Results 161 to 170 of about 471,861 (312)

Introduction to Quantum Cryptography [PDF]

open access: yes, 2013
Broadly speaking, cryptography is the problem of doing communication or computation involving two or more parties who may not trust one another. The best known cryptographic problem is the transmission of secret messages. Suppose wish to communicate in secret. For example, you may wish to give your credit card number to a merchant in exchange for goods,
openaire   +3 more sources

Structure Identification of CO Monolayer on Ag(111) Using Atomic Force Microscopy

open access: yesAdvanced Materials Interfaces, EarlyView.
Physisorption systems of CO molecules on metal surfaces have long been studied. Nondestructive analysis of weakly adsorbed systems on surfaces still remains a challenging task. In this study, the structure of the CO monolayer is successfully determined by directly visualizing individual CO molecules using atomic force microscopy (AFM).
Mitsuo Kimura   +2 more
wiley   +1 more source

Quantum Cryptography

open access: yesScientific American, 1992
Bennett, C, Brassard, G, Ekert, A
openaire   +2 more sources

Terahertz Metamaterial Sensors: Design Theory, Optimization Approach, and Advancements in Biosensing Applications

open access: yesAdvanced Materials Technologies, EarlyView.
This review provides an in‐depth overview of the design principles and optimization strategies for terahertz (THz) metamaterials (MMs) sensors based on the dielectric perturbation theory. Various structures and methods are explored to enhance sensor performance, focusing on improving sensitivity and Q‐factor.
Lei Cao   +9 more
wiley   +1 more source

Research on the application of quantum-secure algorithms in 5G network

open access: yesDianxin kexue
With the widespread application of 5G networks, data transmission speed and capacity have been significantly improved, promoting innovative development in fields such as the Internet of things, autonomous driving, and telemedicine.
WANG Congli   +5 more
doaj  

Modern Methods of Providing of Safety of Information by Quantum-mechanical Transformations

open access: yesБезопасность информационных технологий, 2010
This article is devoted to the review of basic perspective directions of development of quantum cryptography. Most perspective methods provided security of information by quantum-mechanic laws are examined in the article.
A. S. Gerasimov
doaj  

Post-Quantum Cryptography: Securing Digital Communication in the Quantum Era [PDF]

open access: yesarXiv
The advent of quantum computing poses a profound threat to traditional cryptographic systems, exposing vulnerabilities that compromise the security of digital communication channels reliant on RSA, ECC, and similar classical encryption methods. Quantum algorithms, notably Shor's algorithm, exploit the inherent computational power of quantum computers ...
arxiv  

Quantum Cryptography in Noisy Channels

open access: green, 1995
Hoi‐Kwong Lo, H. F. Chau
openalex   +2 more sources

Anti‐Counterfeiting Tags with Camouflaged QR Codes on Nanocavities, Using Polymer‐Dispersed Liquid Crystals

open access: yesAdvanced Materials Technologies, EarlyView.
A QR code, printed through a commercial printer on a thin plastic foil, pre‐coated with a nanocavity is proposed as an anti‐counterfeiting label. Nanocavity imparts distinctive optical properties in terms of light reflection and transmission. A thin layer of polymer‐dispersed liquid crystals (PDLC) is used to camouflage the QR code, that become ...
Giuseppe Nicoletta   +6 more
wiley   +1 more source

Home - About - Disclaimer - Privacy