Skip to main content

Showing 1–4 of 4 results for author: Kolar, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2502.01964  [pdf, other

    cs.NI quant-ph

    Design and Simulation of the Adaptive Continuous Entanglement Generation Protocol

    Authors: Caitao Zhan, Joaquin Chung, Allen Zang, Alexander Kolar, Rajkumar Kettimuthu

    Abstract: Generating and distributing remote entangled pairs (EPs) is a primary function of quantum networks, as entanglement is the fundamental resource for key quantum network applications. A critical performance metric for quantum networks is the time-to-serve (TTS) for users' EP requests, which is the time to distribute EPs between the requested nodes. Minimizing the TTS is essential given the limited q… ▽ More

    Submitted 16 February, 2025; v1 submitted 3 February, 2025; originally announced February 2025.

    Comments: 8 pages, 10 figures, accepted at QCNC 2025

  2. arXiv:2411.01086  [pdf, other

    quant-ph cs.AI cs.CR

    Practical hybrid PQC-QKD protocols with enhanced security and performance

    Authors: Pei Zeng, Debayan Bandyopadhyay, José A. Méndez Méndez, Nolan Bitner, Alexander Kolar, Michael T. Solomon, Ziyu Ye, Filip Rozpędek, Tian Zhong, F. Joseph Heremans, David D. Awschalom, Liang Jiang, Junyu Liu

    Abstract: Quantum resistance is vital for emerging cryptographic systems as quantum technologies continue to advance towards large-scale, fault-tolerant quantum computers. Resistance may be offered by quantum key distribution (QKD), which provides information-theoretic security using quantum states of photons, but may be limited by transmission loss at long distances. An alternative approach uses classical… ▽ More

    Submitted 7 November, 2024; v1 submitted 1 November, 2024; originally announced November 2024.

    Comments: 6 pages, 3 figures, including extra supplementary materials

  3. Towards efficient and secure quantum-classical communication networks

    Authors: Pei Zeng, Debayan Bandyopadhyay, José A. Méndez Méndez, Nolan Bitner, Alexander Kolar, Michael T. Solomon, F. Joseph Heremans, David D. Awschalom, Liang Jiang, Junyu Liu

    Abstract: The rapid advancement of quantum technologies calls for the design and deployment of quantum-safe cryptographic protocols and communication networks. There are two primary approaches to achieving quantum-resistant security: quantum key distribution (QKD) and post-quantum cryptography (PQC). While each offers unique advantages, both have drawbacks in practical implementation. In this work, we intro… ▽ More

    Submitted 5 November, 2024; v1 submitted 1 November, 2024; originally announced November 2024.

    Comments: 4 pages, a blue print paper, Submission for IEEE 2024 IEEE Workshop on Quantum IntelLigence, Learning & Security (QUILLS), https://sites.google.com/pitt.edu/quills/home

    Journal ref: 2024 IEEE 6th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA) (pp. 520-523)

  4. Neural network scoring for efficient computing

    Authors: Hugo Waltsburger, Erwan Libessart, Chengfang Ren, Anthony Kolar, Regis Guinvarc'h

    Abstract: Much work has been dedicated to estimating and optimizing workloads in high-performance computing (HPC) and deep learning. However, researchers have typically relied on few metrics to assess the efficiency of those techniques. Most notably, the accuracy, the loss of the prediction, and the computational time with regard to GPUs or/and CPUs characteristics. It is rare to see figures for power consu… ▽ More

    Submitted 14 October, 2023; originally announced October 2023.

    Comments: 5 pages, 5 figures

    ACM Class: I.2; I.4; C.4

    Journal ref: Proceedings of the 2023 IEEE International Symposium on Circuits and Systems (ISCAS)