Results 91 to 100 of about 8,659,098 (325)
Survey of Quantum Key Application for Guaranteeing Content Security [PDF]
From the perspective of guaranteeing content security,a quantum key can enable secret communication with unconditional security.It can extremely improve the security of programs when applied to cryptographic applications.Considering that currently ...
LI Xiaoxing, MENG Kun
doaj +1 more source
Completely Device Independent Quantum Key Distribution
Quantum key distribution (QKD) is a provably secure way for two distant parties to establish a common secret key, which then can be used in a classical cryptographic scheme.
Aguilar, E. A. +3 more
core +1 more source
Phase‐changing liquids enable untethered pneumatic actuation in soft robotics but suffer from volatility and storage challenges. This work reports a simple method to encapsulate Novec 7000 within micron‐thin alginate shells via in situ injection and ionic crosslinking.
Rayan A. M. Basodan +3 more
wiley +1 more source
This paper presents a novel approach to reducing oxide layers on metal powders using low‐temperature hydrogen dielectric barrier discharge plasmas at atmospheric pressure. Unlike conventional hydrogen‐plasma reductions, the powders do not contact the plasma directly.
Shukang Zhang +3 more
wiley +1 more source
Detector-Device-Independent Quantum Key Distribution
Recently, a quantum key distribution (QKD) scheme based on entanglement swapping, called measurement-device-independent QKD (mdiQKD), was proposed to bypass all detector side-channel attacks.
Bussieres, Felix +5 more
core +2 more sources
In this study, the interplay of dipolar dynamics and ionic charge transport in MOF compounds is investigated. Synthesizing the novel structure CFA‐25 with integrated freely rotating dipolar groups, local and macroscopic effects, including interactions with Cs cations are explored.
Ralph Freund +6 more
wiley +1 more source
Research on quantum key distribution technology in intelligent substation
In order to improve the security of the communication data of the power system,the feasibility of the application of quantum key distribution technology in the monitoring system of the intelligent substation was analyzed and demonstrated by combining the
Xiaopeng YANG +3 more
doaj
Measurement-device-independent quantum key distribution with quantum memories
We generalize measurement-device-independent quantum key distribution [ H.-K. Lo, M. Curty, and B. Qi, Phys. Rev. Lett. 108, 130503 (2012) ] to the scenario where the Bell-state measurement station contains also heralded quantum memories.
Abruzzo, Silvestre +2 more
core +1 more source
A buried‐junction DSPEC design is introduced that leverages cascade charge transfer to enhance efficiency, stability, and versatility. This approach facilitates effective charge transfer and minimizes recombination losses, leading to significant improvements.
Jun‐Hyeok Park +8 more
wiley +1 more source
Quantum Key Relay Scheme Based on Trusted Control Center
A transmit quantum key relay scheme based on trusted control center and trusted quantum relay server was proposed.The quantum key one-time pad encryption algorithm was used in the design of trusted relay protocol.Upon the establishment of trusted relay ...
Shaosheng Jiang, Ruinan Chi, Xiaojun Wen
doaj

