-
181
qTrustNet Virtual Private Network (VPN): Enhancing Security in the Quantum Era
Published 2025-01-01“…This PQC algorithm is designed to withstand the decryption capabilities of quantum computers, thus providing long-term security. To further bolster security, the encryption key of the PQC algorithm is protected using Physically Unclonable Function (PUF) technology. …”
Get full text
Article -
182
A Toolchain for Assisting Migration of Software Executables Towards Post-Quantum Cryptography
Published 2025-01-01“…Quantum computing poses a significant global threat to modern security mechanisms. …”
Get full text
Article -
183
STUDY OF COMPATIBILITY OF METHODS AND TECHNOLOGIES OF HIGH-LEVEL PROTOCOLS AND ERROR-CORRECTING CODES
Published 2024-12-01“…Emerging technologies like quantum computing and artificial intelligence introduce both opportunities and threats, necessitating continuous innovation in these fields. …”
Get full text
Article -
184
Ultra‐Thin Strain‐Relieving Si1−xGex Layers Enabling III‐V Epitaxy on Si
Published 2025-02-01“…Abstract The explosion of artificial intelligence, the possible end of Moore's law, dawn of quantum computing, and the continued exponential growth of data communications traffic have brought new urgency to the need for laser integration on the diversified Si platform. …”
Get full text
Article -
185
Tailoring the Anomalous Hall Effect in van der Waals Ferromagnet Fe3GeTe2
Published 2025-01-01“…Two-dimensional van der Waals magnetic materials have shown fascinating natural ferromagnetic properties at the atomic level, which has great potential in the fields of low power spintronics, quantum computing, and optical communication. [Methods] Herein, the ferromagnetism and magnetic anisotropy of bulk Fe3GeTe2 (FGT) were investigated. …”
Get full text
Article -
186
Direct observation of chiral edge current at zero magnetic field in a magnetic topological insulator
Published 2025-01-01Get full text
Article -
187
Automation of quantum dot measurement analysis via explainable machine learning
Published 2025-01-01“…The rapid development of quantum dot (QD) devices for quantum computing has necessitated more efficient and automated methods for device characterization and tuning. …”
Get full text
Article -
188
Tools for the Analysis of Quantum Protocols Requiring State Generation Within a Time Window
Published 2024-01-01“…Specifically, with an example of a blind quantum computing protocol, we illustrate how they may be used to infer <inline-formula><tex-math notation="LaTeX">$w$</tex-math></inline-formula> and <inline-formula><tex-math notation="LaTeX">$p$</tex-math></inline-formula> to optimize the rate of successful protocol execution.…”
Get full text
Article -
189
-
190
Single-qubit anisotropy induced by micromagnet in Si-MOS quantum dot
Published 2025-01-01Get full text
Article -
191
Design and validation of a-SiC/SiN hybrid photonic platform for integrated quantum photonics
Published 2024-01-01“…Recent efforts in quantum photonics emphasize on-chip generation, manipulation, and detection of single photons for quantum computing and quantum communication. In quantum photonic chips, single photons are often generated using parametric down-conversion and quantum dots. …”
Get full text
Article -
192
Programmable quantum circuits in a large-scale photonic waveguide array
Published 2025-02-01Get full text
Article -
193
General method to synthesize aggregation‐induced emission molecules via carbon‐sulfur bond activation
Published 2025-01-01Get full text
Article -
194
Quantum machine learning with Adaptive Boson Sampling via post-selection
Published 2025-01-01“…Abstract The implementation of large-scale universal quantum computation represents a challenging and ambitious task on the road to quantum processing of information. …”
Get full text
Article -
195
Quaternary Neural Belief Propagation Decoding of Quantum LDPC Codes With Overcomplete Check Matrices
Published 2025-01-01“…Quantum low-density parity-check (QLDPC) codes are promising candidates for error correction in quantum computers. One of the major challenges in implementing QLDPC codes in quantum computers is the lack of a universal decoder. …”
Get full text
Article -
196
Proxy re-signature scheme based on isomorphisms of polynomial
Published 2017-02-01“…Most of the existing proxy resignature schemes were based on the hardness of big integer factoring,discrete logarithm,elliptic curve.However,none of them can resist the attack by a quantum computer.Motivated by these concerns,a new proxy resignature scheme was proposed.By employing secret affine transformations and homogeneous polynomials,the proposed scheme could implement the signature transformation with high-efficiency,and meanwhile it was secure against the attack by a quantum computer.The results of analysis showed that the proposed scheme was correct and consistent,and had the unforgeability in the random oracle model.Compared with the existing schemes,the proposed scheme not only inherits the resistance to quantum attack and high efficiency from the multivariate public key cryptosystems,but also has the properties of multi-use,transparent and private proxy.…”
Get full text
Article -
197
Quantum Contextual Hypergraphs, Operators, Inequalities, and Applications in Higher Dimensions
Published 2025-01-01“…Quantum contextuality plays a significant role in supporting quantum computation and quantum information theory. The key tools for this are the Kochen–Specker and non-Kochen–Specker contextual sets. …”
Get full text
Article -
198
Comparative study of quantum error correction strategies for the heavy-hexagonal lattice
Published 2025-02-01“…Topological quantum error correction is a milestone in the scaling roadmap of quantum computers, which targets circuits with trillions of gates that would allow running quantum algorithms for real-world problems. …”
Get full text
Article -
199
A Survey of Post-Quantum Cryptography Migration in Vehicles
Published 2025-01-01“…The advent of quantum computers makes asymmetric cryptographic algorithms insecure and vulnerable. …”
Get full text
Article -
200
Scalable circuit depth reduction in feedback-based quantum optimization with a quadratic approximation
Published 2025-01-01“…Combinatorial optimization problems are one of the areas where near-term noisy quantum computers may have practical advantage against classical computers. …”
Get full text
Article