Zobrazeno 1 - 10
of 1 204
pro vyhledávání: '"Abel, C"'
Autor:
Abel, C., Ayres, N. J., Ban, G., Bison, G., Bodek, K., Bondar, V., Bouillaud, T., Bowles, D. C., Caratsch, G. L., Chanel, E., Chen, W., Chiu, P. -J., Crawford, C., Dechenaux, B., Doorenbos, C. B., Emmenegger, S., Ferraris-Bouchez, L., Fertl, M., Flaux, P., Fratangelo, A., Goupillière, D., Griffith, W. C., Höhl, D., Kasprzak, M., Kirch, K., Kletzl, V., Komposch, S. V., Koss, P. A., Krempel, J., Lauss, B., Lefort, T., Lejuez, A., Li, R., Meier, M., Menu, J., Michielsen, K., Mullan, P., Mullins, A., Naviliat-Cuncic, O., Pais, D., Piegsa, F. M., Pignol, G., Quemener, G., Rawlik, M., Rebreyend, D., Rienaecker, I., Ries, D., Roccia, S., Rozpedzik, D., Schnabel, A., Schmidt-Wellenburg, P., Segarra, E. P., Severijns, N., Smith, C. A., Svirina, K., Tavakoli, R., Thorne, J., Touati, S., Vankeirsbilck, J., Virot, R., Voigt, J., Wursten, E., Yazdandoost, N., Zejma, J., Ziehl, N., Zsigmond, G.
We present a coil system designed to generate a highly uniform magnetic field for the n2EDM experiment at the Paul Scherrer Institute. It consists of a main $B_0$ coil and a set of auxiliary coils mounted on a cubic structure with a side length of 27
Externí odkaz:
http://arxiv.org/abs/2410.07914
Autor:
Chen, Abel C. H.
This document focuses on developing a key expansion method based on the internet X.509 public key infrastructure and elliptic curve cryptography, which is applied in the context of anonymous voting. The method enables end entities to maintain anonymi
Externí odkaz:
http://arxiv.org/abs/2410.17274
Autor:
Chen, Abel C. H.
As quantum computing technology matures, it poses a threat to the security of mainstream asymmetric cryptographic methods. In response, the National Institute of Standards and Technology released the final version of post-quantum cryptographic (PQC)
Externí odkaz:
http://arxiv.org/abs/2410.03678
Autor:
Chen, Abel C. H.
The blockchain system has emerged as one of the focal points of research in recent years, particularly in applications and services such as cryptocurrencies and smart contracts. In this context, the hash value serves as a crucial element in linking b
Externí odkaz:
http://arxiv.org/abs/2408.11950
Autor:
Chen, Abel C. H.
In recent years, with the advancement of quantum computing, mainstream asymmetric cryptographic methods in the current Public Key Infrastructure (PKI) systems are gradually being threatened. Therefore, this study explores X.509 security certificates
Externí odkaz:
http://arxiv.org/abs/2408.02179
Autor:
Chen, Abel C. H., Chang, Chia-Shen
In recent years, the countries of the world have drafted the specifications of connected cars; for instance, the Security Credential Management System (SCMS) has been proposed by United States Department of Transportation (USDOT), and the Cooperative
Externí odkaz:
http://arxiv.org/abs/2407.12810
Autor:
Chen, Abel C. H.
With the maturation of quantum computing technology, many cryptographic methods are gradually facing threats from quantum computing. Although the Grover algorithm can accelerate search speeds, current research indicates that the Advanced Encryption S
Externí odkaz:
http://arxiv.org/abs/2407.09490
Autor:
Chen, Abel C. H.
In recent years, quantum computers and Shor quantum algorithm have posed a threat to current mainstream asymmetric cryptography methods (e.g. RSA and Elliptic Curve Cryptography (ECC)). Therefore, it is necessary to construct a Post-Quantum Cryptogra
Externí odkaz:
http://arxiv.org/abs/2402.16002
Autor:
Chen, Abel C. H.
With the development of Shor's algorithm, some nondeterministic polynomial (NP) time problems (e.g. prime factorization problems and discrete logarithm problems) may be solved in polynomial time. In recent years, although some homomorphic encryption
Externí odkaz:
http://arxiv.org/abs/2402.14193
Autor:
Chen, Abel C. H.
The current blockchain system for cryptocurrency exchanges primarily employs elliptic curve cryptography (ECC) for generating key pairs in wallets, and elliptic curve digital signature algorithms (ECDSA) for generating signatures in transactions. Con
Externí odkaz:
http://arxiv.org/abs/2404.16837