期刊文献+
共找到11篇文章
< 1 >
每页显示 20 50 100
Effects of T-Factor on Quantum Annealing Algorithms for Integer Factoring Problem
1
作者 Zhiqi Liu Shihui Zheng +2 位作者 Xingyu Yan Ping Pan Licheng Wang 《Journal of Quantum Computing》 2023年第1期41-54,共14页
The hardness of the integer factoring problem(IFP)plays a core role in the security of RSA-like cryptosystems that are widely used today.Besides Shor’s quantum algorithm that can solve IFP within polynomial time,quan... The hardness of the integer factoring problem(IFP)plays a core role in the security of RSA-like cryptosystems that are widely used today.Besides Shor’s quantum algorithm that can solve IFP within polynomial time,quantum annealing algorithms(QAA)also manifest certain advantages in factoring integers.In experimental aspects,the reported integers that were successfully factored by using the D-wave QAA platform are much larger than those being factored by using Shor-like quantum algorithms.In this paper,we report some interesting observations about the effects of QAA for solving IFP.More specifically,we introduce a metric,called T-factor that measures the density of occupied qubits to some extent when conducting IFP tasks by using D-wave.We find that T-factor has obvious effects on annealing times for IFP:The larger of T-factor,the quicker of annealing speed.The explanation of this phenomenon is also given. 展开更多
关键词 Quantum annealing algorithm integer factorization problem T-factor D-WAVE
下载PDF
A NEW PUBLIC-KEY ENCRYPTION SCHEME BASED ON LUCAS SEQUENCE 被引量:2
2
作者 Jiang Zhengtao Hao Yanhua Wang Yumin 《Journal of Electronics(China)》 2005年第5期490-497,共8页
Investigated the properties of LUCas sequence(LUC), the paper proposed a new variant of (probabilistic) public-key encryption scheme. Security analysis of the proposed encryption schemes shows that its one-wayness is ... Investigated the properties of LUCas sequence(LUC), the paper proposed a new variant of (probabilistic) public-key encryption scheme. Security analysis of the proposed encryption schemes shows that its one-wayness is equivalent to partial LUC discrete logarithm problem in ZN, and for the proposed probabilistic encryption scheme, its semantic security is equivalent to decisional LUC Diffie-Hellman problem in ZN. At last, the efficiency of the proposed schemes is briefly analyzed. 展开更多
关键词 Probabilistic public-key encryption scheme LUCas sequence(LUC) Discrete logarithm integer factorization
下载PDF
New Weak Keys in RSA
3
作者 WANG Baocang LIU Shuanggen HU Yupu 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1529-1532,共4页
The security of the RSA system with the prime pairs of some special form is investigated. A new special-purpose algorithm for factoring RSA numbers is proposed. The basic idea of the method is to factor RSA numbers by... The security of the RSA system with the prime pairs of some special form is investigated. A new special-purpose algorithm for factoring RSA numbers is proposed. The basic idea of the method is to factor RSA numbers by factoring a well-chosen quadratic polynomial with integral coefficients. When viewed as a general-purpose algorithm, the new algorithm has a high computational complexity. It is shown thai the RSA number n = pq can be easily factored if p and q have the special form of p = as+b, q=cs+d, where a, b, c, d are relatively small numbers. Such prime pairs (p, q) are the weak keys of RSA, so when we generate RSA modulus, we should avoid using such prime pairs (p, q). 展开更多
关键词 integer factorization RSA number public key cryptosystem special-purpose algorithm
下载PDF
On the elliptic curve y^2=x^3-2r Dx and factoring integers
4
作者 LI XiuMei ZENG JinXiang 《Science China Mathematics》 SCIE 2014年第4期719-728,共10页
Let D=pq be the product of two distinct odd primes.Assuming the parity conjecture,we construct infinitely many r≥1 such that E2rD:y2=x3-2rDx has conjectural rank one and vp(x([k]Q))≠vq(x([k]Q))for any odd integer k,... Let D=pq be the product of two distinct odd primes.Assuming the parity conjecture,we construct infinitely many r≥1 such that E2rD:y2=x3-2rDx has conjectural rank one and vp(x([k]Q))≠vq(x([k]Q))for any odd integer k,where Q is the generator of the free part of E(Q).Furthermore,under the generalized Riemann hypothesis,the minimal value of r is less than c log4 D for some absolute constant c.As a corollary,one can factor D by computing the generator Q. 展开更多
关键词 elliptic curve integer factoring Selmer group
原文传递
整数矩阵及其在解线性方程组方面的应用 被引量:2
5
作者 王路群 刘英 +1 位作者 李凤霞 刘冬丽 《哈尔滨师范大学自然科学学报》 CAS 2010年第4期30-33,共4页
讨论整系数方程组解的存在性与求解方法.
