Results 141 to 150 of about 929,226 (361)

On the (relation between) efficiency and secret key rate of QKD

open access: yesScientific Reports
The processes of evaluation and comparison play a vital role in the development of a scientific field. In the field of quantum cryptography (especially quantum key distribution, QKD), the so-called secret key rate is used for characterizing the ...
Georgi Bebrov
doaj   +1 more source

Quantum cryptography: Public key distribution and coin tossing [PDF]

open access: yesTheoretical Computer Science, 2014
Charles H. Bennett, Gilles Brassard
semanticscholar   +1 more source

Finite-key security against coherent attacks in quantum key distribution

open access: yes, 2010
The work by Christandl, K\"onig and Renner [Phys. Rev. Lett. 102, 020504 (2009)] provides in particular the possibility of studying unconditional security in the finite-key regime for all discrete-variable protocols.
Acín A   +9 more
core   +1 more source

NanoMOF‐Based Multilevel Anti‐Counterfeiting by a Combination of Visible and Invisible Photoluminescence and Conductivity

open access: yesAdvanced Functional Materials, EarlyView.
This study presents novel anti‐counterfeiting tags with multilevel security features that utilize additional disguise features. They combine luminescent nanosized Ln‐MOFs with conductive polymers to multifunctional mixed‐matrix membranes and powder composites. The materials exhibit visible/NIR emission and matrix‐based conductivity even as black bodies.
Moritz Maxeiner   +9 more
wiley   +1 more source

Single Pair of Weyl Points Evolve From Spin Group‐Protected Nodal Line in Half‐Metallic Ferromagnet V3S4

open access: yesAdvanced Functional Materials, EarlyView.
A spin group (SG)‐based mechanism is proposed to realize a single pair of Weyl points. PT‐symmetric nodal lines (NLs) persist under T‐breaking, protected by the combination of SG and P symmetry. When considering spin‐orbit coupling, the SG‐protected NL will split into Weyl points, which will also induce anomalous transport phenomena arising from ...
Shifeng Qian   +6 more
wiley   +1 more source

Quantum Key Distribution

open access: yes
Invited brief chapter to appear in Quantum Technologies: Trends and Implications for Cyber Defence (Springer, 2025): https://link.springer.com/book ...
Kish, Sebastian   +2 more
openaire   +2 more sources

Quantum Cryptography: Key Distribution and Beyond

open access: yesQuanta, 2018
Uniquely among the sciences, quantum cryptography has driven both foundational research as well as practical real-life applications. We review the progress of quantum cryptography in the last decade, covering quantum key distribution and other applications. Quanta 2017; 6: 1–47.
Srikanth Radhakrishna   +2 more
openaire   +5 more sources

Synchrotron Radiation for Quantum Technology

open access: yesAdvanced Functional Materials, EarlyView.
Materials and interfaces underpin quantum technologies, with synchrotron and FEL methods key to understanding and optimizing them. Advances span superconducting and semiconducting qubits, 2D materials, and topological systems, where strain, defects, and interfaces govern performance.
Oliver Rader   +10 more
wiley   +1 more source

Engineering Strategies for 2D Layered Tin Halide Perovskite Field‐Effect Transistors

open access: yesAdvanced Functional Materials, EarlyView.
2D halide perovskites are promising candidates for field‐effect transistor (FET) applications due to their high stability and suppressed ion migration in the presence of bulky organic spacers. This review systematically summarizes the optimization engineering strategies of 2D perovskite FETs and future challenges, which provide guidance for developing ...
Shuanglong Wang   +4 more
wiley   +1 more source

Photon counting for quantum key distribution with peltier cooled InGaAs/InP APDs [PDF]

open access: green, 2001
Damien Stucki   +5 more
openalex   +2 more sources

Home - About - Disclaimer - Privacy