As a child, Rajiv Laroia was sure he wanted to be a physicist and work in academia.
For secure practical systems, quantum key distribution (QKD) must provide high key rates over long distances. Time-entanglement-based QKD promises to increase the secret key rate and distribution distances compared to other QKD implementations. This article describes the major steps in QKD protocols, focusing on the nascent QKD technology based on high-dimen...
The security of popular public key-cryptographic protocols, such as RSA, Diffie–Hellman key exchange and the digital signature algorithm (DSA), is endangered by the advent of quantum computers. Shor brought a big breakthrough with his quantum algorithm that can be used to factor an arbitrarily large integer into the product of its prime factors, hence jeopar...
Information theory has driven the information and communication technology industry for over 70 years. Great successes have been achieved in both academia and industry. In theory, polar codes and spatially coupled low-density parity-check (LDPC) codes have achieved the theoretical bound. In practice, capacity-approaching coding schemes such as turbo, polar, ...
Medical ultrasound imaging is an ongoing research field for digital signal processing. Following decades of developement in the analogue domain, the introduction of high power computation has led to increased activity and research in the fields of digital signal processing, and, most recently, in machine learning, for the sake of delivering higher quality im...