6GWorld

A physical layer security scheme for 6G wireless networks using post-quantum cryptography – Science Direct

This paper presents the design and implementation of an encryption scheme that ensures the confidentiality of data transmission in the physical layer of 6G networks. Our findings indicate that the proposed scheme offers satisfactory security protection against eavesdropping attacks by significantly enhancing the confidentiality of the transmitted signal.

A comprehensive survey on quantum computer usage: How many qubits are employed for what purposes? – Arxiv

A comprehensive survey on quantum computer usage: How many qubits are employed for what purposes? – Arxiv

Most news on quantum computers (QCs) consists of outstanding
experiments, and thereby we may overlook how typical usages of QCs have been. Such oversight,
if exists, could lead to an insufficient understanding of the present situation in the research and development of QCs and may
result in possible obstacles to long-term research design. In other words, we need an alternative perspective based on typical
usages as well as the standard one based on monumental experiments.

Pin It on Pinterest