Results 21 to 30 of about 5,434 (190)
Provably-secure symmetric private information retrieval with quantum cryptography
Private information retrieval (PIR) is a database query protocol that provides user privacy, in that the user can learn a particular entry of the database of his interest but his query would be hidden from the data centre.
Kon, Wen Yu, Lim, Charles Ci Wen
core +1 more source
The water permeability of amorphous carbon dots (CDs) is demonstrated by investigating their plasticization. Novel polyamide‐based and amorphous nanoparticles are synthesized by controlling their inner packing density. Water plasticization is evidenced by the decrease of the CDs glass transition temperature with increasing the hydration degree.
Elisa Sturabotti +8 more
wiley +1 more source
Group theory in cryptography [PDF]
This paper is a guide for the pure mathematician who would like to know more about cryptography based on group theory. The paper gives a brief overview of the subject, and provides pointers to good textbooks, key research papers and recent survey papers ...
Blackburn, Simon R. +2 more
core
Opportunities of Semiconducting Oxide Nanostructures as Advanced Luminescent Materials in Photonics
The review discusses the challenges of wide and ultrawide bandgap semiconducting oxides as a suitable material platform for photonics. They offer great versatility in terms of tuning microstructure, native defects, doping, anisotropy, and micro‐ and nano‐structuring. The review focuses on their light emission, light‐confinement in optical cavities, and
Ana Cremades +7 more
wiley +1 more source
Philosophical Aspects of Quantum Information Theory [PDF]
Quantum information theory represents a rich subject of discussion for those interested in the philosphical and foundational issues surrounding quantum mechanics for a simple reason: one can cast its central concerns in terms of a long-familiar question:
Timpson, Christopher G
core +2 more sources
Quantum authentication of classical messages
Although key distribution is arguably the most studied context on which to apply quantum cryptographic techniques, message authentication, i.e., certifying the identity of the message originator and the integrity of the message sent, can also benefit ...
Curty, Marcos, Santos, David J.
core +1 more source
Light‐Induced Entropy for Secure Vision
This work realized a ternary true random number generator by exploiting stochastic traps emerging within multiple junction interfaces, and quantitatively validated the generation of high‐quality random numbers. Furthermore, it successfully demonstrated diverse applications, including AI‐resilient image security, thereby providing a valuable guide for ...
Juhyung Seo +9 more
wiley +1 more source
We propose an efficient four-intensity decoy-state BB84 protocol and derive concise security bounds for this protocol with the universally composable finite-key analysis method.
Gao, Ming +4 more
core +1 more source
We introduce a molecular strategy to assemble one‐dimensional (1D) materials into two‐dimensional (2D) van der Waals metal–organic frameworks (MOFs). Crystals of [FeX(pzX)(bpy)] (X = Cl, F) form anisotropic 2D layers that can be mechanically exfoliated into thin sheets.
Eleni C. Mazarakioti +12 more
wiley +1 more source
Asymptotic Spectral Measures, Quantum Mechanics, and E-theory
We study the relationship between POV-measures in quantum theory and asymptotic morphisms in the operator algebra E-theory of Connes-Higson. This is done by introducing the theory of "asymptotic" PV-measures and their integral correspondence with ...
Martinez, Diane, Trout, Jody
core +4 more sources

