Spelling suggestions: "subject:"keyan"" "subject:"key.in""
471 |
NTRU over the Eisenstein IntegersJarvis, Katherine 29 March 2011 (has links)
NTRU is a fast public-key cryptosystem that is constructed using polynomial rings with integer coefficients. We present ETRU, an NTRU-like cryptosystem based on the Eisenstein integers. We discuss parameter selection and develop a model for the probabilty of decryption failure. We also provide an implementation of ETRU. We use theoretical and experimental data to compare the security and efficiency of ETRU to NTRU with comparable parameter sets and show that ETRU is an improvement over NTRU in terms of security.
|
472 |
NTRU over the Eisenstein IntegersJarvis, Katherine 29 March 2011 (has links)
NTRU is a fast public-key cryptosystem that is constructed using polynomial rings with integer coefficients. We present ETRU, an NTRU-like cryptosystem based on the Eisenstein integers. We discuss parameter selection and develop a model for the probabilty of decryption failure. We also provide an implementation of ETRU. We use theoretical and experimental data to compare the security and efficiency of ETRU to NTRU with comparable parameter sets and show that ETRU is an improvement over NTRU in terms of security.
|
473 |
日本的下一個重要產業 / Next Key Industries in Japan河野宏, Kawano, Hiroshi Unknown Date (has links)
This paper refers to which industries Japan should develop for its growth in the future.
The current key industries in Japan are Auto, Steel, and Electrical machinery. They generate more revenues than other different industries, and are surely the driving forces of the Japanese economy. In the last decades, however, they have been gradually losing their competitiveness in the global market. As the result of this, Japan has been stagnant last twenty years after having achieved great economical success.
In this paper, three industries, Water related, Tourism, and Contents industries, are chosen as new key industries out of eight potential industries. Three conditions, vast scale of economy, future demand, and Japanese companies’ competitiveness, are regarded as the key factors for these new key industries to be chosen.
These three industries will be the next driving forces for Japanese economy in the future.
|
474 |
On Free Space Quantum Key Distribution and its Implementation with a Polarization-Entangled Parametric Down Conversion SourceErven, Chris 25 April 2007 (has links)
This thesis describes the deployment of a free-space quantum key
distribution system across the University of Waterloo campus. The
quantum key distribution system has the ability to provide
unconditionally secure communication between two parties: Alice and
Bob. The system exploits the quantum mechanical property of
entanglement in order to generate a key. Security is then guaranteed
by the No-Cloning theorem and the laws of quantum mechanics which
prevent a quantum system from being measured without disturbing it.
Polarization-entangled photon pairs are created using the non-linear
optical process of type-II spontaneous parametric down-conversion. A
free-space link of approximately $\mathrm{580~m}$ is used to
distribute one-half of the pairs to Alice at a distant location,
while the other half of the pairs are locally detected by Bob. The
details of the detection apparatus necessary to measure the
polarization of the photons and the software used to process the
measurement data according to the BBM92 protocol are described. An
experimental violation of the CHSH inequality (a derivative of the
original Bell inequality) is demonstrated to show that
polarization-entangled photon pairs are in fact being distributed to
the two parties. Finally, the full BBM92 protocol is performed using
the entangled photon pairs to generate a secure key and transmit an
encrypted message between Alice and Bob. Currently, the system can
only be operated at night because background light saturates the
detectors during the day; however, future work will focus on making
daylight operation feasible.
|
475 |
Squashing Models for Optical Measurements in Quantum CommunicationBeaudry, Normand James January 2009 (has links)
Many protocols and experiments in quantum information science are described in terms of simple measurements on qubits. However, in an experimental implementation, the exact description of the measurement is usually more complicated. If there is a claim made from the results of an experiment by using the simplified measurement description, then do the claims still hold when the more realistic description is taken into account? We present a "squashing" model that decomposes the realistic measurement description into first a map, followed by a simplified measurement. The squashing model then provides a connection between a realistic measurement and an ideal measurement. If the squashing model exists for a given measurement, then all claims made about a measurement using the simplified description also apply to the complicated one. We give necessary and sufficient conditions to determine when this model exists. We show how it can be applied to quantum key distribution, entanglement verification, and other quantum communication protocols. We also consider several examples of detectors commonly used in quantum communication to determine if they have squashing models.
