搜索结果: 1-15 共查到“Remarks”相关记录145条 . 查询时间(0.218 秒)
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:Remarks on the vanishing viscosity process of state-constraint Hamilton-Jacobi equations
状态约束 哈密尔顿-雅可比方程 黏度消失
2023/4/21
Quantum entanglement is of great importance to quantum cryptography and computation. So far, all experimental demonstrations of entanglement are designed to check Bell's inequality which is based on B...
Remarks on Quaternions/Octonion Based Diffie-Hellman Key Exchange Protocol Submitted to NIST PQC Project
Diffie-Hellman key agreement NIST PQC Project
2018/1/2
In November 2017, Juan edro Hecht and Jorge Alejandro Kamlofsky submitted a quaternions/octonions based Diffie-Hellman key agreement protocol HK17 to NIST post quantum cryptography project. Daniel J. ...
Some Remarks on Rovelli's "Why Gauge?"
philosophy of gauge theory Yang-Mills physical significance of gauge-dependence
2016/6/15
Rovelli's "Why Gauge?" offers a parable to show that gauge-dependent quantities have a modal and relational physical significance. We subject the morals of this parable to philosophical scrutiny and a...
Remarks on the Pocklington and Padr?S醗z Cube Root Algorithm in $\mathbb F_q$
cube root algorithm finite field Pocklington algorithm
2016/1/25
We clarify and generalize a cube root algorithm in Fq proposed by Pocklington [1],
and later rediscovered by Padr磑 and S碼ez [2]. We correct some mistakes in [2] and give
a full generalization of the...
Some Remarks on Honeyword Based Password-Cracking Detection
authentication password security honeywords
2016/1/23
Recently, Juels and Rivest proposed honeywords (decoy passwords) to detect attacks against hashed password databases. For each user account, the legitimate password is stored with several honeywords...
Remarks on the Cryptographic Primitive of Attribute-based Encryption
Attribute-based encryption one-to-one encryption one-to-many encryption
2016/1/7
Attribute-based encryption (ABE) which allows users to encrypt and decrypt messages based
on user attributes is a type of one-to-many encryption. Unlike the conventional one-to-one encryption
which ...
Remarks on Quantum Modular Exponentiation and Some Experimental Demonstrations of Shor's Algorithm
Shor's factoring algorithm quantum modular exponentiation superposition
2016/1/6
An efficient quantum modular exponentiation method is indispensible for Shor's factoring algorithm. But we find that all descriptions presented by Shor, Nielsen and Chuang, Markov and Saeedi, et al., ...
SOME REMARKS ON THE LOGARITHMIC SIGNATURES OF FINITE ABELIAN GROUPS
logarithmic signatures quasi-logarithmic signatures cyclic 2-group
2015/12/22
In the paper about the cryptosystem MST3, Svaba and Trung proposed
a way to build a cryptosystem based on the concept of logarithmic signatures,
and they choose Suzuki’s group, which is not abelian ...
EDUCATION AND TRAINING IN PHOTOGRAMMETRY AND RELATED FIELDS – REMARKS ON THE PRESENCE AND THE FUTURE
Photogrammetry Remote Sensing
2015/8/24
Changes in technology and social-economic conditions have influence on the education and training in photogrammetry and related
fields. From a European point of view the present situation is analyze...
Introductory Remarks on Monetary Policy Rules.
Remarks for the Panel Discussion on “Recent Changes in Trend and Cycle”
Recent Changes Trend
2015/8/3
This panel discussion focuses on two defining features of the new economy: (1) a
change in trend productivity growth, and (2) a change in cyclical volatility. No one
knows for sure how long either f...
Remarks at a Panel on the Monetary Policy Implications of the Global Crisis
Monetary Policy Global Crisis
2015/8/3
These remarks examine the implications of the global financial crisis for monetary
policy. I speak mainly from the perspective of monetary policy in the United States where I have
done most of my re...
Let l=3 or 5. For any integer n>1, we produce an infinite set of triples
(L, E1, E2), where L is a number field with degree l
3(n&1) over Q and E1 and E2
are elliptic curves over L with distinct j-...