Implementing the Three-Stage Quantum Cryptography Protocol [PDF]
We present simple implementations of Kak's three-stage quantum cryptography protocol. The case where the transformation is applied to more than one qubit at the same time is also considered.
arxiv
Reconfigurable Three‐Dimensional Superconducting Nanoarchitectures
3D superconducting nanostructures offer new possibilities for emergent physical phenomena. However, fabricating complex geometries remains challenging. Here 3D nanoprinting of complex 3D superconducting nanoarchitectures is established. As well as propagating superconducting vortices in 3D, anisotropic superconducting properties with geometric ...
Elina Zhakina+11 more
wiley +1 more source
Artificial intelligence and quantum cryptography
The technological advancements made in recent times, particularly in artificial intelligence (AI) and quantum computing, have brought about significant changes in technology. These advancements have profoundly impacted quantum cryptography, a field where
Petar Radanliev
doaj +1 more source
A Programmable Crypto-Processor for National Institute of Standards and Technology Post-Quantum Cryptography Standardization Based on the RISC-V Architecture. [PDF]
Lee J, Kim W, Kim JH.
europepmc +1 more source
Computational Simulations of Metal–Organic Frameworks to Enhance Adsorption Applications
This review highlights the significance of molecular simulations in expanding the understanding of metal–organic frameworks (MOFs) and improving their gas adsorption applications. The historical development and implementation of molecular simulations in the MOF field are given, high‐throughput computational screening studies used to unlock the ...
Hilal Daglar+3 more
wiley +1 more source
Physical-Layer Security, Quantum Key Distribution, and Post-Quantum Cryptography. [PDF]
Djordjevic IB.
europepmc +1 more source
Cryptography: Classical versus Post-Quantum [PDF]
The advantages of post-quantum cryptography over classical cryptography are covered in this survey. We address several post-quantum cryptography techniques. We conclude that the deployment of quantum-safe cryptographic systems is anticipated to be the future of secure communication, and that the development of post-quantum cryptography is essential to ...
arxiv
Security of Quantum Cryptography against Collective Attacks [PDF]
Eli Biham, Tal Mor
openalex +1 more source
Synthetic Control of Water‐Stable Hybrid Perovskitoid Semiconductors
Hybrid metal‐halide perovskites are promising semiconductors for optoelectronics, yet their water stability is problematic. A new synthesis method is developed using lead iodide and cysteamine under various pH conditions, forming stable perovskitoid structures.
Jiyoon Kim+8 more
wiley +1 more source
A System-on-a-Chip Implementation of a Post-Quantum Cryptography Scheme for Smart Meter Data Communications. [PDF]
Costa VLRD, López J, Ribeiro MV.
europepmc +1 more source