Results 121 to 130 of about 1,613,397 (323)

Sensitized Triplet Exciton Generation in Nanostructured Polymer Scintillators: Toward Improved γ/Neutron Discrimination

open access: yesAdvanced Functional Materials, EarlyView.
Rapid γ/neutron discrimination through PSD is achieved in liquid droplet containing nanostructured polymeric scintillator where a TTA‐active dye is dissolved. The inclusion of a properly selected and dosed sensitizer metalated porphyrin enhances discrimination sensitivity and speed by doubling the density of annihilating triplets and increasing the ...
Luca Pollice   +9 more
wiley   +1 more source

Quantum key distribution through quantum machine learning: a research review

open access: yesFrontiers in Quantum Science and Technology
Quantum cryptography has emerged as a radical research field aimed at mitigating various security threats in modern communication systems. The integration of Quantum Machine Learning (QML) protocols plays a crucial role in enhancing security measures ...
Krupa Purohit, Ajay Kumar Vyas
doaj   +1 more source

Quantum Computing Paradigms Implications for Cryptography and Data Security in Information Systems [PDF]

open access: yesITM Web of Conferences
Quantum computing has the potential to transforming computational paradigms, posing both a threat and an opportunity to contemporary cryptographic systems and data security frameworks.
Kumar Bathala Naresh   +5 more
doaj   +1 more source

A brief review on the impossibility of quantum bit commitment [PDF]

open access: yes, 1997
The desire to obtain an unconditionally secure bit commitment protocol in quantum cryptography was expressed for the first time thirteen years ago.
Claude Crépeau   +4 more
core   +5 more sources

Probabilistic foundations of quantum mechanics and quantum information

open access: yes, 2003
We discuss foundation of quantum mechanics (interpretations, superposition, principle of complementarity, locality, hidden variables) and quantum information theory.Comment: Contextual probabilistic viewpoint to quantum cryptography ...
Khrennikov, Andrei
core   +1 more source

Hybrid Keys in Practice: Combining Classical, Quantum and Post-Quantum Cryptography

open access: yesIEEE Access
Currently, with the threat of quantum computer attacks, the idea of combining several same-type primitives has reemerged. This is also the case for cryptographic keys where a hybrid quantum key exchange combination allows for preserving the security ...
Sara Ricci   +4 more
semanticscholar   +1 more source

Cryptography in a Quantum World [PDF]

open access: yes, 2016
14 pages, Invited talk at SOFSEM 2016, January 2016, Harrachov, Czech Republic.
openaire   +2 more sources

Observation of Two‐Photon Resonant Raman Scattering via the Biexciton Level in Two‐Dimensional Halide Perovskite (C6H5C2H4NH3)2PbI4

open access: yesAdvanced Functional Materials, EarlyView.
Efficient two‐photon resonant Raman scattering (TRRS) is observed in the layered perovskite (PEA)2PbI4, with the biexciton level acting as an intermediate state. TRRS undergoes two‐photon frequency shift upon input frequency tuning, persists up to 90 K, and shows clear threshold behavior and polarization selection rules.
Seung Han Shin   +7 more
wiley   +1 more source

Continuous Variable Quantum Cryptography using Two-Way Quantum Communication

open access: yes, 2008
Quantum cryptography has been recently extended to continuous variable systems, e.g., the bosonic modes of the electromagnetic field. In particular, several cryptographic protocols have been proposed and experimentally implemented using bosonic modes ...
A Ferraro   +34 more
core   +1 more source

Solvent Co‐Intercalation Enabled Ca Storage in MoS2 for Ca‐Ion Batteries

open access: yesAdvanced Functional Materials, EarlyView.
Regulating electrolyte solvation levels enables otherwise non‐intercalatable Ca2+ ions to reversibly co‐intercalate into molybdenum disulfide (MoS2) as ether‐solvated species. The intercalation reversibility is strongly governed by solvent chain length, as demonstrated using diethylene glycol dimethyl ether (G2) and tetraethylene glycol dimethyl ether (
Yudong Luo   +10 more
wiley   +1 more source

Home - About - Disclaimer - Privacy