Showing 20 articles starting at article 381
< Previous 20 articles Next 20 articles >
Categories: Computer Science: Encryption, Physics: Quantum Computing
Published 'A perfect little system': Physicists isolate a pair of atoms to observe p-wave interaction strength for the first time


Physicists have taken a first step in understanding quantum emergence -- the transition from 'one-to-many' particles -- by studying not one, not many, but two isolated, interacting particles. The result is a first, small step toward understanding natural quantum systems, and how they can lead to more powerful and effective quantum simulations. The team has measured the strength of a type of interaction -- known as 'p-wave interactions' -- between two potassium atoms. P-wave interactions are weak in naturally occurring systems, but researchers had long predicted that they have a much higher maximum theoretical limit. The team is the first to confirm that the p-wave force between particles reached this maximum.
Published The optical fiber that keeps data safe even after being twisted or bent


An optical fiber that uses the mathematical concept of topology to remain robust, thereby guaranteeing the high-speed transfer of information, has been created by physicists.
Published New quantum computing architecture could be used to connect large-scale devices


Researchers have demonstrated an architecture that can enable high fidelity and scalable communication between superconducting quantum processors. Their technique can generate and route photons, which carry quantum information, in a user-specified direction. This method could be used to develop a large-scale network of quantum processors that could efficiently communicate with one another.
Published New type of entanglement lets scientists 'see' inside nuclei


Nuclear physicists have found a new way to use the Relativistic Heavy Ion Collider (RHIC) to see the shape and details inside atomic nuclei. The method relies on particles of light that surround gold ions as they speed around the collider and a new type of quantum entanglement that's never been seen before.
Published High-performance visible-light lasers that fit on a fingertip


Researchers have created visible lasers of very pure colors from near-ultraviolet to near-infrared that fit on a fingertip. The colors of the lasers can be precisely tuned and extremely fast -- up to 267 petahertz per second, which is critical for applications such as quantum optics. The team is the first to demonstrate chip-scale narrow-linewidth and tunable lasers for colors of light below red -- green, cyan, blue, and violet.
Published Researchers show a new way to induce useful defects using invisible material properties



Much of modern electronic and computing technology is based on one idea: add chemical impurities, or defects, to semiconductors to change their ability to conduct electricity. These altered materials are then combined in different ways to produce the devices that form the basis for digital computing, transistors, and diodes. Indeed, some quantum information technologies are based on a similar principle: adding defects and specific atoms within materials can produce qubits, the fundamental information storage units of quantum computing.
Published Chaos gives the quantum world a temperature


Two seemingly different areas of physics are related in subtle ways: Quantum theory and thermodynamics. How can the laws of thermodynamics arise from the laws of quantum physics? This question has now been pursued with computer simulations, which showed that chaos plays a crucial role: Only where chaos prevails do the well-known rules of thermodynamics follow from quantum physics.
Published Quantum dots at room temp, using lab-designed protein



Quantum dots are normally made in industrial settings with high temperatures and toxic, expensive solvents -- a process that is neither economical nor environmentally friendly. But researchers have now pulled off the process at the bench using water as a solvent, making a stable end-product at room temperature. Their work opens the door to making nanomaterials in a more sustainable way by demonstrating that protein sequences not derived from nature can be used to synthesize functional materials.
Published A peculiar protected structure links Viking knots with quantum vortices



Mathematical analysis identifies a vortex structure that is impervious to decay.
Published Researchers propose methods for automatic detection of doxing


A new automated approach to detect doxing -- a form of cyberbullying in which certain private or personally identifiable information is publicly shared without an individual's consent or knowledge -- may help social media platforms better protect their users, according to researchers.
Published Microlaser chip adds new dimensions to quantum communication


With only two levels of superposition, the qubits used in today's quantum communication technologies have limited storage space and low tolerance for interference. Engineering's hyperdimensional microlaser generates 'qudits,' photons with four simultaneous levels of information. The increase in dimension makes for robust quantum communication technology better suited for real-world applications.
Published New AI model can help prevent damaging and costly data breaches


Privacy experts have created an AI algorithm that automatically tests privacy-preserving systems for potential data leaks.
Published New method to systematically find optimal quantum operation sequences for quantum computers developed


Computer scientists have succeeded in developing a method for systematically finding the optimal quantum operation sequence for a quantum computer. They have developed a systematic method that applies optimal control theory (GRAPE algorithm) to identify the theoretically optimal sequence from among all conceivable quantum operation sequences. This method is expected to become a useful tool for medium-scale quantum computers and is expected to contribute to improving the performance of quantum computers and reducing environmental impact in the near future.
Published From bits to p-bits: One step closer to probabilistic computing


Scientists have developed a mathematical description of what happens within tiny magnets as they fluctuate between states when an electric current and magnetic field are applied. Their findings could act as the foundation for engineering more advanced computers that can quantify uncertainty while interpreting complex data.
Published Thinking like a cyber-attacker to protect user data


Researchers have shown that a component of modern computer processors that enables different areas of the chip to communicate with each other is susceptible to a side-channel attack. An attacker can monitor how traffic from two different cores on a processor interferes with each other to extract secret information, like a cryptographic key.
Published A key role for quantum entanglement


A method known as quantum key distribution has long held the promise of communication security unattainable in conventional cryptography. An international team of scientists has now demonstrated experimentally, for the first time, an approach to quantum key distribution that is based on high-quality quantum entanglement -- offering much broader security guarantees than previous schemes.
Published Quantum cryptography: Hacking is futile


An international team has successfully implemented an advanced form of quantum cryptography for the first time. Moreover, encryption is independent of the quantum device used and therefore even more secure against hacking attempts.
Published 'Pulling back the curtain' to reveal a molecular key to The Wizard of Oz


Many people and companies worry about sensitive data getting hacked, so encrypting files with digital keys has become more commonplace. Now, researchers have developed a durable molecular encryption key from sequence-defined polymers that are built and deconstructed in a sequential way. They hid their molecular key in the ink of a letter, which was mailed and then used to decrypt a file with text from a classic story.
Published Radio waves for the detection of hardware tampering


Up to now, protecting hardware against manipulation has been a laborious business: expensive, and only possible on a small scale. And yet, two simple antennas might do the trick.
Published Secure communication with light particles


While quantum computers offer many novel possibilities, they also pose a threat to internet security since these supercomputers make common encryption methods vulnerable. Based on the so-called quantum key distribution, researchers have developed a new, tap-proof communication network.