关键词 整系数方程组 初等变换 整数可逆矩阵 行列式因数 不变因数
下载PDF
关于二元多项式的整除与最大公因式的讨论 被引量:1
6
作者 庞新琴 《菏泽师专学报》 1997年第2期39-43,共5页
在整环F(x)的分式域上,讨论了二元多项式的整除问题,论证了二元多项式最大公因式的存在性及求法。
关键词 二元多项式 分式域 整除 最大公因式 多项式
下载PDF
一阶微分方程积分因子存在性及应用
7
作者 罗志敏 莫照发 《玉林师范学院学报》 2011年第5期37-40,共4页
讨论了一阶微分方程积分因子的存在性问题。给出了一类一阶微分方程存在齐次多项式积分因子的一组充分必要条件,并且给出具体例子说明了其应用,丰富了微分方程的解法。
关键词 全微分方程 积分因子 通解 齐次多项式
下载PDF
同余方程(组)的整数处理方法
8
作者 刘英 王路群 +1 位作者 李凤霞 刘冬丽 《哈尔滨师范大学自然科学学报》 CAS 2011年第3期12-15,共4页
将同余方程组n∑j=1aijxj≡bi(modmi)(i=1,…,k)化为整系数方程组n∑j=1aijxj-mxn+i=bi(i=1,…,k),利用文献[2]中提供的通过对整数矩阵的初等变换方法处理解的存在性与具体求解.另外,对同余方程组x≡ai(modmi),1≤i≤k,在有解时提出求... 将同余方程组n∑j=1aijxj≡bi(modmi)(i=1,…,k)化为整系数方程组n∑j=1aijxj-mxn+i=bi(i=1,…,k),利用文献[2]中提供的通过对整数矩阵的初等变换方法处理解的存在性与具体求解.另外,对同余方程组x≡ai(modmi),1≤i≤k,在有解时提出求解公式x≡(M1/d)b1a1+…+(Mk/d)bkak(mod[m1,…,mk])并利用文献[3]中的初等变换的方法,求出bi(1≤i≤k),从而得到同余方程组的解. 展开更多
关键词 同余方程(组) 整系数线性方程组 整数矩阵 初等变换 不变因数
下载PDF
The Greatest Prime Factor of the Integers in a Short Interval (Ⅳ) 被引量:1
9
作者 Jia Chaohua Institute of Mathematics Academia Sinica Beijing, 100080 China 《Acta Mathematica Sinica,English Series》 SCIE CSCD 1996年第4期433-445,共13页
Let P(x) denote the greatest prime factor of ∏<sub>x【n≤x+x<sup>1/2</sup></sub>n. In this paper, we shall prove that P(x)】x<sup>0.728</sup>holds true for sufficiently large x.
关键词 MATH In The Greatest Prime factor of the integers in a Short Interval
原文传递
两种介质断裂问题各阶应力强度因子的直接积分表达 被引量:1
10
作者 庞之垣 《贵州师范大学学报(自然科学版)》 CAS 1995年第1期1-5,共5页
本文把文[1]的思想,推广应用到处理两种介质断裂问题的两种特殊情形。同时指出了专著[2]的某些错误。
关键词 应力强度因子 积分表达 断裂力学
下载PDF
Further research on public-key cryptosystems based on third-order recurrence sequence
11
作者 JIANG Zheng-tao SUN Xi +1 位作者 TIAN Lei WANG Yu-min 《Frontiers of Electrical and Electronic Engineering in China》 CSCD 2006年第3期287-290,共4页
Properties of third-order recurrence sequences were investigated and a new variant of the GH public-key cryptosystem,which was further improved to be a probabil-istic public-key cryptosystem,was proposed.Then security... Properties of third-order recurrence sequences were investigated and a new variant of the GH public-key cryptosystem,which was further improved to be a probabil-istic public-key cryptosystem,was proposed.Then security analysis of the proposed scheme was provided and it was proved that the one-wayness of the proposed scheme is equivalent to partial discrete logarithm and its semantic se-curity is equivalent to decisional Diffie-Hellman problem in ring extension.Finally,efficiency analysis of the proposed scheme was provided,and that these two encryption schemes need to transfer 2log N and 4log N bits data re-spectively. 展开更多
关键词 public-key cryptosystem third-order linear recurrence sequence (trapdoor)discrete logarithm integer factorization
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部