More Accurate Than Heisenberg Allows?
Ludwig-Maximilians-Universitat Munchen (07/27/10)
Quantum cryptography is the safest data encryption method, and takes advantage of the fact that transmitted information can only be quantified with a strictly limited degree of precision. Scientists at ETH Zurich and Ludwig-Maximilians-Universitat (LMU) in Munich have made a discovery in how the use of a quantum memory impacts this uncertainty. "The result not only enhances our understanding of quantum memories, it also provides us with a method for determining the degree of correlation between two quantum particles," says ETH Zurich professor Matthias Christandl. "Moreover, the effect we have observed could yield a means of testing the security of quantum cryptographic systems." Quantum mechanics dictates that the measurement of a parameter can itself disturb a particle's state, and this effect is harnessed by quantum cryptography to encrypt data and thwart eavesdropping. The LMU and ETH Zurich teams have demonstrated that the result of a measurement on a quantum particle can be predicted with greater accuracy if data about the particle is contained in a quantum memory, which can consist of atoms or ions.
Tuesday, July 27, 2010
Blog: More Accurate Than Heisenberg Allows?
Subscribe to:
Post Comments (Atom)
Blog Archive
-
►
2012
(35)
- ► April 2012 (13)
- ► March 2012 (16)
- ► February 2012 (3)
- ► January 2012 (3)
-
►
2011
(118)
- ► December 2011 (9)
- ► November 2011 (11)
- ► October 2011 (7)
- ► September 2011 (13)
- ► August 2011 (7)
- ► April 2011 (8)
- ► March 2011 (11)
- ► February 2011 (12)
- ► January 2011 (15)
-
▼
2010
(183)
- ► December 2010 (16)
- ► November 2010 (15)
- ► October 2010 (15)
- ► September 2010 (25)
- ► August 2010 (19)
-
▼
July 2010
(15)
- Blog: Sites Feed Personal Details to New Tracking ...
- Blog: IBM Scientists Create Most Comprehensive Map...
- Blog: More Accurate Than Heisenberg Allows?
- Blog: XML Pioneer Pitches Functional Programming f...
- Blog: Bringing Data Mining Into the Mainstream
- Blog: Machine Science
- Blog: Neurons to Power Future Computers
- Blog: Data Mining Made Faster
- Blog: Protein From Poplar Trees Can Be Used to Gre...
- Blog: Self-Sustaining Robot Has an Artificial Gut
- Blog: Passwords That Are Simple--and Safe
- Blog: Virtual Universe Study Proves 80 Year Old Th...
- Blog: Crunching Cancer With Numbers
- Blog: Cloud security: Google won't like the enterp...
- Blog: International Conference Confronts Data Deluge
- ► April 2010 (21)
- ► March 2010 (7)
- ► February 2010 (6)
- ► January 2010 (6)
-
►
2009
(120)
- ► December 2009 (5)
- ► November 2009 (12)
- ► October 2009 (2)
- ► September 2009 (3)
- ► August 2009 (16)
- ► April 2009 (4)
- ► March 2009 (20)
- ► February 2009 (9)
- ► January 2009 (19)
-
►
2008
(139)
- ► December 2008 (15)
- ► November 2008 (16)
- ► October 2008 (17)
- ► September 2008 (2)
- ► August 2008 (2)
- ► April 2008 (12)
- ► March 2008 (25)
- ► February 2008 (16)
- ► January 2008 (6)
-
►
2007
(17)
- ► December 2007 (4)
- ► November 2007 (4)
- ► October 2007 (7)
Blog Labels
- research
- CSE
- security
- software
- web
- AI
- development
- hardware
- algorithm
- hackers
- medical
- machine learning
- robotics
- data-mining
- semantic web
- quantum computing
- Cloud computing
- cryptography
- network
- EMR
- search
- NP-complete
- linguistics
- complexity
- data clustering
- optimization
- parallel
- performance
- social network
- HIPAA
- accessibility
- biometrics
- connectionist
- cyber security
- passwords
- voting
- XML
- biological computing
- neural network
- user interface
- DNS
- access control
- firewall
- graph theory
- grid computing
- identity theft
- project management
- role-based
- HTML5
- NLP
- NoSQL
- Python
- cell phone
- database
- java
- open-source
- spam
- GENI
- Javascript
- SQL-Injection
- Wikipedia
- agile
- analog computing
- archives
- biological
- bots
- cellular automata
- computer tips
- crowdsourcing
- e-book
- equilibrium
- game theory
- genetic algorithm
- green tech
- mobile
- nonlinear
- p
- phone
- prediction
- privacy
- self-book publishing
- simulation
- testing
- virtual server
- visualization
- wireless
No comments:
Post a Comment