Sciweavers

169 search results - page 15 / 34
» Experimental Quantum Cryptography
Sort
View
SICHERHEIT
2008
13 years 10 months ago
Efficiency Improvement for NTRU
Abstract: The NTRU encryption scheme is an interesting alternative to well-established encryption schemes such as RSA, ElGamal, and ECIES. The security of NTRU relies on the hardne...
Johannes Buchmann, Martin Döring, Richard Lin...
TCC
2009
Springer
131views Cryptology» more  TCC 2009»
14 years 9 months ago
Secure Computability of Functions in the IT Setting with Dishonest Majority and Applications to Long-Term Security
It is well known that general secure function evaluation (SFE) with information-theoretical (IT) security is infeasible in presence of a corrupted majority in the standard model. ...
Robin Künzler, Jörn Müller-Quade, D...
CDC
2009
IEEE
128views Control Systems» more  CDC 2009»
13 years 10 months ago
Feedback generation of quantum Fock states by discrete QND measures
A feedback scheme for preparation of photon number states in a microwave cavity is proposed. Quantum Non Demolition (QND) measurement of the cavity field provides information on it...
Mazyar Mirrahimi, Igor Dotsenko, Pierre Rouchon
JCC
2007
63views more  JCC 2007»
13 years 9 months ago
Quantum correction to the pair distribution function
: We report a numerical technique that allows the quantum effects of zero-point motion to be incorporated into Pair Distribution Functions calculated classically for molecules usin...
V. A. Levashov, S. J. L. Billinge, M. F. Thorpe
ISNN
2009
Springer
14 years 3 months ago
An Improved Quantum Evolutionary Algorithm with 2-Crossovers
Quantum evolutionary algorithm (QEA) is proposed on the basis of the concept and principles of quantum computing, which is a classical metaheuristic algorithm for the approximate s...
Zhihui Xing, Haibin Duan, Chunfang Xu