Passive Faraday-mirror(PFM) attack is based on imperfect Faraday mirrors in practical quantum cryptography systems and a set of three-dimensional Positive Operator-Valued Measure(POVM) operators plays an important rol...
详细信息
Passive Faraday-mirror(PFM) attack is based on imperfect Faraday mirrors in practical quantum cryptography systems and a set of three-dimensional Positive Operator-Valued Measure(POVM) operators plays an important role in this *** this paper,we propose a simple scheme to implement the POVM in PFM attack on an FaradayMichelson quantum cryptography *** the POVM can not be implemented directly with previous methods,in this scheme it needs to expand the states sent by Alice and the POVM operators in the attack into four-dimensional Hilbert space first,without changing the attacking effect by *** on the methods proposed by Ahnert and Payne,the linear-optical setup for implementing the POVM operators is *** last,the complete setup for realizing the PFM attack is presented with all ***,our scheme can also be applied to realize PFM attack on a plug-and-play system by changing the parameters in the setup.
Diffusion-Weighted Imaging (DWI) is a significant technique for studying white matter. However, it suffers from low-resolution obstacles in clinical settings. Post-acquisition Super-Resolution (SR) can enhance the res...
详细信息
INTRODUCTION With the breakdown of Dennard’s scaling rule,chip power for a given area size is not constant as transistors shrink from generation to generation[1].In particular,the power wall problem worsens with the ...
详细信息
INTRODUCTION With the breakdown of Dennard’s scaling rule,chip power for a given area size is not constant as transistors shrink from generation to generation[1].In particular,the power wall problem worsens with the continual improvement in
The bioinspired Fe-N-C features an asymmetric Fe-N_(5)configuration to produce active metal-oxygen intermediates by introducing axial N ligand into a symmetric Fe-N_(4) structure,enabling highly active oxygen reductio...
详细信息
The bioinspired Fe-N-C features an asymmetric Fe-N_(5)configuration to produce active metal-oxygen intermediates by introducing axial N ligand into a symmetric Fe-N_(4) structure,enabling highly active oxygen reduction reaction(ORR).However,the artificial creation of active Fe-N_(5)configuration with a direct,facile and green method has been rarely developed yet,as current techniques involve complex processes and costly ***,we advance a novel solid-state stepwise temperature-programmable(SST)route to directly produce bioinspired Fe-N_(5)-*** then demonstrate that such a Fe-N_(5)-C exhibits a quite higher half-wave potential(0.92 V)with 22-fold faster ORR kinetics(15.6 mA·cm^(−2)@0.85 V)over that of the commercial Pt/C ***,we perform density functional theory(DFT)to find that the Fe is discharged with an extra 0.1 e^(−)through the axially coordinate N ligand,which significantly enhances the ability to activate O_(2) and enables an easier desorption of the crucial intermediate ^(*)OH on the Fe-N_(5)configuration over the conventional Fe-N_(4) structure.
Privacy protection is the key to maintaining the Internet of Things(IoT)communication *** is an important way to achieve covert communication that protects user data *** technology is the key to checking steganography...
详细信息
Privacy protection is the key to maintaining the Internet of Things(IoT)communication *** is an important way to achieve covert communication that protects user data *** technology is the key to checking steganography security,and its ultimate goal is to extract embedded *** methods cannot extract under known cover *** this end,this paper proposes a method of extracting embedded messages under known cover ***,the syndrome-trellis encoding process is ***,a decoding path in the syndrome trellis is obtained by using the stego sequence and a certain parity-check matrix,while the embedding process is simulated using the cover sequence and parity-check *** the decoding path obtained by the stego sequence and the correct parity-check matrix is optimal and has the least distortion,comparing the path consistency can quickly filter the coding parameters to determine the correct matrices,and embedded messages can be extracted *** proposed method does not need to embed all possible messages for the second time,improving coding parameter recognition *** experimental results show that the proposed method can identify syndrome-trellis coding parameters in stego images embedded by adaptive steganography quickly to realize embedded message extraction.
Due to advances in semiconductor techniques, many-core processors have been widely used in high performance computing. However, many applications still cannot be carried out efficiently due to the memory wall, which h...
详细信息
Due to advances in semiconductor techniques, many-core processors have been widely used in high performance computing. However, many applications still cannot be carried out efficiently due to the memory wall, which has become a bottleneck in many-core processors. In this paper, we present a novel heterogeneous many-core processor architecture named deeply fused many-core (DFMC) for high performance computing systems. DFMC integrates management processing ele- ments (MPEs) and computing processing elements (CPEs), which are heterogeneous processor cores for different application features with a unified ISA (instruction set architecture), a unified execution model, and share-memory that supports cache coherence. The DFMC processor can alleviate the memory wall problem by combining a series of cooperative computing techniques of CPEs, such as multi-pattern data stream transfer, efficient register-level communication mechanism, and fast hardware synchronization technique. These techniques are able to improve on-chip data reuse and optimize memory access performance. This paper illustrates an implementation of a full system prototype based on FPGA with four MPEs and 256 CPEs. Our experimental results show that the effect of the cooperative computing techniques of CPEs is significant, with DGEMM (double-precision matrix multiplication) achieving an efficiency of 94%, FFT (fast Fourier transform) obtaining a performance of 207 GFLOPS and FDTD (finite-difference time-domain) obtaining a performance of 27 GFLOPS.
With the popularity of encryption protocols, machine learning (ML)-based traffic analysis technologies have attracted widespread attention. To adapt to modern high-speed bandwidth, recent research is dedicated to adva...
详细信息
In vivo microscopic imaging inside a biological lumen such as the gastrointestinal tract, respiratory airways, or within blood vessels has faced significant technological challenges for decades. A promising candidate ...
In vivo microscopic imaging inside a biological lumen such as the gastrointestinal tract, respiratory airways, or within blood vessels has faced significant technological challenges for decades. A promising candidate technology is the multimode fiber(MMF) endoscope, which enables minimally invasive diagnostics at a resolution reaching the cellular level. However, for in vivo imaging applications deep inside a biological lumen, sample-induced aberrations and the dynamic dispersion in the MMF make the MMF endoscope a chaotic system with many unknowns, where multiple minor fluctuations can couple and compound into intractable problems. We introduce a dynamically encoding, cascaded, optical, and ultrathin polychromatic light-field endoscopy(DECOUPLE) to tackle this challenge. DECOUPLE includes an adaptive aberration correction that can accurately track and control MMF behavior in the spatial-frequency domain to compensate for chaos introduced during complex dynamic imaging processes. We demonstrate the flexibility and practicality of DECOUPLE for noninvasive volumetric imaging in two colors for light passing through various highly aberrating samples including 120-μm-thick onion epidermal slices and 80-μm-thick layers of fat emulsions. To summarize, we represent a significant step toward practical in vivo imaging deep within biological tissue.
PRIDE is a lightweight block cipher proposed at CRYPTO 2014 by Albrecht et al., who claimed that the construction of linear layers is efficient and secure. In this paper, we investigate the key schedule and find eight...
详细信息
PRIDE is a lightweight block cipher proposed at CRYPTO 2014 by Albrecht et al., who claimed that the construction of linear layers is efficient and secure. In this paper, we investigate the key schedule and find eight 2-round iterative related-key differential characteristics, which can be used to construct 18-round related-key differentials. A study of the first subkey derivation function reveals that there exist three weak-key classes, as a result of which all the differences of subkeys for each round are identical. For the weak-key classes,we also find eight 2-round iterative related-key differential characteristics. Based on one of the related-key differentials, we launch an attack on the full PRIDE block cipher. The data and time complexity are 2;chosen plaintexts and 2;encryptions, respectively. Moreover, by using multiple related-key differentials, we improve the cryptanalysis, which then requires 2;chosen plaintexts and 2;encryptions, respectively. Finally, we use two 17-round related-key differentials to analyze full PRIDE, which requires 2;plaintexts and 2;*** are the first results on full PRIDE, and show that the PRIDE block cipher is not secure against related-key differential attack.
暂无评论