Results 101 to 110 of about 471,861 (312)

Intuitive Understanding of Quantum Computation and Post-Quantum Cryptography [PDF]

open access: yesarXiv, 2020
Post-quantum cryptography is inevitable. National Institute of Standards and Technology (NIST) starts standardizing quantum-resistant public-key cryptography (aka post-quantum cryptography). The reason is that investment in quantum computing is blooming which poses significant threats to our currently deployed cryptographic algorithms.
arxiv  

Quantum Emitters in Hexagonal Boron Nitride: Principles, Engineering and Applications

open access: yesAdvanced Functional Materials, EarlyView.
Quantum emitters in hexagonal boron nitride have emerged as a promising candidate for quantum information science. This review examines the fundamentals of these quantum emitters, including their level structures, defect engineering, and their possible chemical structures.
Thi Ngoc Anh Mai   +8 more
wiley   +1 more source

Identification and Reversible Optical Switching of NV+ Centers in Diamond

open access: yesAdvanced Functional Materials, EarlyView.
NV+ centers in diamond are predicted to coexist with NV0 and NV– centers, but direct experimental confirmation remains challenging. Using positron annihilation spectroscopy with in situ light illumination, a charge transition NV+/0 is observed at 1.234(8) eV.
Marcel Dickmann   +13 more
wiley   +1 more source

State Decoding in Multi-Stage Cryptography Protocols [PDF]

open access: yesarXiv, 2013
This paper presents a practical method of quantum tomography for decoding the state of photons in a multistage cryptography protocol. This method works if the polarization angles are defined on a fixed plane, as is assumed in several quantum cryptography protocols.
arxiv  

Single Pair of Weyl Points Evolve From Spin Group‐Protected Nodal Line in Half‐Metallic Ferromagnet V3S4

open access: yesAdvanced Functional Materials, EarlyView.
A spin group (SG)‐based mechanism is proposed to realize a single pair of Weyl points. PT‐symmetric nodal lines (NLs) persist under T‐breaking, protected by the combination of SG and P symmetry. When considering spin‐orbit coupling, the SG‐protected NL will split into Weyl points, which will also induce anomalous transport phenomena arising from ...
Shifeng Qian   +6 more
wiley   +1 more source

Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms. [PDF]

open access: yesSensors (Basel), 2023
Farooq S   +6 more
europepmc   +1 more source

Trusted Certificates in Quantum Cryptography [PDF]

open access: yesarXiv, 2006
This paper analyzes the performance of Kak's three stage quantum cryptographic protocol based on public key cryptography against a man-in-the-middle attack. A method for protecting against such an attack is presented using certificates distributed by a trusted third party.
arxiv  

Quantum Cryptography and Computation [PDF]

open access: yes, 1995
Human desire to communicate secretly is at least as old as writing itself and goes back to the beginnings of our civilisation. Methods of secret communication were developed by many ancient societies, including those of Mesopotamia, Egypt, India, and China, but details regarding the origins of cryptology1 remain unknown [1].
openaire   +2 more sources

Enhanced Electromechanical Response in 1D Hybrid Perovskites: Coexistence of Normal and Relaxor Ferroelectric Phases

open access: yesAdvanced Functional Materials, EarlyView.
The dynamic polarization reversal of coexisting normal and relaxor ferroelectrics in 1D TMAPbI₃ (tetramethylammonium, TMA) is deciphered through combined experimental and theoretical approaches. By bridging atomic‐scale motion, macroscopic polarization switching, and depolarization effects, a universal methodology is established to engineer next ...
Chen Xue   +8 more
wiley   +1 more source

Home - About - Disclaimer - Privacy