731 |
Mathematics brought to life by the Millennium Mathematics Project (Workshop Summary)Baker, Nadia 11 April 2012 (has links) (PDF)
This workshop aims to share the success of the Millennium Mathematics Project (MMP) in bringing mathematics to life for students and teachers. A range of interactive enrichment
programmes and their innovative ideas and resources will be shared. Two MMP outreach projects will be explained in detail as the main focus of the workshop: (1) The Enigma Project, (2) The Risk Roadshow. Both projects travel to primary and secondary schools as well as universities, organisations, science festivals and residential camps, both nationally and internationally.
|
732 |
A hardware algorithm for modular multiplication/division高木, 直史, Takagi, Naofumi 01 1900 (has links)
No description available.
|
733 |
Towards securing networks of resource constrained devices: a study of cryptographic primitives and key distribution schemesChan, Kevin Sean 25 August 2008 (has links)
Wireless networks afford many benefits compared to wired networks in terms of their usability in dynamic situations, mobility of networked devices, and accessibility of hazardous environments. The devices used in these networks are generally assumed to be limited in resources such as energy, memory, communications range, and computational ability. Operating in remote or hostile environments, this places them in danger of being compromised by some malicious entity. This work addresses these issues to increase the security of these networks while still maintaining acceptable levels of networking performance and resource usage. We investigate new methods for data encryption on personal wireless hand-held devices. An important consideration for resource-constrained devices is the processing required to encrypt data for transmission or for secure storage. Significant latency from data encryption diminishes the viability of these security services for hand-held devices. Also, increased processing demands require additional energy for each device, where both energy and processing capability are limited. Therefore, one area of interest for hand-held wireless devices is being able to provide data encryption while minimizing the processing and energy overhead as a cost to provide such a security service. We study the security of a wavelet-based cryptosystem and consider its viability for use in hand-held devices.
This thesis also considers the performance of wireless sensor networks in the presence of an adversary. The sensor nodes used in these networks are limited in available energy, processing capability and transmission range. Despite these resource constraints and expected malicious attacks on the network, these networks require widespread, highly-reliable communications. Maintaining satisfactory levels of network performance and security between entities is an important goal toward ensuring the successful and accurate completion of desired sensing tasks. However, the resource-constrained nature of the sensor nodes used in these applications provides challenges in meeting these networking and security requirements. We consider link-compromise attacks and node-spoofing attacks on wireless sensor networks, and we consider the performance of various key predistribution schemes applied to these networks. New key predistribution techniques to improve the security of wireless sensor networks are proposed.
|
734 |
Quantum key distribution protocols with high rates and low costsZhang, Zheshen 09 April 2009 (has links)
In the age of information explosion, there is huge amount of
information generated every second. Some of the information
generated, for example news, is supposed to be shared by public and
anyone in the world can get a copy of it. However, sometimes,
information is only supposed to be maintain private or only shared
by a given group of people. In the latter case, information
protection becomes very important. There are various ways to protect
information. One of the technical ways is cryptography, which is an
area of interest for mathematicians, computer scientists and
physicists. As a new area in cryptography, physical layer security
has been paid great attention recently. Quantum key distribution is
a hot research topic for physical layer security in the two decades.
This thesis focuses on two quantum key distribution protocols that
can potentially increase the key generation rate and lower the cost.
On protocol is based on amplified spontaneous emission as signal
source and the other one is based on discretely signaled continuous
variable quantum communication. The security analysis and
experimental implementation issues for both protocols are discussed.
|
735 |
Quantum Information and Quantum Computation with Continuous VariablesChristian Weedbrook Unknown Date (has links)
The idea to assimilate classical information theory with quantum mechanics resulted in the creation of a new field in physics known as quantum information. One of the first papers in this new field occurred in the early 1970's when Stephen Wiesner wrote the seminal manuscript titled: "Conjugate Coding". However, its importance wasn't imme- diately recognized and wasn't published until 1983. The 1980's and 1990's saw a number of important papers published in quantum information leading to the subfields of quantum cryptography, quantum teleportation, quantum entanglement, distinguishability of quantum states, and quantum cloning. It was also during the 1980's, that a new model of computing, known as quantum computation, was beginning to emerge. It offered the possibility of solving certain problems faster than a classical computer by exploiting various properties of quantum mechanics. Research in this field was undoubtedly stimulated by a well known talk given by Richard Feynman in 1981 at MIT on quantum simulations. Both quantum information and quantum computation were initially developed with quantum discrete variables in mind. However, over the course of the last decade, there has been a significant increase in using quantum continuous variables. This thesis will focus on the topic of quantum information and quantum computation using continuous variables. Specifically, we will theoretically consider the cloning of continuous-variable entanglement, the distinguishability of Gaussian states, new continuous-variable quantum cryptography protocols and finally, the universality of quantum computation using continuous-variable cluster states.
|
736 |
Quantum Information and Quantum Computation with Continuous VariablesChristian Weedbrook Unknown Date (has links)
The idea to assimilate classical information theory with quantum mechanics resulted in the creation of a new field in physics known as quantum information. One of the first papers in this new field occurred in the early 1970's when Stephen Wiesner wrote the seminal manuscript titled: "Conjugate Coding". However, its importance wasn't imme- diately recognized and wasn't published until 1983. The 1980's and 1990's saw a number of important papers published in quantum information leading to the subfields of quantum cryptography, quantum teleportation, quantum entanglement, distinguishability of quantum states, and quantum cloning. It was also during the 1980's, that a new model of computing, known as quantum computation, was beginning to emerge. It offered the possibility of solving certain problems faster than a classical computer by exploiting various properties of quantum mechanics. Research in this field was undoubtedly stimulated by a well known talk given by Richard Feynman in 1981 at MIT on quantum simulations. Both quantum information and quantum computation were initially developed with quantum discrete variables in mind. However, over the course of the last decade, there has been a significant increase in using quantum continuous variables. This thesis will focus on the topic of quantum information and quantum computation using continuous variables. Specifically, we will theoretically consider the cloning of continuous-variable entanglement, the distinguishability of Gaussian states, new continuous-variable quantum cryptography protocols and finally, the universality of quantum computation using continuous-variable cluster states.
|
737 |
FPGA implementations of elliptic curve cryptography and Tate pairing over binary fieldHuang, Jian. Li, Hao, January 2007 (has links)
Thesis (M.S.)--University of North Texas, Aug., 2007. / Title from title page display. Includes bibliographical references.
|
738 |
Advanced steganographic and steganalytic methods in the spatial domainSoukal, David. January 2006 (has links)
Thesis (Ph. D.)--State University of New York at Binghamton, Computer Science Department, 2006. / Includes bibliographical references.
|
739 |
Hardware/software optimizations for elliptic curve scalar multiplication on hybrid FPGAs /Ramsey, Glenn. January 2008 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 2008. / Typescript. Includes bibliographical references (p. 95-97).
|
740 |
Coding encrypted messages into music /Kumar, Vinay Réginald, January 1900 (has links)
Thesis (M.Sc.) - Carleton University, 2006. / Includes bibliographical references (p. 91-93). Also available in electronic format on the Internet.
|
Page generated in 0.0227 seconds