Results 101 to 110 of about 471,861 (312)
Intuitive Understanding of Quantum Computation and Post-Quantum Cryptography [PDF]
Post-quantum cryptography is inevitable. National Institute of Standards and Technology (NIST) starts standardizing quantum-resistant public-key cryptography (aka post-quantum cryptography). The reason is that investment in quantum computing is blooming which poses significant threats to our currently deployed cryptographic algorithms.
arxiv
Quantum Emitters in Hexagonal Boron Nitride: Principles, Engineering and Applications
Quantum emitters in hexagonal boron nitride have emerged as a promising candidate for quantum information science. This review examines the fundamentals of these quantum emitters, including their level structures, defect engineering, and their possible chemical structures.
Thi Ngoc Anh Mai+8 more
wiley +1 more source
Identification and Reversible Optical Switching of NV+ Centers in Diamond
NV+ centers in diamond are predicted to coexist with NV0 and NV– centers, but direct experimental confirmation remains challenging. Using positron annihilation spectroscopy with in situ light illumination, a charge transition NV+/0 is observed at 1.234(8) eV.
Marcel Dickmann+13 more
wiley +1 more source
State Decoding in Multi-Stage Cryptography Protocols [PDF]
This paper presents a practical method of quantum tomography for decoding the state of photons in a multistage cryptography protocol. This method works if the polarization angles are defined on a fixed plane, as is assumed in several quantum cryptography protocols.
arxiv
A spin group (SG)‐based mechanism is proposed to realize a single pair of Weyl points. PT‐symmetric nodal lines (NLs) persist under T‐breaking, protected by the combination of SG and P symmetry. When considering spin‐orbit coupling, the SG‐protected NL will split into Weyl points, which will also induce anomalous transport phenomena arising from ...
Shifeng Qian+6 more
wiley +1 more source
Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms. [PDF]
Farooq S+6 more
europepmc +1 more source
Trusted Certificates in Quantum Cryptography [PDF]
This paper analyzes the performance of Kak's three stage quantum cryptographic protocol based on public key cryptography against a man-in-the-middle attack. A method for protecting against such an attack is presented using certificates distributed by a trusted third party.
arxiv
Quantum Cryptography and Computation [PDF]
Human desire to communicate secretly is at least as old as writing itself and goes back to the beginnings of our civilisation. Methods of secret communication were developed by many ancient societies, including those of Mesopotamia, Egypt, India, and China, but details regarding the origins of cryptology1 remain unknown [1].
openaire +2 more sources
The dynamic polarization reversal of coexisting normal and relaxor ferroelectrics in 1D TMAPbI₃ (tetramethylammonium, TMA) is deciphered through combined experimental and theoretical approaches. By bridging atomic‐scale motion, macroscopic polarization switching, and depolarization effects, a universal methodology is established to engineer next ...
Chen Xue+8 more
wiley +1 more source
Improving the Performance of Quantum Cryptography by Using the Encryption of the Error Correction Data. [PDF]
Pastushenko VA, Kronberg DA.
europepmc +1 more source