Quantum PhysicsOur aim is to experimentally study the possibility of distinguishing between quantum sources of randomness--recently proved to be theoretically incomputable--and some well-known computable sources of pseudo-randomness. Incomputability is a necessary, but not sufficient "symptom" of "true...
Anthony Laing of the University of Bristol described the technique as a “nice way to generate random numbers as it makes use of technology already embedded in the phone”. However, he cautioned, “It might be possible to design certain hacks based on quantum states of light ...
which uses quantum mechanics to securely exchange encryption keys. Data encrypted via QKD creates a random quantum state that is difficult to copy. Many QKD protocols can also detect eavesdroppers. The National Security Agency, however, has stated this option isnot viable on its ownas it now s...
Randonautica is a mobile app that uses a quantum random number generator to give you a set of coordinates for your local area. The idea is to encourage you to explore your area with an idea in mind of what you’d like to come across. It could be something simple as seeing something wo...
To do this, miners take the information that needs encoding — such as transaction data, the timestamp and the block header — and add random data (a value called the “nonce”) until the algorithm produces a hash that meets the target difficulty. ...
We explain how to construct a computational reference clock based on Bitcoin. We show how to achieve constant level of multilinearity for witness encryption by using SNARKs. We propose a new construction of a witness encryption scheme which is of independent interest: our scheme, based on Subset...
The most common way of constructing a hash function (e.g., SHA-1) is to iterate a compression function on the input message. The compression function is usually designed from scratch or made out of a block-cipher. In this paper, we introduce a new security notion for hash-functions, str...
(For the record, the thing that makes them deflect is called the Lorentz force, but we don't need to go into all the details here.) That means one side of the material will see more electrons than the other, so a potential difference (voltage) will appear across the material at right...
Since the interface potential is expected to exhibit only a small temperature dependence, the set of piecewise functions g(h;T) at different temperatures may be combined to build a master curve g(h) over the whole range of film thicknesses spanned in the temperature interval of the ...
Inductive bias aims to construct an algo- rithm that can learn how to predict a specific target output. It is noteworthy that the early stopping algorithm may work before convergence. However, the L2-SP is robust against such problems. Furthermore, it is easier to implement than freezing the...