منابع مشابه
Elliptic-Curves Cryptography on High-Dimensional Surfaces
We discuss the use of elliptic curves in cryptography on high-dimensional surfaces. In particular, instead of a Diffie-Hellman key exchange protocol written in the form of a bi-dimensional row, where the elements are made up with 256 bits, we propose a key exchange protocol given in a matrix form, with four independent entries each of them constructed with 64 bits. Apart from the great advantag...
متن کاملPractical Cryptography in High Dimensional Tori
At Crypto 2004, van Dijk and Woodruff introduced a new way of using the algebraic tori Tn in cryptography, and obtained an asymptotically optimal n/φ(n) savings in bandwidth and storage for a number of cryptographic applications. However, the computational requirements of compression and decompression in their scheme were impractical, and it was left open to reduce them to a practical level. We...
متن کاملSemiquantum Geometry
In this paper we study associative algebras with a Poisson algebra structure on the center acting by derivations on the rest of the algebra. These structures appeared in the study of quantum groups at roots of 1 and related algebras. They also appeared in the study of the representation theory of affine Lie algebras at the critical level. We also believe that these Poisson fibred algebras play ...
متن کاملSemiquantum chaos.
We consider a system in which a classical oscillator is interacting with a purely quantum mechanical oscillator, described by the Lagrangian L = 12 ẋ 2 + 12 Ȧ 2 − 1 2(m 2 + e2A2)x2 , where A is a classical variable and x is a quantum operator. With 〈x(t)〉 = 0, the relevant variable for the quantum oscillator is 〈x(t)x(t)〉 = G(t). The classical Hamiltonian dynamics governing the variables A(t), ...
متن کاملHigher-Dimensional Quantum Cryptography
We report on a high-speed quantum cryptography system that utilizes simultaneous entanglement in polarization and in “time-bins”. With multiple degrees of freedom contributing to the secret key, we can achieve over ten bits of random entropy per detected coincidence. In addition, we collect from multiple spots o the downconversion cone to further amplify the data rate to achieve over 10 Mbits o...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Quantum Engineering
سال: 2020
ISSN: 2689-1808
DOI: 10.1109/tqe.2020.3018133