Results 41 to 50 of about 3,809 (250)

An Enhanced Architecture to Resolve Public-Key Cryptographic Issues in the Internet of Things (IoT), Employing Quantum Computing Supremacy

open access: yesSensors, 2022
The Internet of Things (IoT) strongly influences the world economy; this emphasizes the importance of securing all four aspects of the IoT model: sensors, networks, cloud, and applications.
Shuhab Shamshad   +4 more
doaj   +1 more source

Circuit-noise-resilient virtual distillation

open access: yesCommunications Physics
Quantum error mitigation (QEM) is vital for improving quantum algorithms’ accuracy on noisy near-term devices. A typical QEM method, called Virtual Distillation (VD), can suffer from imperfect implementation, potentially leading to worse outcomes than ...
Xiao-Yue Xu   +4 more
doaj   +1 more source

Optimized Implementation and Analysis of CHAM in Quantum Computing

open access: yesApplied Sciences, 2023
A quantum computer capable of running the Grover search algorithm, which reduces the complexity of brute-force attacks by a square root, has the potential to undermine the security strength of symmetric-key cryptography and hash functions.
Yujin Yang   +3 more
doaj   +1 more source

A light‐triggered Time‐Resolved X‐ray Solution Scattering (TR‐XSS) workflow with application to protein conformational dynamics

open access: yesFEBS Open Bio, EarlyView.
Time‐resolved X‐ray solution scattering captures how proteins change shape in real time under near‐native conditions. This article presents a practical workflow for light‐triggered TR‐XSS experiments, from data collection to structural refinement. Using a calcium‐transporting membrane protein as an example, the approach can be broadly applied to study ...
Fatemeh Sabzian‐Molaei   +3 more
wiley   +1 more source

Protocols and plan of quantum cryptography [PDF]

open access: yesVojnotehnički Glasnik, 2012
Along with the development of confidentiality of data and resources, there is a need to develop systems that would provide confidentiality. Currently, the most used systems are classical cryptographic systems and encryption public key systems.
Milorad S. Markagić
doaj   +1 more source

Exploring Dipolar Dynamics and Ionic Transport in Metal‐Organic Frameworks: Experimental and Theoretical Insights

open access: yesAdvanced Functional Materials, EarlyView.
In this study, the interplay of dipolar dynamics and ionic charge transport in MOF compounds is investigated. Synthesizing the novel structure CFA‐25 with integrated freely rotating dipolar groups, local and macroscopic effects, including interactions with Cs cations are explored.
Ralph Freund   +6 more
wiley   +1 more source

Graphical Methods in Device-Independent Quantum Cryptography [PDF]

open access: yesQuantum, 2019
We introduce a framework for graphical security proofs in device-independent quantum cryptography using the methods of categorical quantum mechanics. We are optimistic that this approach will make some of the highly complex proofs in quantum cryptography
Spencer Breiner   +2 more
doaj   +1 more source

Intermolecular Interactions as Driving Force of Increasing Multiphoton Absorption in a Perylene Diimide‐Based Coordination Polymer

open access: yesAdvanced Functional Materials, EarlyView.
This study uncovers the unexplored role of intermolecular interactions in multiphoton absorption in coordination polymers. By analyzing [Zn2tpda(DMA)2(DMF)0.3], it shows how the electronic coupling of the chromophores and confinement in the MOF enhance two‐and three‐photon absorption.
Simon Nicolas Deger   +11 more
wiley   +1 more source

Pentagonal 2D Altermagnets: Material Screening and Altermagnetic Tunneling Junction Device Application

open access: yesAdvanced Functional Materials, EarlyView.
From a database of 170 pentagonal 2D materials, 4 candidates exhibiting altermagnetic ordering are screened. Furthermore, the spin‐splitting and unconventional boundary states in the pentagonal 2D altermagnetic monolayer MnS2 are investigated. A MnS2‐based altermagnetic tunneling junction is designed and, through ab initio quantum transport simulations,
Jianhua Wang   +8 more
wiley   +1 more source

A Survey on the Quantum Security of Block Cipher-Based Cryptography

open access: yesIEEE Access
The development of quantum computers represents an important advancement in computing, using quantum mechanics to address problems that were previously difficult to solve. This technological advancement poses a challenge for cryptographic systems.
S. E. Bootsma, M. De Vries
doaj   +1 more source

Home - About - Disclaimer - Privacy