Sharper Bounds for Error Correction: A New Take on the Gilbert-Varshamov Limit
Researchers have refined the Gilbert-Varshamov bound, yielding tighter limits on the performance of both classical and quantum error-correcting codes.
Researchers have refined the Gilbert-Varshamov bound, yielding tighter limits on the performance of both classical and quantum error-correcting codes.
Researchers are exploring the mathematical structure of braid groups to build a key exchange protocol that resists attacks from both classical and quantum computers.
New research demonstrates fundamental limitations in achieving simulation-based security for quantum functional encryption, extending known impossibilities to the quantum realm.
A novel two-component model, leveraging modified DGLAP evolution and unintegrated PDFs, provides a compelling description of particle production in high-energy proton-proton collisions.
A new framework translates questions about the maximum size of combinatorial structures into optimization problems, offering a powerful approach to extremal combinatorics.
A new approach combines the density of DNA with artificial intelligence to create a robust and error-resistant digital archiving system.
Researchers demonstrate a surprisingly simple fabrication process for creating vertical nanopillar devices from complex metal-molecule stacks, potentially unlocking scalable molecular electronics and spintronics.
![The band structures of a magnetized square lattice reveal that incorporating optimal site renormalization parameters [latex]\lambda_{j,s}[/latex] significantly alters electronic behavior, distinguishing weakly correlated systems ([latex]U=1t[/latex]) from their strongly correlated counterparts ([latex]U=5t[/latex]).](https://arxiv.org/html/2601.16453v1/figures/_supp_lambdas.png)
New research reveals how strong electron correlation can disrupt the formation of robust integer quantum Hall states, impacting their potential for future electronic devices.

Researchers have developed a novel framework that enables privacy-preserving code generation using open-source AI models, shielding sensitive information from cloud observation.

Researchers demonstrate a practical attack that could isolate Ethereum nodes and disrupt network consensus after the Merge.