|
476 |
Change Management:Some preliminary key factors to succeed in leading peopleLE JEAN, Pierre January 2011 (has links)
No description available.
|
477 |
On Free Space Quantum Key Distribution and its Implementation with a Polarization-Entangled Parametric Down Conversion SourceErven, Chris 25 April 2007 (has links)
This thesis describes the deployment of a free-space quantum key
distribution system across the University of Waterloo campus. The
quantum key distribution system has the ability to provide
unconditionally secure communication between two parties: Alice and
Bob. The system exploits the quantum mechanical property of
entanglement in order to generate a key. Security is then guaranteed
by the No-Cloning theorem and the laws of quantum mechanics which
prevent a quantum system from being measured without disturbing it.
Polarization-entangled photon pairs are created using the non-linear
optical process of type-II spontaneous parametric down-conversion. A
free-space link of approximately $\mathrm{580~m}$ is used to
distribute one-half of the pairs to Alice at a distant location,
while the other half of the pairs are locally detected by Bob. The
details of the detection apparatus necessary to measure the
polarization of the photons and the software used to process the
measurement data according to the BBM92 protocol are described. An
experimental violation of the CHSH inequality (a derivative of the
original Bell inequality) is demonstrated to show that
polarization-entangled photon pairs are in fact being distributed to
the two parties. Finally, the full BBM92 protocol is performed using
the entangled photon pairs to generate a secure key and transmit an
encrypted message between Alice and Bob. Currently, the system can
only be operated at night because background light saturates the
detectors during the day; however, future work will focus on making
daylight operation feasible.
|
478 |
Squashing Models for Optical Measurements in Quantum CommunicationBeaudry, Normand James January 2009 (has links)
Many protocols and experiments in quantum information science are described in terms of simple measurements on qubits. However, in an experimental implementation, the exact description of the measurement is usually more complicated. If there is a claim made from the results of an experiment by using the simplified measurement description, then do the claims still hold when the more realistic description is taken into account? We present a "squashing" model that decomposes the realistic measurement description into first a map, followed by a simplified measurement. The squashing model then provides a connection between a realistic measurement and an ideal measurement. If the squashing model exists for a given measurement, then all claims made about a measurement using the simplified description also apply to the complicated one. We give necessary and sufficient conditions to determine when this model exists. We show how it can be applied to quantum key distribution, entanglement verification, and other quantum communication protocols. We also consider several examples of detectors commonly used in quantum communication to determine if they have squashing models.
|
479 |
Study of realistic devices for quantum key-distributionNarasimhachar, Varun January 2011 (has links)
Quantum key-distribution (QKD) is a scheme for establishing shared secret key between remote parties. In such a scheme, quantum preparation and measurement devices (sources and detectors) are used. In existing theoretical treatments of QKD, the device models used do not capture all the imperfections which might occur in realistic devices. This creates a gap between the practical implementations and theoretical descriptions of QKD. In the present work, we contribute in bridging this gap by three methods: 1) Advancing the study of squashing models of measurement devices, 2) Devising an alternative to squashing models using statistical estimation in optical QKD, and 3) Modifying the security proof formalism of QKD to account for imperfect devices.
|
480 |
Klivet in i hemmets trygga sfär : Mannen som hot och utopi hos Maria SandelTeglund, Matilda January 2012 (has links)
Denna uppsats har som syfte att undersöka hur mannen konstrueras hos Maria Sandel. Några noveller ur Vid svältgränsen och andra berättelser analyseras, liksom ett par kapitel ur Familjen Vinge, samt en episod ur Mannen som reste sig.Tesen är att mannen hos Sandel konstrueras i förhållande till hemmet. Vid detta kan man urskilja två roller. Den ena är mannen som sabotör, den andra är mannen som konstruktör. Mannen som konstruktör blir också, i sin kontext, till en utopi.Fokus för analysen är skötsamhetsbegreppet och hemmet. Dessutom diskuteras Ellen Keys inflytande över författarskapet och hur det yttrar sig i texterna. Slutsatsen är att Ellen Keys idéer är närvarande men att Sandel förhåller sig ambivalent till dem. Denna ambivalens kan i viss mån härledas till motsägelser hos Ellen Key själv. De utopiska mansrollerna, där mannen intar en omvårdande roll, utgör också exempel på detta.
|
Page generated in 0.0337 seconds