ISSN:
eISSN:
Disciplines
(Field of Science):
- information and communication technology (Engineering and Technology)
- biomedical engineering (Engineering and Technology)
- materials engineering (Engineering and Technology)
- computer and information sciences (Natural sciences)
- mathematics (Natural sciences)
- physical sciences (Natural sciences)
(Field of Science)
Ministry points: Help
Year | Points | List |
---|---|---|
Year 2025 | 100 | Ministry scored journals list 2024 |
Year | Points | List |
---|---|---|
2025 | 100 | Ministry scored journals list 2024 |
2024 | 100 | Ministry scored journals list 2024 |
2023 | 100 | Ministry Scored Journals List |
2022 | 100 | Ministry Scored Journals List 2019-2022 |
2021 | 100 | Ministry Scored Journals List 2019-2022 |
2020 | 100 | Ministry Scored Journals List 2019-2022 |
2019 | 100 | Ministry Scored Journals List 2019-2022 |
2018 | 40 | A |
2017 | 40 | A |
2016 | 35 | A |
2015 | 35 | A |
2014 | 40 | A |
2013 | 30 | A |
2012 | 30 | A |
2011 | 30 | A |
2010 | 27 | A |
Model:
Points CiteScore:
Year | Points |
---|---|
Year 2023 | 4.1 |
Year | Points |
---|---|
2023 | 4.1 |
2022 | 4 |
2021 | 3.6 |
2020 | 3.8 |
2019 | 3.8 |
2018 | 3.5 |
2017 | 3.4 |
2016 | 3.6 |
2015 | 3.2 |
2014 | 3 |
2013 | 2.6 |
2012 | 2.6 |
2011 | 2.3 |
Impact Factor:
Open Policy Finder
(ex-Sherpa services):
Papers published in journal
Filters
total: 4
Catalog Journals
Year 2025
-
How decoherence affects the security of BB84 quantum key distribution protocol
PublicationWe present how the mechanisms of quantum Darwinism allow for information leakage in the standard BB84 quantum key distribution protocol, a paradigmatic prepare-and-measure quantum cryptography scenario. We work within the decoherence theory framework and employ the model of measurements provided by quantum Darwinism. We investigate how much of the information about the results crucial for the cryptographic key to be kept secret...
Year 2021
-
Quantum randomness protected against detection loophole attacks
PublicationDevice and semi-device-independent private quantum randomness generators are crucial for applications requiring private randomness. However, they are vulnerable to detection inefficiency attacks and this limits severely their usage for practical purposes. Here, we present a method for protecting semi-device-independent private quantum randomness generators in prepare-and-measure scenarios against detection inefficiency attacks....
Year 2020
-
An approach to constructing genuinely entangled subspaces of maximal dimension
PublicationGenuinely entangled subspaces (GESs) are the class of completely entangled subspaces that contain only genuinely multiparty entangled states. They constitute a particularly useful notion in the theory of entanglement but also have found an application, for instance, in quantum error correction and cryptography. In a recent study (Demianowicz and Augusiak in Phys Rev A 98:012313, 2018), we have shown how GESs can be efficiently...
Year 2010
-
Two-spinors, oscillator algebras, and qubits: aspects of manifestly covariant approach to relativistic quantum information
PublicationThe first part of the paper reviews applications of 2-spinor methods to relativistic qubits (analogies between tetrads in Minkowski space and 2-qubit states, qubits defined by means of null directions and their role for elimination of the Peres-Scudo-Terno phenomenon, advantages and disadvantages of relativistic polarization operators defined by the Pauli-Lubanski vector, manifestly covariant approach to unitary representations...
seen 770 times