Results 51 to 60 of about 1,492,941 (204)

Protocol‐Agnostic Meta Key Distribution for Encrypted Wireless Communications Enabled by Space‐Time‐Coding Metasurface

open access: yesAdvanced Science, Volume 13, Issue 7, 3 February 2026.
This paper presents a programmable metasurface‐based Meta Key Distribution (MKD) system for secure, protocol‐independent key exchange in indoor wireless settings. By embedding entropy into the wireless channel, it enables lightweight, compatible cryptographic key generation.
Xinyu Li   +7 more
wiley   +1 more source

Securing Generative Artificial Intelligence with Parallel Magnetic Tunnel Junction True Randomness

open access: yesAdvanced Intelligent Systems, Volume 8, Issue 2, February 2026.
True random numbers can protect generative artificial intelligence (GAI) models from attacks. A highly parallel, spin‐transfer torque magnetic tunnel junction‐based system is demonstrated that generates high‐quality, energy‐efficient random numbers.
Youwei Bao, Shuhan Yang, Hyunsoo Yang
wiley   +1 more source

Combined effects of microplastics and nitrogen on bivalve‐mediated biogeochemical cycling

open access: yesLimnology and Oceanography, Volume 71, Issue 2, February 2026.
Abstract Estuary health is declining globally due to an increase in anthropogenic stressors including microplastics and nutrient loading. These stressors are often studied individually; however, it is vital to understand their combined effects on coastal ecosystems to inform ecosystem‐based management.
Saskia E. Foreman   +3 more
wiley   +1 more source

Combating Fake News with Cryptography in Quantum Era with Post-Quantum Verifiable Image Proofs

open access: yesJournal of Cybersecurity and Privacy
In an age of AI-generated content and deepfakes, fake news and disinformation are increasingly spread using manipulated or fabricated images. To address this challenge, we introduce Post-Quantum VerITAS, a cryptographic framework for verifying the ...
Maksim Iavich
doaj   +1 more source

High-Speed Variable Polynomial Toeplitz Hash Algorithm Based on FPGA

open access: yesEntropy, 2023
In the Quantum Key Distribution (QKD) network, authentication protocols play a critical role in safeguarding data interactions among users. To keep pace with the rapid advancement of QKD technology, authentication protocols must be capable of processing ...
Si-Cheng Huang   +4 more
doaj   +1 more source

Leftover Hashing From Quantum Error Correction: Unifying the Two Approaches to the Security Proof of Quantum Key Distribution [PDF]

open access: yesIEEE Transactions on Information Theory, 2018
We show that the Mayers-Shor-Preskill approach and Renner’s approach to proving the security of quantum key distribution (QKD) are essentially the same. We begin our analysis by considering a special case of QKD called privacy amplification (PA).
T. Tsurumaru
semanticscholar   +1 more source

Quantum Communications Based on Quantum Hashing

open access: yes, 2013
In this paper we consider an application of the recently proposed quantum hashing technique for computing Boolean functions in the quantum communication model. The combination of binary functions on non-binary quantum hash function is done via polynomial presentation, which we have called a characteristic of a Boolean function.
openaire   +4 more sources

Leveraging 3D Molecular Spatial Visual Information and Multi‐Perspective Representations for Drug Discovery

open access: yesAdvanced Science, Volume 13, Issue 2, 9 January 2026.
A deep learning framework called MolVisGNN is proposed to fuse 3D molecular visual information of drugs with multi‐source features, which proves the importance of 3D molecular visual information of drugs and the advancedness of this model in the field of drug discovery, and provides a reference for how to more comprehensively express small molecule ...
Zimai Zhang   +9 more
wiley   +1 more source

Quantum Turbo Decoding for Quantum Channels Exhibiting Memory

open access: yesIEEE Access, 2018
Inspired by the success of classical turbo codes, quantum turbo codes (QTCs) have also been conceived for near-hashing-bound transmission of quantum information over memoryless quantum channels.
Mohd Azri Mohd Izhar   +7 more
doaj   +1 more source

Parallel Algorithm for Approximate State Graph Exploration With Restricted Memory Footprint

open access: yesConcurrency and Computation: Practice and Experience, Volume 38, Issue 1, January 2026.
ABSTRACT We investigate the performance of algorithms that explore large state graphs of finite state machines without input by following paths. To improve on anchor‐based and candidate‐based explorations and to avoid the performance overhead of full anchor lists and the tuning sensitivity of timeout‐based methods, we propose and analyze exploration ...
Jörg Keller, Sebastian Litzinger
wiley   +1 more source

Home - About - Disclaimer - Privacy