Measurement-device-independent quantum key distribution (MDI-QKD) is immune to all the detection attacks; thus when it is combined with the decoy-state method, the final key is unconditionally secure, even if a practi...
详细信息
Measurement-device-independent quantum key distribution (MDI-QKD) is immune to all the detection attacks; thus when it is combined with the decoy-state method, the final key is unconditionally secure, even if a practical weak coherent source is used by Alice and Bob. However, until now, the analysis of decoy-state MDI-QKD with a weak coherent source is incomplete. In this paper, we derive, with only vacuum+weak decoy state, some tight formulas to estimate the lower bound of yield and the upper bound of error rate for the fraction of signals in which both Alice and Bob send a single-photon pulse to the untrusted third party Charlie. The numerical simulations show that our method with only vacuum+weak decoy state can asymptotically approach the theoretical limit of the infinite number of decoy states. Furthermore, the statistical fluctuation due to the finite length of date is also considered based on the standard statistical analysis.
Due to the problem of semantic lost when extracting birthmark with k-gram algorithm, the operand stack dependence based static software birthmark is proposed in this paper. Before the birthmark extraction, the stack d...
详细信息
ISBN:
(纸本)9781467352512
Due to the problem of semantic lost when extracting birthmark with k-gram algorithm, the operand stack dependence based static software birthmark is proposed in this paper. Before the birthmark extraction, the stack dependence bytecode fragments are got through analysis the stack dependence relation of stack behaviors in Java program. The birthmark is comprised of the stack dependence bytecode fragments and their occurrence frequencies in program. The experimental results show that the proposed birthmark has good credibility and robustness, and the performance is improved.
Nowadays SIMD extensions became ubiquitous for computational platform, being widely used in signal processing, multimedia, and scientific applications. However, compilers still have difficult in vectorizing some appli...
详细信息
Nowadays SIMD extensions became ubiquitous for computational platform, being widely used in signal processing, multimedia, and scientific applications. However, compilers still have difficult in vectorizing some applications, such as computations on non-contiguous and especially interleaved data, and loop nest for which inner loops that carry all the dependencies and external loops with strided memory accesses. In order to solve these problems, we adopt Isomorphic statements Grouping (ISG) after extending group following UD and DU chains, which group isomorphic computation statements that perform the same operation. And correspondingly, we generate vector permutation instructions according to the target ISA SIMD instructions at the SIMD code generation phase. This approach has been implemented in a compiler based on Open64 which translate C source program to C source program with SIMD intrinsic functions. Experiments with this compiler show that ISG Super Level Parallelism(ISG-SLP) can be used to compile a number of real-world kernels, achieving up to 3.11 speedup.
Protecting the security of sensitive information has become a matter of great concern to *** hiding tech nique solves the problem to some extent, but still, some short comings remain for *** improve the capability of ...
详细信息
Protecting the security of sensitive information has become a matter of great concern to *** hiding tech nique solves the problem to some extent, but still, some short comings remain for *** improve the capability of hid ing huge data file in disk with high *** this paper, we propose a novel approach called CryptFS, which is achieved by utilizing the file access mechanism and modifying the cluster chain structure to hide *** can quickly hide data file with G bytes size in less than *** time used for hiding and recovering data is irrelevant to the size of data file, and the reli ability of the hidden file is high, which will not be overlaid by new created file and disk defragment.
We propose a theoretical scheme to generate flux-qubit clusters using XY interactions. In our scheme, two neighboring qubits are coupled via a dc superconducting quantum interference device (SQUID). All flux qubits ar...
详细信息
We propose a theoretical scheme to generate flux-qubit clusters using XY interactions. In our scheme, two neighboring qubits are coupled via a dc superconducting quantum interference device (SQUID). All flux qubits are always biased at their optimal points. The XY interaction can be controlled by the bias current applied to the SQUID for the two coupled qubits with the same resonance frequencies or by the frequency of a microwave pulse applied to the SQUID for the two coupled qubits with unequal resonance frequencies. The generation of a d-dimensional cluster state needs only 2d steps. Existing technology allows us to rapidly modulate the bias current and easily control the frequency of the pulse, and thus our scheme is experimentally feasible.
Modular multiplication is one of the most important operations in the public key cryptographic algorithms. In order to design a high-performance modular multiplier, we present a novel hybrid Montgomery modular multipl...
详细信息
Modular multiplication is one of the most important operations in the public key cryptographic algorithms. In order to design a high-performance modular multiplier, we present a novel hybrid Montgomery modular multiplier over GF(p) on FPGAs, which employs Karatsuba and Knuth multiplication algorithms in different levels to implement large integer multiplication. A 9-stage pipeline full-word multiplier is proposed for the 256-bit multiplication with 4-level recursion. The performance of our modular multiplier is improved through optimizing the pipeline and reducing carry-chain latency of the modular adder. On average, our modular multiplier can perform one 256-bit modular multiplication in 3 cycles. We can integrate 13 modular multipliers on a Xilinx Virtex-6 V6VSX475T FPGA. The experimental results show that the throughput of 856.9 million modular multiplications per second can be achieved and the hybrid Montgomery modular multiplier has an outstanding performance in the situations which need continuous multiplications.
This paper presents a study of and triboson production using events from proton-proton collisions at a centre-of-mass energy of recorded with the ATLAS detector at the LHC and corresponding to an integrated luminos...
This paper presents a study of and triboson production using events from proton-proton collisions at a centre-of-mass energy of recorded with the ATLAS detector at the LHC and corresponding to an integrated luminosity of 20.2 fb . The production cross-section is determined using a final state containing an electron, a muon, a photon, and neutrinos ( ). Upper limits on the production cross-section of the final state and the and final states containing an electron or a muon, two jets, a photon, and a neutrino ( or ) are also derived. The results are compared to the cross-sections predicted by the Standard Model at next-to-leading order in the strong-coupling constant. In addition, upper limits on the production cross-sections are derived in a fiducial region optimised for a search for new physics beyond the Standard Model. The results are interpreted in the context of anomalous quartic gauge couplings using an effective field theory. Confidence intervals at 95% confidence level are derived for the 14 coupling coefficients to which and production are sensitive.
The β decay of Cd129, produced in the relativistic fission of a U238 beam, was experimentally studied at the RIBF facility at the RIKEN Nishina Center. From the γ radiation emitted after the β decays, a level schem...
详细信息
The β decay of Cd129, produced in the relativistic fission of a U238 beam, was experimentally studied at the RIBF facility at the RIKEN Nishina Center. From the γ radiation emitted after the β decays, a level scheme of In129 was established comprising 31 excited states and 69 γ-ray transitions. The experimentally determined level energies are compared to state-of-the-art shell-model calculations. The half-lives of the two β-decaying states in Cd129 were deduced and the β feeding to excited states in In129 were analyzed. It is found that, as in most cases in the Z<50, N≤82 region, both decays are dominated by the ν0g7/2→π0g9/2 Gamow–Teller transition, although the contribution of first-forbidden transitions cannot be neglected.
Sparse LU decomposition is the core computation in the direct method that solves sparse systems of linear equations. Only little work has been conducted on parallelizing it on FPGAs. In this paper, we study paralleliz...
详细信息
ISBN:
(纸本)9781467328463;9781467328449
Sparse LU decomposition is the core computation in the direct method that solves sparse systems of linear equations. Only little work has been conducted on parallelizing it on FPGAs. In this paper, we study parallelization strategies for sparse LU decomposition on FPGAs. We first analyze how to parallelize the right-looking algorithm and find that this algorithm is not suitable for FPGAs. Then the left-looking algorithm is analyzed and considered as better candidate than the right-looking version. Our design derived from the left-looking algorithm is based on a simple yet efficient parallel computational model for FPGAs. Our design mainly consists of multiple parallel processing elements (PEs). A total of 14 PEs can be integrated into a Xilinx Virtex-5 XC5VLX330. Unlike related work, where their designs are applied to sparse matrices from particular application domains, our hardware design can be applied to any symmetric positive definite or diagonally dominant matrices.
Half-wave-hole problem, mainly caused by refractive index inhomogeneity of hafnia, had greatly influenced the spectra and application of HfO2/SiO2 dichroic laser mirrors. Two approaches to eliminate the half-wave-hole...
详细信息
暂无评论