Results 91 to 100 of about 391,497 (318)
Integers with no large prime factors [PDF]
For real numbers \(x,y\geq 2\), let \(\Psi (x,y)\) denote the number of integers not exceeding \(x\) all of whose prime factors do not exceed \(y\), and let \(\Psi_ q (x,y)\) denote the number of such integers that are also coprime to \(q\). Also let \(\omega (n)\) denote the number of distinct prime factors of \(n\) and let \(q_ y\) denote the product
openaire +2 more sources
High‐Resolution On‐Chip Digitally Tunable Spectrometer Based on Double‐Cascaded Ring Resonators
An integrated spectrometer is here presented, based on two cascaded ring resonators covered with a phase change material. The Vernier architecture is implemented allowing for a digital scan of wavelengths. Resolution smaller than 0.1 nm can be achieved, together with a footprint ≈0.03 mm2 and a bandwidth of the order of tens of nanometers.
Carla Maria Coppola+3 more
wiley +1 more source
CRYPTANALYSIS BIOINSPIRED METHODS OF ASYMMETRIC KEY ON THE BASIS OF COMPOSITE NUMBER FACTORIZATION
The application of the bioinspired methods for handling the cryptanalysis problem of the asymmetric encryption algorithms on the basis of the composite number factorization is considered.
Alexander S. Sergeyev+3 more
doaj
Recommendation for Pair-Wise Key-Establishment Using Integer Factorization Cryptography
This Recommendation specifies key-establishment schemes using integer factorization cryptography, based on ANS X9.44, Key-establishment using Integer Factorization Cryptography [ANS X9.44], which was developed by the Accredited Standards Committee (ASC ...
Elaine B. Barker+5 more
semanticscholar +1 more source
Optical Chaos Generation and Applications
This review comprehensively examines optical chaos generation via feedback, injection, and optoelectronic methods, emphasizing bandwidth enhancement and time‐delay suppression. Applications include chaos‐synchronized secure communication, physical random number generation, chaotic lidar for cm‐level detection, distributed fiber sensing, and terahertz ...
Wenhui Chen+8 more
wiley +1 more source
CRYPTANALYSIS BIOINSPIRED METHODS OF ASYMMETRIC KEY ON THE BASIS OF COMPOSITE NUMBER FACTORIZATION
The application of the bioinspired methods for handling the cryptanalysis problem of the asymmetric encryption algorithms on the basis of the composite number factorization is considered.
Alexander S. Sergeyev+3 more
doaj
Data authenticated aggregation is always a significant issue for wireless sensor networks (WSNs). The marine sensors are deployed far away from the security monitoring.
Lifei Wei+5 more
doaj +1 more source
A new paradigm for the implementation of Fabry–Perot color filters, which may be fabricated using complementary metal oxide semiconductor‐processing with significantly fewer process steps than the state of the art is demonstrated. It is streamlining and economizing the manufacturing process associated with commercial products incorporating color ...
Hongwei Gao+4 more
wiley +1 more source
Specialized integer factorization [PDF]
Vanstone and Zuccherato [3] propose a cryptographic system based on an elliptic curve modulo a composite number. We show that the composite numbers so constructed are easily factored, rendering the system insecure.
openaire +2 more sources
High‐Isolation LCoS‐Based Optical Switch with Phase Hologram Parameter Optimization
A 1 × 9 liquid crystal on silicon (LCoS)‐based optical switch is experimentally demonstrated, revealing that the worst‐case port isolation exceeds 37 dB within the wavelength range of 1460–1540 nm. This work offers an alternative route for the development of optical switches with a large number of ports and high isolation, applicable to large‐capacity ...
Linbojie Huang+8 more
wiley +1 more source