搜索结果: 106-120 共查到“implementation”相关记录687条 . 查询时间(0.075 秒)
Scalable Implementation of Boson Sampling with Trapped Ions
Scalable Implementation Boson Sampling Trapped Ions
2016/1/22
Boson sampling solves a classically intractable problem by sampling from a probability distribution given by matrix permanents. We propose a scalable implementation of boson sampling using local trans...
Implementation of a Measurement-Device-Independent Entanglement Witness
Measurement-Device-Independent Entanglement Witness
2016/1/22
Entanglement, the essential resource in quantum information processing, should be witnessed in many tasks such as quantum computing and quantum communication. The conventional entanglement witness met...
Mechanism Design and Implementation for Lung Exchange
Mechanism Design Implementation Lung Exchange
2016/1/22
We explore the mechanism design problem for lung exchange and its implementation in practice. We prove that determining whether there exists a non-trivial solution of the lung exchangeproblem is NP-co...
Software implementation of an Attribute-Based Encryption scheme
attribute-based-encryption pairing-based protocols bilinear pairings
2016/1/9
A ciphertext-policy attribute-based encryption protocol uses bilinear pairings to provide control
access mechanisms, where the set of user’s attributes is specified by means of a linear secret sharin...
EFSA’s contribution to the implementation of the EU legislation on pesticide residues in food
Pesticides residues maximum residue levels (MRLs) consumer risk assessment Regulation (EC) No 396/2005
2016/1/9
The active involvement of EFSA in the area of pesticide residues assessment started in 2006 following the adoption of new legislation on maximum residue levels (MRLs) of pesticides in food (Regulation...
On Constrained Implementation of Lattice-based Cryptographic Primitives and Schemes on Smart Cards
Authentication protocol constrained device constrained implementation
2016/1/8
Most lattice-based cryptographic schemes with a security proof suffer from large key
sizes and heavy computations. This is also true for the simpler case of authentication protocols
which are used o...
A Practical Second-Order Fault Attack against a Real-World Pairing Implementation
Pairing-Based Cryptography Fault Attacks eta Pairing
2016/1/8
Several fault attacks against pairing-based cryptography have been described theoretically in recent years.
Interestingly, none of these has been practically evaluated. We accomplish this task and pr...
Diffusion Matrices from Algebraic-Geometry Codes with Efficient SIMD Implementation
Diffusion matrix algebraic-geometry codes algebraic curves
2016/1/8
This paper investigates large linear mappings with very good diffusion and efficient software
implementations, that can be used as part of a block cipher design. The mappings are derived from linear
...
Automated Design, Implementation, and Evaluation of Arbiter-based PUF on FPGA using Programmable Delay Lines
PUF physical unclonable function FPGA
2016/1/7
This paper proposes a novel approach for automated implementation of an arbiter-based physical unclonable function (PUF)
on field programmable gate arrays (FPGAs). We introduce a high resolution prog...
Towards a Full-Featured Implementation of Attribute Based Credentials on Smart Cards
Attribute-based credentials smart cards privacy
2016/1/7
Attribute-based Credentials (ABCs) allow citizens to prove certain properties
about themselves without necessarily revealing their full identity. Smart cards are an attractive
container for such cre...
Efficient Implementation of Keyless Signatures with Hash Sequence Authentication
digital signatures hash functions
2016/1/7
We present new ideas for decreasing the size of secure memory needed for hardware implementations
of hash-sequence based signatures proposed recently by Buldas, Laanoja and Truu (in the
following re...
Present-day public-key cryptosystems such as RSA and Elliptic Curve
Cryptography (ECC) will become insecure when quantum computers become a
reality. This paper presents the new state of the art in e...
LED and PHOTON are new ultra-lightweight cryptographic algorithms aiming at resourceconstrained
devices. In this article, we describe three different hardware architectures of the LED and
PHOTON fam...
Implementation and Evaluation of a Leakage-Resilient ElGamal Key Encapsulation Mechanism
implementation Leakage-resilient cryptography
2016/1/6
Leakage-resilient cryptography aims to extend the rigorous
guarantees achieved through the provable security paradigm to physical
implementations. The constructions and mechanisms designed on basis
...
SHIELD: Scalable Homomorphic Implementation of Encrypted Data-Classifiers
Homomorphic Encryption FHE Ring LWE
2016/1/6
Homomorphic encryption (HE) systems enable computations on encrypted data, without decrypting and without knowledge of the secret key. In this work, we describe an optimized Ring Learning With Errors ...