Results 111 to 120 of about 47,878 (305)
A brief review on the impossibility of quantum bit commitment [PDF]
The desire to obtain an unconditionally secure bit commitment protocol in quantum cryptography was expressed for the first time thirteen years ago.
Claude Crépeau+4 more
core +5 more sources
A spin group (SG)‐based mechanism is proposed to realize a single pair of Weyl points. PT‐symmetric nodal lines (NLs) persist under T‐breaking, protected by the combination of SG and P symmetry. When considering spin‐orbit coupling, the SG‐protected NL will split into Weyl points, which will also induce anomalous transport phenomena arising from ...
Shifeng Qian+6 more
wiley +1 more source
The dynamic polarization reversal of coexisting normal and relaxor ferroelectrics in 1D TMAPbI₃ (tetramethylammonium, TMA) is deciphered through combined experimental and theoretical approaches. By bridging atomic‐scale motion, macroscopic polarization switching, and depolarization effects, a universal methodology is established to engineer next ...
Chen Xue+8 more
wiley +1 more source
Cu‐based catalysts as a cornerstone in advancing sustainable energy technologies are fully reviewed in this manuscript, highlighting their potential in photo‐ and electrocatalysis. It includes metallic copper, copper oxides, copper sulfides, copper halide perovskites, copper‐based metal–organic frameworks (MOFs), and covalent organic frameworks (COFs),
Jéssica C. de Almeida+16 more
wiley +1 more source
A Vertically‐Stacked Optoelectronic Sensor for Localized Hemodynamics Monitoring
This work introduces a hemodynamics monitoring sensor that features vertically stacked microLEDs and a heterogeneously integrated photodetector. The vertically stacked microLEDs enable localized measurements, and by designing the interoptode distance according to the depth of the target region, this vertically stacked optoelectronic sensor is ...
Taeyeon Lee+9 more
wiley +1 more source
Quantum Cryptography and Computation [PDF]
Human desire to communicate secretly is at least as old as writing itself and goes back to the beginnings of our civilisation. Methods of secret communication were developed by many ancient societies, including those of Mesopotamia, Egypt, India, and China, but details regarding the origins of cryptology1 remain unknown [1].
openaire +2 more sources
From a database of 170 pentagonal 2D materials, 4 candidates exhibiting altermagnetic ordering are screened. Furthermore, the spin‐splitting and unconventional boundary states in the pentagonal 2D altermagnetic monolayer MnS2 are investigated. A MnS2‐based altermagnetic tunneling junction is designed and, through ab initio quantum transport simulations,
Jianhua Wang+8 more
wiley +1 more source
Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms. [PDF]
Farooq S+6 more
europepmc +1 more source
Optical Whispering‐Gallery Mode as a Fingerprint of Magnetic Ordering in Van der Waals Layered CrSBr
A novel nanoscale optomagnetic sensing approach is developed using whispering‐gallery mode resonances in a self‐rolled‐up microcavity. This method enables ultra‐sensitive detection of weak magnetism by correlating resonance shifts with magnetic susceptibility.
Chi Pang+13 more
wiley +1 more source
Improving the Performance of Quantum Cryptography by Using the Encryption of the Error Correction Data. [PDF]
Pastushenko VA, Kronberg DA.
europepmc +1 more source