نتایج جستجو برای: flux step

تعداد نتایج: 349758  

2017
Prabhat Kushwaha Ayan Mahalanobis

In this paper, a new algorithm to solve the discrete logarithm problem is presented which is similar to the usual baby-step giant-step algorithm. Our algorithm exploits the order of the discrete logarithm in the multiplicative group of a finite field. Using randomization with parallelized collision search, our algorithm indicates some weakness in NIST curves over prime fields which are consider...

2007
J. Klusoň Rashmi R. Nayak Kamal L. Panigrahi

We study the giant magnon solutions in the near horizon geometry of the Neveu-Schwarz (NS) 5-brane background. In conformal gauge, we find magnon dispersion relation in the large angular momentum (J) limit. We further show that the giant magnon poses uniform distribution of the angular momentum along the string world-sheet as in case of AdS5 × S5 spacetime.

2013
Anand Embar Thomas Witelski Guglielmo Scovazzi Xuanhe Zhao

Modeling Microdomain Evolution on Giant Unilamellar Vesicles using a Phase-Field Approach by Anand Embar Department of Civil and Environmental Engineering Duke University

2015
Soussan Djamasbi Siavash Mortazavi Mina Shojaeizadeh

Despite common belief, Baby Boomers form a sizable population of gamers. Paying attention to how this generation experiences a game can help companies that target this group of users increase their market share. To address this need, this study examines Baby Boomers’ reaction to a new way of manipulating objects in a game, namely with their eyes. In particular, the study focuses on testing the ...

2006
Wung-Hong Huang

We analyze the energy and angular momenta of the two-spin spiky string moving on the AdS3×S with NS-NS field. Due to the infinite boundary of the AdS spacetime the solution will extend to infinity and it appears the divergences. After adding the counter terms we then obtain the dispersion relation of the corresponding giant magnon and see how the background field produces the correction terms. ...

Journal: :IACR Cryptology ePrint Archive 2011
Mario Romsy

In [BKT11] Baba, Kotyada and Teja introduced the FACTOR problem over non-abelian groups as base of an ElGamal-like cryptosystem. They conjectured that there is no better method than the naive one to solve the FACTOR problem in a general group. Shortly afterwards Stanek published an extension of the baby-step giant-step algorithm disproving this conjecture [Sta11]. Since baby-step giant-step met...

2007
David Gurzick A. Ozok Barbara Morris

A survey was conducted on 210 Baby Boomers (Age mean = 51.4 Std. dev. 5.46) within the United States to determine their current use of online technology in social interactions, their preferences in these interactions, and the expectations they have of near-future online communication technologies. The findings highlight the importance of online communication in their lives and spotlight their w...

2017
Anneke Horstman Mengfan Li Iris Heidmann Mieke Weemen Baojian Chen Jose M. Muino Gerco C. Angenent Kim Boutilier

Anneke Horstman, Mengfan Li, Iris Heidmann, Mieke Weemen, Baojian Chen, Jose M. Muino, Gerco C. Angenent, and Kim Boutilier Wageningen University and Research, Bioscience, 6708 PB Wageningen, The Netherlands Wageningen University and Research, Laboratory of Molecular Biology, 6708 PB Wageningen, The Netherlands Enza Zaden Research and Development, 1602 DB Enkhuizen, The Netherlands Max Planck I...

2006
Nelia Mann Samuel E. Vázquez

We present a simple procedure to construct non-local conserved charges for classical open strings on coset spaces. This is done by including suitable reflection matrices on the classical transfer matrix. The reflection matrices must obey certain conditions for the charges to be conserved and in involution. We then study bosonic open strings on AdS5×S. We consider boundary conditions correspondi...

2010
Hassan Jameel Asghar Josef Pieprzyk Huaxiong Wang

We propose a new protocol providing cryptographically secure authentication to unaided humans against passive adversaries. We also propose a new generic passive attack on human identification protocols. The attack is an application of Coppersmith’s baby-step giantstep algorithm on human identification protcols. Under this attack, the achievable security of some of the best candidates for human ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید