Beyond Cloning: A New Path to Secure Microcryptography
Researchers have proven the feasibility of unclonable encryption as a robust microcryptographic primitive, paving the way for physically-unclonable key generation.
Researchers have proven the feasibility of unclonable encryption as a robust microcryptographic primitive, paving the way for physically-unclonable key generation.
![LLVQ consistently achieves superior performance to standard vector quantization methods-as demonstrated by lower perplexity on wikitext-2 and improved results on both the CSR and MMLU benchmarks-even when considering compression efficiency measured in bits per weight [latex] BPW [/latex].](https://arxiv.org/html/2603.11021v1/x2.png)
Researchers have developed a novel quantization technique that dramatically reduces the size of large language models without sacrificing performance.
![The asymmetry [latex]A_{UT}^{\sin\phi_s}[/latex] was projected using three distinct models [latex]S_k[/latex] for quark-gluon [latex]qg[/latex] and quark-antiquark [latex]\bar{q}q[/latex] fragmentation, revealing the sensitivity of next-to-leading-order calculations to underlying assumptions about hadronization-a dependency further quantified by scale variations spanning [latex]\mu\in[Q/2,2Q][/latex].](https://arxiv.org/html/2603.10628v1/x9.png)
A new analysis reveals the crucial role of fragmentation processes in understanding the transverse spin structure of nucleons.

New research reveals that while artificial intelligence can reliably maintain existing code, it frequently fails to address underlying security vulnerabilities due to a lack of true semantic understanding.

Researchers have developed a distributed control framework that ensures safety in complex multi-agent systems, even when some agents are beyond direct control.
![Q-StaR distinguishes itself from DOR through a workflow predicated on the principle that optimal solutions are derived from rigorously minimizing a cost function, formalized as [latex] L(q) = \sum_{i=1}^{n} l(x_i, a_i) [/latex], where [latex] l [/latex] represents the instantaneous cost, [latex] x_i [/latex] denotes the state, and [latex] a_i [/latex] the action at time step <i>i</i>, thereby achieving demonstrably superior performance through mathematically provable optimality.](https://arxiv.org/html/2603.10637v1/x7.png)
A new routing scheme, Q-StaR, intelligently anticipates traffic patterns to improve performance and efficiency in Networks-on-Chip.
![The masses of hidden-charm singly-strange pentaquark states exhibit variations correlated with Borel parameter [latex]T_2[/latex], distinguishing between configurations such as [latex][s\bar{u}][uc]\bar{c}[su][uc]\bar{c}[/latex] (0,11,11,5/2), [latex][uu][sc]\bar{c}-[us][uc]\bar{c}[/latex] (11,0,11,5/2), [latex][uu][sc]\bar{c}-[us][uc]\bar{c}[/latex] (11,11,22,5/2), [latex][s\bar{u}][uc]\bar{c}[/latex] (11,0,11,5/2), and [latex][uu][sc]\bar{c}[/latex] (11,11,22,5/2), thereby revealing insights into the internal structure and composition of these exotic hadrons.](https://arxiv.org/html/2603.10774v1/x21.png)
New theoretical calculations using QCD sum rules are refining the search for unusual pentaquark states containing hidden charm.

Researchers are exploring innovative methods to tie software directly to unique hardware characteristics, creating a robust barrier against unauthorized duplication and tampering.
ACE Runtime introduces a novel architecture for blockchains, achieving sub-second cryptographic finality through a fundamentally different approach to transaction verification.

A new framework combines the reasoning power of large language models with structured knowledge to dramatically improve the accuracy and transparency of prescription verification.