Back to home
Technology

EUV laser-maker Trumpf explores quantum computing to improve laser tech

Source

Tom's Hardware

Published

TL;DR

AI Generated

Trumpf, a key EUV laser manufacturer, is delving into quantum computing to enhance laser technology. Collaborating with partners, they aim to determine if quantum computers can optimize lasers more effectively than current supercomputers. By leveraging quantum mechanics, these computers could enhance CO2 laser systems used in various industries, including semiconductor production. The initiative, supported by Germany's Federal Ministry of Education and Research, focuses on simulating complex quantum-mechanical interactions to improve laser designs. While quantum computers are still in early stages, their potential to revolutionize CO2 laser modeling and reduce environmental impact is promising for future laser applications.

Read Full Article

Similar Articles

Scientists create electronic devices that function reliably at extreme temperatures from 500 degrees Celcuis to absolute zero — advanced semiconductor material unlocks new possibilities in space tech and quantum computing

Scientists create electronic devices that function reliably at extreme temperatures from 500 degrees Celcuis to absolute zero — advanced semiconductor material unlocks new possibilities in space tech and quantum computing

Scientists at KAUST have developed electronic devices made of gallium oxide that can function reliably in extreme temperatures from near absolute zero to 500°C. These devices have potential applications in space tech and quantum computing due to their ability to withstand extreme temperature swings. By using ultrawide-bandgap semiconductor beta-gallium oxide and heavily doping it with silicon atoms, the researchers created devices that can maintain electrical conduction even in cryogenic conditions. The team built transistors and logic inverters that operated reliably at temperatures as low as 2K, paving the way for the development of temperature-resistant devices for various technological applications.

Tom's Hardware
Yong Wang Turns Information Into Insights

Yong Wang Turns Information Into Insights

Yong Wang, a recipient of the IEEE Visualization and Graphics Technical Community Significant New Researcher Award, is recognized for his work in using artificial intelligence to revolutionize data visualization. Wang presented his insights at IEEE VIS 2025 in Vienna, emphasizing the importance of rethinking how data is visualized. His focus on human-computer collaboration, quantum computing, and AI showcases his innovative approach to transforming information into actionable insights.

IEEE Spectrum
In a first, a ransomware family is confirmed to be quantum-safe

In a first, a ransomware family is confirmed to be quantum-safe

A new ransomware family named Kyber claims to be quantum-safe by using ML-KEM encryption, a post-quantum cryptography standard. This encryption method is designed to be resistant to attacks by quantum computers, unlike traditional methods like Elliptic Curve and RSA. Security firm Rapid7 confirmed that Kyber uses the highest strength version of ML-KEM to encrypt victims' data with AES-256, making it the first known case of ransomware utilizing post-quantum cryptography. This development highlights the evolving tactics of cybercriminals to enhance the security of their malicious activities.

Ars Technica
Contrary to popular superstition, AES 128 is just fine in a post-quantum world

Contrary to popular superstition, AES 128 is just fine in a post-quantum world

AES 128 encryption is deemed secure in a post-quantum world, despite concerns raised by some about its vulnerability to quantum computing. The widely used AES 128 variant of the Advanced Encryption Standard has stood the test of time with no known vulnerabilities in its 30-year history. While amateur cryptographers have theorized about potential weaknesses using Grover's algorithm, the reality is that breaking AES 128 would still require an unfeasible amount of time and resources, making it a reliable choice for encryption. The key lies in the complexity of brute-force attacks and the inability of quantum computers to parallelize the workload effectively.

Ars Technica

We use cookies

We use cookies to ensure you get the best experience on our website. For more information on how we use cookies, please see our cookie policy.