期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
On Universality of Quantum Fourier Transform
1
作者 Arpita Maitra santanu sarkar 《Chinese Physics Letters》 SCIE CAS CSCD 2012年第3期17-20,共4页
A methodology is presented to obtain the basis of qudits which are admissible to quantum Fourier transform(QFT)in the sense that the set of such kets are related by the QFT in the same way as the kets of the computati... A methodology is presented to obtain the basis of qudits which are admissible to quantum Fourier transform(QFT)in the sense that the set of such kets are related by the QFT in the same way as the kets of the computational basis.We first study this method for qubits to characterize the ensemble that works for the Hadamard transformation(QFT for two dimension).In this regard we identify certain incompleteness in the result of Maitra and Parashar(Int.J.Quantum Inform.4(2006)653).Next we characterize the ensemble of qutrits for which QFT is possible.Further,some theoretical results related to higher dimensions are also discussed.Considering the unitary matrix Un related to QFT,the issue boils down to the problem of characterizing matrices that commute with Un. 展开更多
关键词 ENSEMBLE ADMISSIBLE DIMENSIONS
下载PDF
Differential fault location identification by machine learning
2
作者 Anubhab Baksi santanu sarkar +2 位作者 Akhilesh Siddhanti Ravi Anand Anupam Chattopadhyay 《CAAI Transactions on Intelligence Technology》 EI 2021年第1期17-24,共8页
As the fault‐based attacks are becoming a more pertinent threat in today's era of edge computing/internet‐of‐things,there is a need to streamline the existing tools for better accuracy and ease of use,so that w... As the fault‐based attacks are becoming a more pertinent threat in today's era of edge computing/internet‐of‐things,there is a need to streamline the existing tools for better accuracy and ease of use,so that we can gauge the attacker's power and a proper countermeasure can be devised in the long run.In this regard,we propose a machine learning(ML)assisted tool that can be used in the context of a differential fault attack.In particular,finding the exact fault location by analysing the output difference(typically the XOR of the nonfaulty and the faulty ciphertexts)is somewhat nontrivial.During the literature survey,we notice that the Pearson's correlation coefficient dominantly is used for this purpose,and has almost become the defacto standard.While this method can yield good accuracy for certain cases,we argue that an MLbased method is more powerful in all the situations we experiment with.We sub-stantiate our claim by showing the relative performances(we choose the commonly used multilayer perceptron as our ML tool)with two variants of Grain‐128a(a stream cipher,and a stream cipher with authentication),the lightweight stream cipher LIZARD and the lightweight block cipher SIMON‐32(where the faults are injected at the fifth last rounds).Our results demonstrate that a common ML tool can outperform the correlation with the same training/testing data.We believe that our work extends the state‐of‐the‐art by showing how traditional cryptographic methods can be replaced by a more powerful ML tool. 展开更多
关键词 FAULT typically GAUGE
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部