Results 61 to 70 of about 1,613,397 (323)

Integrating Post-Quantum Cryptography and Blockchain to Secure Low-Cost IoT Devices

open access: yesIEEE Transactions on Industrial Informatics
In the contemporary era, the global proliferation of Internet of Things (IoT) devices exceeds 15 billion, serving functions from wearables to smart grid monitoring.
Aniello Castiglione   +5 more
semanticscholar   +1 more source

An Update on Quantum Cryptography [PDF]

open access: yes, 2007
Although written aboutfifteen years ago, Wiesner’s seminal paper, to which the origin of quantum cryptography must be traced back, did not appear in print until the spring of 1983 [W83]. The first published account of these ideas thus appeard in the proceedings of the second annual CRYPTO conference [BBBW83].
Charles H. Bennett, Gilles Brassard
openaire   +1 more source

Circuit-noise-resilient virtual distillation

open access: yesCommunications Physics
Quantum error mitigation (QEM) is vital for improving quantum algorithms’ accuracy on noisy near-term devices. A typical QEM method, called Virtual Distillation (VD), can suffer from imperfect implementation, potentially leading to worse outcomes than ...
Xiao-Yue Xu   +4 more
doaj   +1 more source

Protocols and plan of quantum cryptography [PDF]

open access: yesVojnotehnički Glasnik, 2012
Along with the development of confidentiality of data and resources, there is a need to develop systems that would provide confidentiality. Currently, the most used systems are classical cryptographic systems and encryption public key systems.
Milorad S. Markagić
doaj   +1 more source

Quantum cloning

open access: yes, 2005
The impossibility of perfectly copying (or cloning) an arbitrary quantum state is one of the basic rules governing the physics of quantum systems. The processes that perform the optimal approximate cloning have been found in many cases.
Antonio Acín   +23 more
core   +2 more sources

Organizing the interface—Plasma membrane architecture and receptor dynamics in virus‐cell interactions

open access: yesFEBS Letters, EarlyView.
Plasma membranes contain dynamic nanoscale domains that organize lipids and receptors. Because viruses operate at similar scales, this architecture shapes early infection steps, including attachment, receptor engagement, and entry. Using influenza A virus and HIV‐1 as examples, we highlight how receptor nanoclusters, multivalent glycan interactions ...
Jan Schlegel, Christian Sieben
wiley   +1 more source

A light‐triggered Time‐Resolved X‐ray Solution Scattering (TR‐XSS) workflow with application to protein conformational dynamics

open access: yesFEBS Open Bio, EarlyView.
Time‐resolved X‐ray solution scattering captures how proteins change shape in real time under near‐native conditions. This article presents a practical workflow for light‐triggered TR‐XSS experiments, from data collection to structural refinement. Using a calcium‐transporting membrane protein as an example, the approach can be broadly applied to study ...
Fatemeh Sabzian‐Molaei   +3 more
wiley   +1 more source

Isogeny-based post-quantum key exchange protocols [PDF]

open access: yes, 2020
The goal of this project is to understand and analyze the supersingular isogeny Diffie Hellman (SIDH), a post-quantum key exchange protocol which security lies on the isogeny-finding problem between supersingular elliptic curves.
Sorinas Capdevila, Ernest
core  

Continuous variable quantum cryptography [PDF]

open access: yes, 1999
We propose a quantum cryptographic scheme in which small phase and amplitude modulations of CW light beams carry the key information.
A. Einstein   +18 more
core   +2 more sources

Implementing Post-quantum Cryptography for Developers

open access: yesSN Computer Science, 2023
Widely used public key cryptography is threatened by the development of quantum computers. Post-quantum algorithms have been designed for the purpose of protecting sensitive data against attacks with quantum computers. National Institute of Standards and
Julius Hekkala   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy