Results 1  10
of
61
Cryptography in the Quantum World
, 1999
"... Classical information deals with discrete finite alphabets such as {0,1} used for binary representation. On the other hand, Quantum information offers a wider range of possibilities: any linear coinbinaison a10) +,BI1), where IO), 11) are two orthogonal states of a quantum system and where a, p are ..."
Abstract
 Add to MetaCart
Classical information deals with discrete finite alphabets such as {0,1} used for binary representation. On the other hand, Quantum information offers a wider range of possibilities: any linear coinbinaison a10) +,BI1), where IO), 11) are two orthogonal states of a quantum system and where a, p
Operating Degrees for XL vs. F4/F5 for Generic MQ with Number of Equations Linear in That of Variables
"... Abstract. We discuss the complexity of MQ, or solving multivariate systems of m equations in n variables over the finite field Fq of q elements. MQ is an important hard problem in cryptography. In particular, the complexity to solve overdetermined MQ systems with randomly chosen coefficients when m ..."
Abstract
 Add to MetaCart
Abstract. We discuss the complexity of MQ, or solving multivariate systems of m equations in n variables over the finite field Fq of q elements. MQ is an important hard problem in cryptography. In particular, the complexity to solve overdetermined MQ systems with randomly chosen coefficients when m
Effect of a Weak Magnetic Field on Quantum Cryptography Links
"... Abstract We study the performance of a commercial bidirectional Quantum Key Distribution system in the presence of a weak magnetic field (about 50 µT) applied along the fiber axis. We observe a quadratic increase in quantum bit error rate with the angle of Faraday rotation. . Introduction Quantum K ..."
Abstract
 Add to MetaCart
in fibers installed in NorthSouth directions the weak magnetic field of the Earth (which is about 50µT) induces small circular birefringence in the fiber. It is believed that much stronger linear birefringence in optical fibers quenches the Faraday effect [5]. Contrary to such belief, in this paper we
A Linear Algebraic Approach to Metering Schemes
, 2001
"... A metering scheme is a method by which an audit agency is able to measure the interaction between servers and clients during a certain number of time frames. Naor and Pinkas [21] proposed metering schemes where any server is able to compute a proof, i.e., a value to be shown to the audit agency at t ..."
Abstract

Cited by 6 (0 self)
 Add to MetaCart
and servers in a metering scheme. According to these bounds, the optimality of the metering schemes obtained by our method relies upon the optimality of the linear secret sharing schemes for the given access structure. Keywords: Distributed Audit, Metering, Secret Sharing, Cryptography, Entropy. 1
Indistinguishable photons from a singlephoton device
 Nature
, 2002
"... Singlephoton sources have recently been demonstrated using a variety of devices, including molecules 13 , mesoscopic quantum wells 4 , colour centres 5 , trapped ions 6 and semiconductor quantum dots When identical single photons enter a 5050 beam splitter from opposite sides, quantum mechanics ..."
Abstract

Cited by 51 (6 self)
 Add to MetaCart
downcoversion 14 , but it should also occur with single, independently generated photons. Most proposed applications for singlephoton sources in the field of quantum information (with the notable exception of quantum cryptography 15 ) involve twophoton interference. Such applications include quantum
Ordered linear spaces and categories as frameworks for informationprocessing characterizations of quantum and classical theory
, 2009
"... The advent of quantum computation and quantum information science has been accompanied by a revival of the project of characterizing quantum and classical theory within a setting significantly more general than both. Part of the motivation is to obtain a clear conceptual understanding of the sources ..."
Abstract

Cited by 7 (4 self)
 Add to MetaCart
of the sources of quantum theory’s greaterthanclassical power in areas like cryptography and computation, as well as of the limits it appears to share with classical theory. This line of work suggests supplementing traditional approaches to the axiomatic characterization of quantum mechanics within broader
The changemaking problem
 J. Assoc. Comput. Mach
, 1975
"... Abstract. Let A be a von Neumann algebra with no direct summand of Type I2, and let P(A) be its lattice of projections. Let X be a Banach space. Let m: P(A) → X be a bounded function such that m(p + q) = m(p) + m(q) whenever p and q are orthogonal projections. The main theorem states that m has a u ..."
Abstract

Cited by 30 (0 self)
 Add to MetaCart
unique extension to a bounded linear operator from A to X. In particular, each bounded complexvalued finitely additive quantum measure on P(A) has a unique extension to a bounded linear functional on A. Physical background In von Neumann’s approach to the mathematical foundations of quantum mechanics
Asymptotic Stability of an Equilibrium Position of a Family of Systems of Linear Differential Equations
"... is, degrees of freedom at a node point. Despite such reduction, the resultant model is still too large for control design. This warrants further reduction as is frequently done in control Introduction In the dynamics modeling of a structure, finite element analysis employs reduction techniques, suc ..."
Abstract
 Add to MetaCart
single applied force and any single state measurement Variant under coordinate transformation, the controllability grammian {W c ) and observability grammian {W 0 ) where c,y's are the coefficients in the linear combinations of [x\, x 2 x 2 "}. Here the last k states are set to zero because
GateLevel Characterization: Foundations and Hardware Security Applications
, 2010
"... Gatelevel characterization (GLC) is the process of characterizing each gate of an integrated circuit (IC) in terms of its physical and manifestation properties. It is a key step in the IC applications regarding cryptography, security, and digital rights management. However, GLC is challenging due t ..."
Abstract

Cited by 28 (14 self)
 Add to MetaCart
Gatelevel characterization (GLC) is the process of characterizing each gate of an integrated circuit (IC) in terms of its physical and manifestation properties. It is a key step in the IC applications regarding cryptography, security, and digital rights management. However, GLC is challenging due
Multifractal random walk.
 Phys. Rev. E,
, 2001
"... We introduce a class of multifractal processes, referred to as Multifractal Random Walks (MRWs). To our knowledge, it is the first multifractal processes with continuous dilation invariance properties and stationary increments. MRWs are very attractive alternative processes to classical cascadelik ..."
Abstract

Cited by 31 (2 self)
 Add to MetaCart
m(q, l) = t f (t + l) − f (t) q . When the exponents ζ q are linear in q, a single scaling exponent H is involved. One has ζ q = qH and f (t) is said to be monofractal. If the function ζ q is no longer linear in q, f (t) is said to be multifractal. In the case of a stochastic process X
Results 1  10
of
61