Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
State-of-the-art survey of quantum cryptography
A Kumar, S Garhwal - Archives of Computational Methods in Engineering, 2021 - Springer
In today Internet era, confidential information transmitted over an insecure channel. With the
significant development in the area of quantum computing, there is a need for unconditional …
significant development in the area of quantum computing, there is a need for unconditional …
Advances in artificial intelligence and machine learning for quantum communication applications
M Mafu - IET Quantum Communication, 2024 - Wiley Online Library
Artificial intelligence (AI) and classical machine learning (ML) techniques have
revolutionised numerous fields, including quantum communication. Quantum …
revolutionised numerous fields, including quantum communication. Quantum …
A novel quantum key distribution resistant against large‐pulse attacks
Quantum key distribution (QKD) offers information‐theoretic security by leveraging the
principles of quantum mechanics. This means the security is independent of all future …
principles of quantum mechanics. This means the security is independent of all future …
Security of Bennett–Brassard 1984 quantum-key distribution under a collective-rotation noise channel
The security analysis of the Ekert 1991 (E91), Bennett 1992 (B92), six-state protocol, Scarani–
Acín–Ribordy–Gisin 2004 (SARG04) quantum key distribution (QKD) protocols, and their …
Acín–Ribordy–Gisin 2004 (SARG04) quantum key distribution (QKD) protocols, and their …
Quantum technology for development framework as a tool for science diplomacy
M Mafu, M Senekane - Frontiers in Research Metrics and Analytics, 2023 - frontiersin.org
The state-of-the-art quantum technologies leverage the unique principles of quantum
mechanics, which include quantization, uncertainty principle, interference, entanglement …
mechanics, which include quantization, uncertainty principle, interference, entanglement …
Security of partially corrupted quantum repeater networks
Abstract Quantum Key Distribution allows two parties to establish a secret key that is secure
against computationally unbounded adversaries. To extend the distance between parties …
against computationally unbounded adversaries. To extend the distance between parties …
Security of Partially Corrupted Repeater Chains
Quantum Key Distribution allows two parties to establish a secret key that is secure against
computationally unbounded adversaries. To extend the distance between parties, quantum …
computationally unbounded adversaries. To extend the distance between parties, quantum …
Time–energy high-dimensional one-side device-independent quantum key distribution
HZ Bao, WS Bao, Y Wang, RK Chen, HX Ma… - Chinese …, 2017 - iopscience.iop.org
Compared with full device-independent quantum key distribution (DI-QKD), one-side device-
independent QKD (1sDI-QKD) needs fewer requirements, which is much easier to meet. In …
independent QKD (1sDI-QKD) needs fewer requirements, which is much easier to meet. In …
Intercept-Resend Attack on SARG04 Protocol: An Extended Work
AH Yousif, OS Mustafa, DF Mustafa… - Polytechnic …, 2020 - polytechnic-journal.epu.edu.iq
In this paper, intercept/resend eavesdropper attack over SARG04 quantum key distribution
protocol is investigated by bounding the information of an eavesdropper; then, the attack has …
protocol is investigated by bounding the information of an eavesdropper; then, the attack has …
[PDF][PDF] Quantum convolutional neural networks for high energy physics
LR Cervantes Guevara - 2022 - repositorioinstitucional.buap.mx
Artificial Intelligence is a tool that is increasingly becoming an integral element of scientific
research. High Energy Physics, whose experiments produce some of the largest amounts of …
research. High Energy Physics, whose experiments produce some of the largest amounts of …