Results 51 to 60 of about 1,492,941 (204)
This paper presents a programmable metasurface‐based Meta Key Distribution (MKD) system for secure, protocol‐independent key exchange in indoor wireless settings. By embedding entropy into the wireless channel, it enables lightweight, compatible cryptographic key generation.
Xinyu Li +7 more
wiley +1 more source
Securing Generative Artificial Intelligence with Parallel Magnetic Tunnel Junction True Randomness
True random numbers can protect generative artificial intelligence (GAI) models from attacks. A highly parallel, spin‐transfer torque magnetic tunnel junction‐based system is demonstrated that generates high‐quality, energy‐efficient random numbers.
Youwei Bao, Shuhan Yang, Hyunsoo Yang
wiley +1 more source
Combined effects of microplastics and nitrogen on bivalve‐mediated biogeochemical cycling
Abstract Estuary health is declining globally due to an increase in anthropogenic stressors including microplastics and nutrient loading. These stressors are often studied individually; however, it is vital to understand their combined effects on coastal ecosystems to inform ecosystem‐based management.
Saskia E. Foreman +3 more
wiley +1 more source
Combating Fake News with Cryptography in Quantum Era with Post-Quantum Verifiable Image Proofs
In an age of AI-generated content and deepfakes, fake news and disinformation are increasingly spread using manipulated or fabricated images. To address this challenge, we introduce Post-Quantum VerITAS, a cryptographic framework for verifying the ...
Maksim Iavich
doaj +1 more source
High-Speed Variable Polynomial Toeplitz Hash Algorithm Based on FPGA
In the Quantum Key Distribution (QKD) network, authentication protocols play a critical role in safeguarding data interactions among users. To keep pace with the rapid advancement of QKD technology, authentication protocols must be capable of processing ...
Si-Cheng Huang +4 more
doaj +1 more source
Leftover Hashing From Quantum Error Correction: Unifying the Two Approaches to the Security Proof of Quantum Key Distribution [PDF]
We show that the Mayers-Shor-Preskill approach and Renner’s approach to proving the security of quantum key distribution (QKD) are essentially the same. We begin our analysis by considering a special case of QKD called privacy amplification (PA).
T. Tsurumaru
semanticscholar +1 more source
Quantum Communications Based on Quantum Hashing
In this paper we consider an application of the recently proposed quantum hashing technique for computing Boolean functions in the quantum communication model. The combination of binary functions on non-binary quantum hash function is done via polynomial presentation, which we have called a characteristic of a Boolean function.
openaire +4 more sources
A deep learning framework called MolVisGNN is proposed to fuse 3D molecular visual information of drugs with multi‐source features, which proves the importance of 3D molecular visual information of drugs and the advancedness of this model in the field of drug discovery, and provides a reference for how to more comprehensively express small molecule ...
Zimai Zhang +9 more
wiley +1 more source
Quantum Turbo Decoding for Quantum Channels Exhibiting Memory
Inspired by the success of classical turbo codes, quantum turbo codes (QTCs) have also been conceived for near-hashing-bound transmission of quantum information over memoryless quantum channels.
Mohd Azri Mohd Izhar +7 more
doaj +1 more source
Parallel Algorithm for Approximate State Graph Exploration With Restricted Memory Footprint
ABSTRACT We investigate the performance of algorithms that explore large state graphs of finite state machines without input by following paths. To improve on anchor‐based and candidate‐based explorations and to avoid the performance overhead of full anchor lists and the tuning sensitivity of timeout‐based methods, we propose and analyze exploration ...
Jörg Keller, Sebastian Litzinger
wiley +1 more source

