Zobrazeno 1 - 10
of 252
pro vyhledávání: '"prime factorization"'
Publikováno v:
Journal of Cybersecurity and Privacy, Vol 4, Iss 1, Pp 41-54 (2024)
The RSA (Rivest–Shamir–Adleman) cryptosystem is an asymmetric public key cryptosystem popular for its use in encryptions and digital signatures. However, the Wiener’s attack on the RSA cryptosystem utilizes continued fractions, which has genera
Externí odkaz:
https://doaj.org/article/3b02e29b4dca47e28e2e2e5c37b8fc41
Publikováno v:
IEEE Transactions on Quantum Engineering, Vol 5, Pp 1-17 (2024)
The widespread use of machine learning has raised the question of quantum supremacy for supervised learning as compared to quantum computational advantage. In fact, a recent work shows that computational and learning advantages are, in general, not e
Externí odkaz:
https://doaj.org/article/147afefcceec456080e8f580da5711d6
Publikováno v:
Frontiers in Computer Science, Vol 6 (2024)
This paper builds on top of a paper we have published very recently, in which we have proposed a novel approach to prime factorization (PF) by quantum annealing, where 8, 219, 999 = 32, 749 × 251 was the highest prime product we were able to factori
Externí odkaz:
https://doaj.org/article/7d14476ac928410ebbcc7b123d293591
Autor:
Manenti, Riccardo, author
Publikováno v:
Quantum Information Science, 2023, ill.
Externí odkaz:
https://doi.org/10.1093/oso/9780198787488.003.0010
Autor:
Nolte, David D., author
Publikováno v:
Interference : The History of Optical Interferometry and the Scientists Who Tamed Light, 2023, ill.
Externí odkaz:
https://doi.org/10.1093/oso/9780192869760.003.0010
Autor:
Jagpreet Kaur, K .R. Ramkumar
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 34, Iss 8, Pp 5766-5781 (2022)
During recent years, many researchers and professionals have revealed the endangerment of wireless communication technologies and systems from various cyberattacks, these attacks cause detriment and harm not only to private enterprises but to the gov
Externí odkaz:
https://doaj.org/article/ed4a152a6bb541f089bfe81e7ccd8a30
A chaos based image encryption algorithm using Rubik’s cube and prime factorization process (CIERPF)
Autor:
R. Vidhya, M. Brindha
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 34, Iss 5, Pp 2000-2016 (2022)
A novel Rubik’s cube based pixel level scrambling and simple XOR based diffusion is proposed in this paper to safely transmit multimedia information (images) through an untrusted channel, such as adaptive image content (i.e., plain image related) b
Externí odkaz:
https://doaj.org/article/17e9aa0b2fe34ba2ae0e79958ba3c3d5
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.