-
341
Wavelets-Computational Aspects of Sterian Realistic Approach to Uncertainty Principle in High Energy Physics: A Transient Approach
Published 2013-01-01“…However, such aspects regarding the use of conjugate Fourier spaces can be also noticed in quantum field theory, where the position representation of a quantum wave is replaced by momentum representation before computing the interaction in a certain point of space, at a certain moment of time. …”
Get full text
Article -
342
Research on password-authenticated key exchange protocol over lattices
Published 2022-12-01“…With the rapid development of quantum computing technology, password-authenticated key exchange (PAKE) protocol based on conventional difficult problems will face serious security threats in the post-quantum era.Lattice-based cryptosystem has been certified by NIST as the most promising cryptosystem in the post-quantum era due to its high efficiency, high security and support for stronger cryptographic service functions (such as fully homomorphic encryption and multi-linear mapping).Firstly, the research progress of lattice-based PAKE protocol was systematically sort out, mainly including the centralized two-party, three-party PAKE protocol and the distributed PAKE protocol over lattices.Then, the relevant typical schemes were compared and analyzed, respectively.Finally, the future research directions PAKE protocol over lattices were prospected.…”
Get full text
Article -
343
An Efficient Frequency Encoding Scheme for Optical Convolution Accelerator
Published 2024-12-01Get full text
Article -
344
Experimental and computational approach on the corrosion inhibition properties of two newly pyrazole derivatives on carbon steel in acid medium
Published 2025-01-01“…The DFT calculations and Monte Carlo/Molecular dynamic (MC/MD) simulations were treated and discussed for both compounds Tetra-Pz-Ortho and Tetra-Pz-Para in order to explain their interfacial approach and compared them to experimental results. The computational results of quantum chemistry were in agreement with those acquired by experimental methods.…”
Get full text
Article -
345
-
346
ν-point energy correletors with FastEEC: Small-x physics from LHC jets
Published 2025-02-01Get full text
Article -
347
-
348
Generalized Centered Binomial Distribution for Bimodal Lattice Signatures
Published 2025-01-01Get full text
Article -
349
-
350
-
351
CDBS: blind signature scheme based on CRYSTALS-Dilithium algorithm
Published 2024-07-01“…In order to solve the inadequacy of traditional blind signature schemes in resisting quantum computing attacks during interactions between users, signers, and verifiers was addressed, a novel quantum-resistant blind signature scheme named CDBS was proposed. …”
Get full text
Article -
352
-
353
BeSnake: A Routing Algorithm for Scalable Spin-Qubit Architectures
Published 2024-01-01“…As quantum computing devices increase in size with respect to the number of qubits, two-qubit interactions become more challenging, necessitating innovative and scalable qubit routing solutions. …”
Get full text
Article -
354
Survey of digital signature technology based on error correcting codes
Published 2016-11-01“…The emergence of quantum algorithms have threatened the security of digital signature algorithms widely used currently,most of which based on some hard problems in number theory.The digital signature algorithms based on error correcting codes,which can resist quantum attack,has been studied by many researchers in recent years and there have been many research results in different areas,such as normal digital signature,blind signature,ring signature,group signature.Because of the fast computation speed and high security,it has become one of the most promising digital signature technologies.A comprehensive introduction was given and digital signature technologies based on error correcting codes were summarized,the key technologies were analyzed and the possible research directions in the future were pointed out.…”
Get full text
Article -
355
-
356
Survey on blockchain privacy protection techniques in cryptography
Published 2022-08-01“…In recent years, the issue of data privacy has attracted increased attention, and how to achieve effective privacy protection in blockchain is a new research hotspot.In view of the current research status and development trend of blockchain in privacy protection, the privacy protection methods of blockchain in transaction address,prophecy machine and smart contract were explained, and the privacy strategies of blockchain in the protection of basic elements were summarized.Based on high-level literature at home and abroad, two types of blockchain cryptographic protection methods and usage scenarios were analyzed, including special cryptographic primitives and post-quantum cryptography.The advantages and disadvantages of seven cryptographic techniques applicable to current blockchain privacy protection were also reviewed, including attribute-based encryption, special data signature, homomorphic encryption, secure multi-party computation, zero-knowledge proofs, and lattice ciphers.It was concluded that the privacy protection of blockchain applications cannot be achieved without cryptographic technology.Meanwhile, the blockchain privacy protection technologies were analyzed in terms of both basic element protection and cryptographic protection.It was concluded that it was difficult to effectively solve the privacy problem only from the application and contract layers of the blockchain, and various cryptographic technologies should be used to complement each other according to different needs and application scenarios.In addition, according to the current development status of blockchain privacy cryptography, the narrative was developed from blockchain basic element protection and cryptography-based protection.From the perspectives of both endogenous basic element security and exogenous cryptographic privacy security, basic element privacy protection should be studied first, followed by an in-depth analysis of cryptographic protection techniques for blockchain privacy.The strengths and weaknesses and the potential value of the privacy handling aspects of the corresponding safeguards should be measured in terms of the development of technology in conjunction with practical applications, while considering the timeliness of the technology.Finally, an outlook on the future direction of blockchain privacy protection technologies was provided, indicating the issues that need to be addressed in focus.…”
Get full text
Article -
357
EM Database v1.0: A benchmark informatics platform for data-driven discovery of energetic materials
Published 2024-12-01Get full text
Article -
358
Computational Study of Some Urolithin Derivatives-based Biomass Corrosion Inhibitors on the Fe (110), Cu(111) and Al(111) Surface
Published 2025-02-01“…The research uses Density Functional Theory (DFT) calculations and Monte Carlo (MC) simulations to compute quantum chemical parameters, Fukui function, and noncovalent interactions. …”
Get full text
Article -
359
5-pass zero-knowledge identity authentication scheme based on matrix completion problem
Published 2021-11-01“…To solve the problem that most identity authentication schemes are vulnerable to quantum-computing attacks and low efficiency, a new 5-pass zero-knowledge identity authentication scheme was designed based on the matrix completion problem (MCP).Since the MCP is NP-complete, the proposed scheme has the potential to avoid quantum-computing attacks.Compared with the existing similar protocols, the proposed scheme reduced the fraud probability from 2/3 to 1/2 by adding a single round of interaction, and had the advantages of easy implementation and small key size.Moreover, based on the proposed zero-knowledge authentication scheme and Fiat-Shamir standard transformation method, a secure and efficient digital signature algorithm against quantum-computing can be obtained.…”
Get full text
Article -
360
An interacting, higher derivative, boundary conformal field theory
Published 2024-12-01Get full text
Article