Criticality in Neuromorphic Nanowire Networks With Tunable and Local Dynamics
Memristive nanowire networks (NWNs) are shown to be electrically tunable to a critical state where specific local dynamics evaluated by multiterminal characterization are exploited as feature selection in nonlinear transformation (NLT) tasks.
Fabio Michieletti+3 more
wiley +1 more source