Results 121 to 130 of about 1,613,397 (323)
Rapid γ/neutron discrimination through PSD is achieved in liquid droplet containing nanostructured polymeric scintillator where a TTA‐active dye is dissolved. The inclusion of a properly selected and dosed sensitizer metalated porphyrin enhances discrimination sensitivity and speed by doubling the density of annihilating triplets and increasing the ...
Luca Pollice +9 more
wiley +1 more source
Quantum key distribution through quantum machine learning: a research review
Quantum cryptography has emerged as a radical research field aimed at mitigating various security threats in modern communication systems. The integration of Quantum Machine Learning (QML) protocols plays a crucial role in enhancing security measures ...
Krupa Purohit, Ajay Kumar Vyas
doaj +1 more source
Quantum Computing Paradigms Implications for Cryptography and Data Security in Information Systems [PDF]
Quantum computing has the potential to transforming computational paradigms, posing both a threat and an opportunity to contemporary cryptographic systems and data security frameworks.
Kumar Bathala Naresh +5 more
doaj +1 more source
A brief review on the impossibility of quantum bit commitment [PDF]
The desire to obtain an unconditionally secure bit commitment protocol in quantum cryptography was expressed for the first time thirteen years ago.
Claude Crépeau +4 more
core +5 more sources
Probabilistic foundations of quantum mechanics and quantum information
We discuss foundation of quantum mechanics (interpretations, superposition, principle of complementarity, locality, hidden variables) and quantum information theory.Comment: Contextual probabilistic viewpoint to quantum cryptography ...
Khrennikov, Andrei
core +1 more source
Hybrid Keys in Practice: Combining Classical, Quantum and Post-Quantum Cryptography
Currently, with the threat of quantum computer attacks, the idea of combining several same-type primitives has reemerged. This is also the case for cryptographic keys where a hybrid quantum key exchange combination allows for preserving the security ...
Sara Ricci +4 more
semanticscholar +1 more source
Cryptography in a Quantum World [PDF]
14 pages, Invited talk at SOFSEM 2016, January 2016, Harrachov, Czech Republic.
openaire +2 more sources
Efficient two‐photon resonant Raman scattering (TRRS) is observed in the layered perovskite (PEA)2PbI4, with the biexciton level acting as an intermediate state. TRRS undergoes two‐photon frequency shift upon input frequency tuning, persists up to 90 K, and shows clear threshold behavior and polarization selection rules.
Seung Han Shin +7 more
wiley +1 more source
Continuous Variable Quantum Cryptography using Two-Way Quantum Communication
Quantum cryptography has been recently extended to continuous variable systems, e.g., the bosonic modes of the electromagnetic field. In particular, several cryptographic protocols have been proposed and experimentally implemented using bosonic modes ...
A Ferraro +34 more
core +1 more source
Solvent Co‐Intercalation Enabled Ca Storage in MoS2 for Ca‐Ion Batteries
Regulating electrolyte solvation levels enables otherwise non‐intercalatable Ca2+ ions to reversibly co‐intercalate into molybdenum disulfide (MoS2) as ether‐solvated species. The intercalation reversibility is strongly governed by solvent chain length, as demonstrated using diethylene glycol dimethyl ether (G2) and tetraethylene glycol dimethyl ether (
Yudong Luo +10 more
wiley +1 more source

