Quantum computing devices are believed to be powerful in solving the pri...
Quantum technologies require methods for preparing and manipulating enta...
Deep generative chemistry models emerge as powerful tools to expedite dr...
Digital signatures are widely used for providing security of communicati...
Quantum computing technologies pose a significant threat to the currentl...
We suggest a new protocol for the information reconciliation stage of qu...
In this work, we discuss in detail a flaw in the original security proof...
We construct a new protocol for attribute-based encryption with the use ...
Complete characterization of states and processes that occur within quan...
In the present work, a peculiar property of hash-based signatures allowi...
Blockchain is a distributed ledger, which is protected against malicious...
Many commonly used public key cryptosystems will become insecure once a
...
Quantum key distribution (QKD) enables unconditionally secure communicat...
Understanding the properties of quantum matter is an outstanding challen...
Quantum key distribution (QKD) offers a practical solution for secure
co...
Quantum key distribution (QKD) provides information-theoretic security i...