نتایج جستجو برای: کد alice
تعداد نتایج: 12588 فیلتر نتایج به سال:
This paper studies the mapping g → g 2 (mod p) by showing that it inherits its structure from the mapping x → x (mod ordp(g)). We first explore the context in which this mapping is important; specifically, we consider the Diffie-Hellman protocol, Diffie-Hellman problem, and the various problems that have spawned from these including the discrete logarithm and square exponent problems. We then d...
Nonlocal boxes (NLBs) are devices that are used to generate correlated bits between two spatially separated parties. If the generated correlation is weak, it can sometimes be distilled into a stronger correlation by repeated applications of the nonlocal box. We initiate here a study of the distillation of correlations for nonlocal boxes that output quantum states rather than classical bits. We ...
Encryption in which “your name is your public key” is called Identity-Based Encryption (IBE). Shamir’s original motivation for identity-based encryption was to simplify the management of public keys. Frequently, this process can be unwieldy because of the following problem: if Bob obtains Alice’s public key over the network, how does Bob know that the key really belongs to Alice, and not to a m...
We show that in certain theories with topologically trivial quotient space of spontaneously broken gauge symmetry there can exist topologically stable strings that carry nonabelian gauge flux. These objects result from the “accidental” global degeneracy of the vacuum which makes it topologically nontrivial. In particular, some models contain the semiglobal analog of the Alice strings. ∗Permanen...
The ALICE Trigger System is made up of two independent parts: a Central Trigger Processor (CTP) and a Trigger Distribution Network. The CTP provides the trigger decision logic. It generates triggers for the readout detectors by evaluating inputs from triggering detectors. The Trigger Distribution Network delivers these triggers to the detectors; in addition it is capable of running in standalon...
Access to journal content has been central to the open access (OA) debate. The European Commission has focused on ‘access and preservation’ in its planning for Horizon 2020; in the UK the Department of Business, Innovation and Skills (BIS) has set up the Finch Group (an independent working group that emerged from discussions at a round table meeting on transparency with the Rt Hon David Willett...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید