Results 31 to 40 of about 8,427,358 (293)
T‐depth reduction method for efficient SHA‐256 quantum circuit construction
Abstract To perform a quantum brute force attack on a cryptosystem based on Grover's algorithm, it is necessary to implement a quantum circuit of the cryptographic algorithm. Therefore, an efficient quantum circuit design of a given cryptographic algorithm is essential, especially in terms of quantum security analysis, and it is well known that T‐depth
Jongheon Lee+3 more
wiley +1 more source
Continuous functions with compact support
The main aim of this paper is to investigate a subring of the ring of continuous functions on a topological space X with values in a linearly ordered field F equipped with its order topology, namely the ring of continuous functions with compact support ...
Sudip Kumar Acharyya+2 more
doaj +1 more source
Improved lattice‐based mix‐nets for electronic voting
Abstract Mix‐networks were first proposed by Chaum in the late 1970s–early 1980s as a general tool for building anonymous communication systems. Classical mix‐net implementations rely on standard public key primitives (e.g., ElGamal encryption) that will become vulnerable when a sufficiently powerful quantum computer will be built.
Valeh Farzaliyev+2 more
wiley +1 more source
The Commutative Property in Comorbid Diagnosis
The Diagnostic and Statistical Manual of Mental Disorders (4th edition, text revision) assumes an additive model for describing comorbid symptomatology, including the commutativity of disorder descriptions across order of presentation (e.g., A + B = B ...
J. Keeley+2 more
semanticscholar +1 more source
A comprehensive analytical description of the asymmetric active snubber
Abstract Power modules for several hundred amperes suffer from a high stray inductance compared to discrete setups at similar current density. The use of silicon carbide in such modules is beneficial but due to the high stray inductance, the switching speed must be reduced to keep the voltage overshoot below breakdown voltage.
Michael Schlüter, Martin Pfost
wiley +1 more source
Abstract Due to the complicated transients and the possibility of transition from a minor fault in AC subsystems to a severe blocking event of a high‐voltage direct–current (HVDC) transmission line, the study of AC‐DC hybrid power systems requires both efficient and accurate electromagnetic transient (EMT) simulation.
Zeqi Hong+3 more
wiley +1 more source
On n-fold fuzzy implicative/commutative ideals of BCK-algebras
We consider the fuzzification of the notion of an n-fold implicative ideal, an n-fold (weak) commutative ideal. We give characterizations of an n-fold fuzzy implicative ideal. We establish an extension property for n-fold fuzzy commutative ideals.
Young Bae Jun
doaj +1 more source
Commutative Languages and their Composition by Consensual Methods [PDF]
Commutative languages with the semilinear property (SLIP) can be naturally recognized by real-time NLOG-SPACE multi-counter machines. We show that unions and concatenations of such languages can be similarly recognized, relying on – and further ...
Stefano Crespi Reghizzi+1 more
doaj +1 more source
Arithmetic of commutative semigroups with a focus on semigroups of ideals and modules [PDF]
Let $H$ be a commutative semigroup with unit element such that every non-unit can be written as a finite product of irreducible elements (atoms). For every $k \in \mathbb N$, let $\mathscr U_k (H)$ denote the set of all $\ell \in \mathbb N$ with the ...
Yushuang Fan+3 more
semanticscholar +1 more source
More properties of almost Cohen-Macaulay rings [PDF]
Some interesting properties of almost Cohen-Macaulay rings are investigated and a Serre type property connected with this class of rings is studied.
arxiv +1 more source