نتایج جستجو برای: alice code
تعداد نتایج: 173826 فیلتر نتایج به سال:
This paper studies the mapping g → g 2 (mod p) by showing that it inherits its structure from the mapping x → x (mod ordp(g)). We first explore the context in which this mapping is important; specifically, we consider the Diffie-Hellman protocol, Diffie-Hellman problem, and the various problems that have spawned from these including the discrete logarithm and square exponent problems. We then d...
Nonlocal boxes (NLBs) are devices that are used to generate correlated bits between two spatially separated parties. If the generated correlation is weak, it can sometimes be distilled into a stronger correlation by repeated applications of the nonlocal box. We initiate here a study of the distillation of correlations for nonlocal boxes that output quantum states rather than classical bits. We ...
Encryption in which “your name is your public key” is called Identity-Based Encryption (IBE). Shamir’s original motivation for identity-based encryption was to simplify the management of public keys. Frequently, this process can be unwieldy because of the following problem: if Bob obtains Alice’s public key over the network, how does Bob know that the key really belongs to Alice, and not to a m...
We show that in certain theories with topologically trivial quotient space of spontaneously broken gauge symmetry there can exist topologically stable strings that carry nonabelian gauge flux. These objects result from the “accidental” global degeneracy of the vacuum which makes it topologically nontrivial. In particular, some models contain the semiglobal analog of the Alice strings. ∗Permanen...
The ALICE Trigger System is made up of two independent parts: a Central Trigger Processor (CTP) and a Trigger Distribution Network. The CTP provides the trigger decision logic. It generates triggers for the readout detectors by evaluating inputs from triggering detectors. The Trigger Distribution Network delivers these triggers to the detectors; in addition it is capable of running in standalon...
Access to journal content has been central to the open access (OA) debate. The European Commission has focused on ‘access and preservation’ in its planning for Horizon 2020; in the UK the Department of Business, Innovation and Skills (BIS) has set up the Finch Group (an independent working group that emerged from discussions at a round table meeting on transparency with the Rt Hon David Willett...
In this paper, a protocol is proposed in which energy extraction from local vacuum states is possible by using quantum measurement information for the vacuum state of quantum fields. In the protocol, Alice, who stays at a spatial point, excites the ground state of the fields by a local measurement. Consequently, wavepackects generated by A' measurement propagate the vacuum to spatial infinity. ...
Alice would like to detect faces in a collection of sensitive surveillance images she own. Bob has a face detection algorithm that he is willing to let Alice use, for a fee, as long as she learns nothing about his detector. Alice is willing to use Bob’s detector provided that he will learn nothing about her images, not even the result of the face detection operation. Blind vision is about apply...
We present a quantum secure direct communication scheme achieved by swapping quantum entanglement. In this scheme a set of ordered Einstein-Podolsky-Rosen (EPR) pairs is used as a quantum information channel for sending secret messages directly. After insuring the safety of the quantum channel, the sender Alice encodes the secret messages directly by applying a series local operations on her pa...
The ALICE experiment at CERN is now ready to take data in protonproton and ultra-relativistic heavy-ion collisions at LHC. This review starts with a description of the ALICE experimental setup and its excellent tracking and particle identification capabilities. Then, we will discuss the ways to probe the hot and dense medium created at multi-TeV energies by measuring the yields and kinematic ch...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید