Filters








37 Hits in 7.8 sec

Revisiting TESLA in the Quantum Random Oracle Model [chapter]

Erdem Alkim, Nina Bindel, Johannes Buchmann, Özgür Dagdelen, Edward Eaton, Gus Gutoski, Juliane Krämer, Filip Pawlega
2017 Lecture Notes in Computer Science  
TESLA was thought to have a tight security reduction from the learning with errors problem (LWE) in the random oracle model (ROM).  ...  Moreover, a variant using chameleon hash functions was lifted to the quantum random oracle model (QROM).  ...  We thank Chris Peikert for pointing out a flaw in previous security reductions for TESLA in the random oracle model.  ... 
doi:10.1007/978-3-319-59879-6_9 fatcat:qd3gs6qknban5jbkq2fq45fz6i

Revisiting the Expected Cost of Solving uSVP and Applications to LWE [chapter]

Martin R. Albrecht, Florian Göpfert, Fernando Virdia, Thomas Wunderer
2017 Lecture Notes in Computer Science  
Since these two estimates predict significantly different costs for solving LWE parameter sets from the literature, we revisit the Unique-SVP strategy.  ...  In the literature, two different conditions are formulated under which this strategy is successful.  ...  Post-quantum secure parameters in the quantum random oracle model were recently proposed in [ABB + 17].  ... 
doi:10.1007/978-3-319-70694-8_11 fatcat:zlbcl24wdfa37px5iztr3kfsra

Lattice signatures using NTRU on the hardness of worst-case ideal lattice problems

Dipayan Das, Vishal Saraswat, Kajla Basu
2020 IET Information Security  
The proposed signature scheme is provably secure based on the hardness of the Ring SIS problem in the random oracle model.  ...  The security of these signature schemes depends mainly on the hardness of solving short integer solutions (SIS) and/or learning with errors problem in the random oracle model.  ...  The ring version of TESLA has been proposed in [38] , which is on the hardness of the Ring LWE problem. The TESLA signature scheme in the quantum random oracle model has been studied in [39] .  ... 
doi:10.1049/iet-ifs.2019.0580 fatcat:j2p6w2uy4nb6xndxl3qn5znco4

Experimental Quantum Computation with Nuclear Spins in Liquid Solution [article]

Lieven M.K. Vandersypen
2002 arXiv   pre-print
Furthermore, we devised and implemented a model to simulate both unitary and decoherence processes in these systems, in order to study and quantify the impact of various technological as well as fundamental  ...  computing in a series of experiments which culminated in the implementation of the simplest instance of Shor's quantum algorithm for prime factorization (15=3x5), using a seven-spin molecule.  ...  Thus, there is an exponential gap in the number of oracle queries required between the quantum and classical cases.  ... 
arXiv:quant-ph/0205193v1 fatcat:6vyyqvastvb7jdrslyxxkr33na

Post-Quantum Cryptography [chapter]

Qijun Gu, Pascal Paillier, Tanja Lange, Edlyn Teske, Darrel Hankerson, Alfred Menezes, David Zhang, Feng Yue, Wangmeng Zuo, Jean-Jacques Quisquater, Gildas Avoine, Gerald Brose (+73 others)
2011 Encyclopedia of Cryptography and Security  
The first editor would like to additionally thank Tanja Lange for many illuminating discussions regarding post-quantum cryptography and for initiating the Post-Quantum Cryptography workshop series in the  ...  We hope that it serves as an introduction to the field, as an overview of the state of the art, and as an encouragement for many more scientists to join us in investigating post-quantum cryptography.  ...  Acknowledgements We thank Phong Nguyen and Markus Rückert for helpful discussions on the practical security of lattice-based cryptography.  ... 
doi:10.1007/978-1-4419-5906-5_386 fatcat:ucdkilta7zc3voq7nqctmjkcr4

Satellite-Based Communications Security: A Survey of Threats, Solutions, and Research Challenges [article]

Pietro Tedeschi and Savio Sciancalepore and Roberto Di Pietro
2021 arXiv   pre-print
strategies, and quantum-based key distribution schemes.  ...  On the other hand, cybersecurity techniques and solutions applied in SATCOM links should be updated to reflect the enormous advancements in attacker capabilities characterizing the last two decades.  ...  In the context Quantum Channel Security Assessment Tools.  ... 
arXiv:2112.11324v2 fatcat:mdrumzffujdwzmzqwajk3hkxbm

Towards Robust Quantum Computation [article]

Debbie W. Leung
2000 arXiv   pre-print
Quantum computation is a subject of much theoretical promise, but has not been realized in large scale, despite the discovery of fault-tolerant procedures to overcome decoherence.  ...  A detailed experimental study of a quantum error correcting code in NMR is also presented.  ...  Therefore, the random noise due to the apparatus is called "channel noise". We model channel noise as a random variable N with zero mean and variance ∆ 2 CN .  ... 
arXiv:cs/0012017v1 fatcat:ax7xygulf5bupo5v2li4q73pxu

Quantum information theory [article]

M. A. Nielsen
2000 arXiv   pre-print
In particular, I demonstrate several novel limits to the information processing ability of quantum mechanics.  ...  Results of especial interest include: the demonstration of limitations to the class of measurements which may be performed in quantum mechanics; a capacity theorem giving achievable limits to the transmission  ...  We revisit in greater detail the question of what measurements may be performed in a quantum system.  ... 
arXiv:quant-ph/0011036v1 fatcat:c7m3ihbt4fbwpagmpfu6zszkse

Integral biomathics: A post-Newtonian view into the logos of bios

Plamen L. Simeonov
2010 Progress in Biophysics and Molecular Biology  
perspective and understanding of computation and communication in the living nature.  ...  This work is an attempt for a state-of-the-art survey of natural and life sciences with the goal to define the scope and address the central questions of an original research program.  ...  Acknowledgements: The author deeply appreciates the valuable help of Prof. Tatsuya Nomura from  ... 
doi:10.1016/j.pbiomolbio.2010.01.005 pmid:20146929 fatcat:ukagr4ftyjaqvknyjorvewxavm

Lectures on quantum supreme matter [article]

Jan Zaanen
2021 arXiv   pre-print
The goal is to explain in a language that can be understood by non-specialists very recent advances in quantum information and especially string theory suggesting the existence of entirely new forms of  ...  These notes are based on lectures serving the advanced graduate education of the Delta Institute of Theoretical Physics in the Netherlands in autumn 2021.  ...  Evaluate this for a z-quantization and the random couplings correspond with random signs of the off diagonal matrix elements, which in turn translate into a "spin worldline" path-integral with random signs  ... 
arXiv:2110.00961v2 fatcat:dkjciwyoyvfbziuk2dewzz7jwi

Practical verified computation with streaming interactive proofs

Graham Cormode, Michael Mitzenmacher, Justin Thaler
2012 Proceedings of the 3rd Innovations in Theoretical Computer Science Conference on - ITCS '12  
The second direction revisits some of the most powerful protocols in the theory literature and substantially improves their efficiency.  ...  In these models, a streaming algorithm (modeling a cloud computing user lacking the resources to store the massive input locally) makes a single pass over an adversarially-ordered input, which is also  ...  Aaronson [2] studied the hardness of the index problem in a restricted version of the MA communication model, as well as in a quantum variant of this model.  ... 
doi:10.1145/2090236.2090245 dblp:conf/innovations/CormodeMT12 fatcat:viwtzva5pjaurbs3ef7be2imhi

Review: Deep Learning in Electron Microscopy [article]

Jeffrey M. Ede
2020 arXiv   pre-print
Finally, we discuss future directions of deep learning in electron microscopy.  ...  For context, we review popular applications of deep learning in electron microscopy.  ...  In addition, part of the text in section 1.2 is adapted from our earlier work with permission 201 under a creative commons 4.0 73 license.  ... 
arXiv:2009.08328v4 fatcat:umocfp5dgvfqzck4ontlflh5ca

Advances in Electron Microscopy with Deep Learning

Jeffrey Ede
2020 Zenodo  
This version of my thesis is typeset for online dissemination to improve readability, whereas the thesis submitted to the University of Warwick in support of my application for the degree of Doctor of  ...  Philosophy in Physics is typeset for physical printing and binding.  ...  In addition, part of the text in section 1.2 is adapted from our earlier work with permission 201 under a Creative Commons Attribution 4.0 73 license.  ... 
doi:10.5281/zenodo.4598227 fatcat:hm2ksetmsvf37adjjefmmbakvq

Advances in Electron Microscopy with Deep Learning

Jeffrey Ede
2020 Zenodo  
This version of my thesis is typeset for online dissemination to improve readability, whereas the thesis submitted to the University of Warwick in support of my application for the degree of Doctor of  ...  Philosophy in Physics is typeset for physical printing and binding.  ...  In addition, part of the text in section 1.2 is adapted from our earlier work with permission 201 under a Creative Commons Attribution 4.0 73 license.  ... 
doi:10.5281/zenodo.4591029 fatcat:zn2hvfyupvdwlnvsscdgswayci

Advances in Electron Microscopy with Deep Learning

Jeffrey Ede
2020 Zenodo  
This copy of my thesis is typeset for online dissemination to improve readability, whereas the thesis submitted to the University of Warwick in support of my application for the degree of Doctor of Philosophy  ...  in Physics will be typeset for physical printing and binding.  ...  In addition, part of the text in section 1.2 is adapted from our earlier work with permission 201 under a Creative Commons Attribution 4.0 73 license.  ... 
doi:10.5281/zenodo.4399748 fatcat:63ggmnviczg6vlnqugbnrexsgy
« Previous Showing results 1 — 15 out of 37 results