Results 71 to 80 of about 1,613,397 (323)

Classical Cryptographic Protocols in a Quantum World [PDF]

open access: yes, 2015
Cryptographic protocols, such as protocols for secure function evaluation (SFE), have played a crucial role in the development of modern cryptography. The extensive theory of these protocols, however, deals almost exclusively with classical attackers. If
Hallgren, Sean, Smith, Adam, Song, Fang
core   +2 more sources

Carboxylic‐Acid Functionalized Multiwalled Carbon Nanotube‐Alkane‐Based Resistive Temperature Sensor for Cold Chain Applications

open access: yesAdvanced Engineering Materials, EarlyView.
This study presents a reversible temperature sensor with high switching ratio, ∼103. The device is fabricated using PET‐ITO and carbon nanotube dispersions in alkane. Considering its application in cold chain logistics, a proof‐of‐concept with LED is showcased. Thus, a temperature drop below the threshold temperature (crystallization temperature of the
Sunil Kumar Behera   +8 more
wiley   +1 more source

ANALYSIS OF QUANTUM SECURE DIRECT COMMUNICATION PROTOCOLS

open access: yesКомпютерні системи та інформаційні технології, 2023
The development of modern computer technologies endangers the confidentiality of information, which is usually ensured by traditional cryptographic means. This circumstance forces us to look for new methods of protection.
Tetiana Okhrimenko   +2 more
doaj   +1 more source

Key distribution in PKC through Quantas

open access: yes, 2010
Cryptography literally means "The art & science of secret writing & sending a message between two parties in such a way that its contents cannot be understood by someone other than the intended recipient". and Quantum word is related with "Light".
Goel, Aditya
core   +1 more source

The breakdown flash of Silicon Avalance Photodiodes - backdoor for eavesdropper attacks? [PDF]

open access: yes, 2001
Silicon avalanche photodiodes are the most sensitive photodetectors in the visible to near infrared region. However, when they are used for single photon detection in a Geiger mode, they are known to emit light on the controlled breakdown used to detect ...
Bouwmeester D.   +5 more
core   +3 more sources

Deterministic Detection of Single Ion Implantation

open access: yesAdvanced Engineering Materials, EarlyView.
Focused ion beam implantation with high detection efficiencies will enable the rapid and scalable fabrication of advanced spin‐based technologies such as qubits. This work presents the detection efficiencies of a wide range of ions implanted into solid‐state hosts, with efficiencies of >90% recorded for ion species and substrate combinations of ...
Mason Adshead   +6 more
wiley   +1 more source

A Survey on the Quantum Security of Block Cipher-Based Cryptography

open access: yesIEEE Access
The development of quantum computers represents an important advancement in computing, using quantum mechanics to address problems that were previously difficult to solve. This technological advancement poses a challenge for cryptographic systems.
S. E. Bootsma, M. De Vries
doaj   +1 more source

Fostering Innovation: Streamlining Magnetocaloric Materials Research by Digitalization

open access: yesAdvanced Engineering Materials, EarlyView.
Magnetocaloric cooling (MCE) is an environmentally friendly refrigeration method with great potential. Optimizing MCE materials involves the preparation and screening of large quantities of samples, which in turn generates a large amount of data. A digitalization approach is presented that uses ontologies, knowledge graphs, and digital workflows to ...
Simon Bekemeier   +17 more
wiley   +1 more source

Side-channel Analysis of Lattice-based Post-quantum Cryptography: Exploiting Polynomial Multiplication

open access: yesIACR Cryptology ePrint Archive, 2022
Polynomial multiplication algorithms such as Toom-Cook and the Number Theoretic Transform are fundamental building blocks for lattice-based post-quantum cryptography.
Catinca Mujdei   +5 more
semanticscholar   +1 more source

A quantum encryption design featuring confusion, diffusion, and mode of operation

open access: yesScientific Reports, 2021
Quantum cryptography—the application of quantum information processing and quantum computing techniques to cryptography has been extensively investigated.
Zixuan Hu, Sabre Kais
doaj   +1 more source

Home - About - Disclaimer - Privacy