3,815 research outputs found
์ฑ๊ธด ์ง์ ์ด์ฐ๋์ ๋ฌธ์
ํ์๋
ผ๋ฌธ (๋ฐ์ฌ)-- ์์ธ๋ํ๊ต ๋ํ์ : ์๋ฆฌ๊ณผํ๋ถ, 2012. 8. ์ฒ์ ํฌ.์ด์ฐ๋์ ๋ฌธ์ ๋ ํ๋ ๊ณต๊ฐํค ์ํธ์ ์์ด ๊ฐ์ฅ ์ค์ํ ์ํ์ ๊ธฐ๋ฐ ๋ฌธ์ ์ ํ๋์ด๋ค. ์๋ง์ ์ํธ ์์คํ
๊ณผ ํ๋กํ ์ฝ๋ค์ด ์ด์ฐ๋์๊ฐ ์ด๋ ต๋ค๋ ๊ฐ์ ํ๊ฒ ์ค๊ณ ๋ฐ ์ ์๋๊ณ ์์ผ๋ฉฐ ์ด๋ฌํ ์ฐ๊ตฌ๋ ํ๋ฐํ๊ฒ ์งํ๋๊ณ ์๋ค.
์ด์ฐ๋์ ๊ธฐ๋ฐ ์ํธ ์์คํ
์ ํจ์จ์ฑ์ ์ง์์น ์ฐ์ฐ ์๋์ ์ง๊ฒฐ๋๋ค. Hoffstein๊ณผ Silverman์ ์ด์ฐ๋์ ๋ฌธ์ ๊ฐ ์ ์๋ ๊ตฐ์์ ๋น ๋ฅธ ์ง์์น๊ณผ ์์ ์ฑ์ ๋ณด์ฅํ๊ธฐ ์ํด ํด๋ฐ ์จ์ดํธ๊ฐ ์์ ์ง์๋ค์ ๊ณฑ(์ฑ๊ธด ์ง์ ๊ณฑ)์ ์ฌ์ฉํ ๊ฒ์ ์ ์ํ์๋ค. ํนํ GF(2^n)์์์ ์ ๊ณฑ์ฐ์ฐ ๊ทธ๋ฆฌ๊ณ Koblitz ํ์ด ๊ณก์ ์์์ ๋ ๋ฐฐ ์ฐ์ฐ์ ๊ฐ๊ฐ์ ๊ตฐ ์ฐ์ฐ๋ณด๋ค ํจ์ฌ ๋น ๋ฅด๊ธฐ ๋๋ฌธ์ ์ฑ๊ธด ์ง์ ๊ณฑ์ ์ฌ์ฉํ๋ฉด ์ฐ์ฐ์ ๋งค์ฐ ๊ฐ์ํ์ํฌ ์ ์๋ค.
๋ณธ ํ์ ๋
ผ๋ฌธ์์๋ ์ฑ๊ธด ์ง์ ๊ณฑ ์ด์ฐ๋์ ๋ฌธ์ ์ ์์ ์ฑ์ ๋ถ์ํ๋ค. ํ์ฌ์ ์ฑ๊ธด ์ง์ ๊ณฑ ์ด์ฐ๋์ ๋ฌธ์ ์ ์์ ์ฑ ๋ถ์์ ์ฑ๊ธด ์ง์ ์ด์ฐ๋์ ๋ฌธ์ ์ ๋ถ์ ๊ธฐ๋ฒ์ ์์กดํ๊ณ ์๋๋ฐ ์ด๋ก๋ถํฐ๋ ๋ณธ๋ ๋ฌธ์ ์ ์ ํํ ์์ ์ฑ์ ์ธก์ ํ ์ ์๋ค.
๋ณธ ๋
ผ๋ฌธ์์๋ ์ฑ๊ธด ์ง์ ๊ณฑ ์ด์ฐ๋์ ๋ฌธ์ ์ ์์ ์ฑ์ ๋ถ์ํ๊ธฐ ์ํด ๋งค๊ฐํ๋ ๋ถํ ์์คํ
์ ์ด์ฉํ์ฌ์ฑ๊ธด ์ง์ ๊ณฑ ์ด์ฐ๋์ ๋ฌธ์ ๋ฅผ ๊ณต๊ฒฉํ๋ ํจ์จ์ ์ธ ์๊ณ ๋ฆฌ์ฆ์ ์ ์ํ๋ค. ์ ์ ์๊ณ ๋ฆฌ์ฆ์ ํ์ฌ๊น์ง ์๋ ค์ง ์๊ณ ๋ฆฌ์ฆ ์ค ๊ฐ์ฅ ๋น ๋ฅธ ์๊ฐ ์์ ์ฑ๊ธด ์ง์ ๊ณฑ ์ด์ฐ๋์ ๋ฌธ์ ์ ํด๋ฅผ ์ฐพ๋๋ค. ์ค์ฆ์ ์ธ ์๋ก์จ Coron, Lefranc ๊ทธ๋ฆฌ๊ณ Poupard๊ฐ CHES 2005์์ ์ ์ํ GPS ์ธ์ฆ ์คํด์ ๋น๋ฐํค์ Hoffstein๊ณผ Silverman์ด ์ ์ํ (2,2,11)-์ง์์ ๋ํด ์ ์ ์๊ณ ๋ฆฌ์ฆ์ ์ ์ฉํ์ฌ ๊ฐ๊ฐ์ ๋ํด 2^{61.82} ๊ทธ๋ฆฌ๊ณ 2^{53.02} ๋ฒ์ ๊ตฐ ์ฐ์ฐ์ ์ฌ์ฉํ์ฌ ๋น๋ฐํค๋ฅผ ๋ณต๊ตฌํ ์ ์์์ ๋ณด์ธ๋ค.The discrete logarithm problem is one of the most important underlying mathematical problems in contemporary public key cryptography. Under the assumption that the problem is infeasible, a great number of cryptosystems have been constructed and researches in this area are still underway actively.
The efficiency of cryptosystems based on the discrete logarithm problem primarily relies on the speed at which exponentiation can be performed. On this line of research to address the issue Hoffstein and Silverman suggested the use of low Hamming weight product exponents to accelerate group exponentiation while maintaining the security level. Taking low Hamming weight product exponents, computation costs on GF(2^n) or Koblitz elliptic curves can be reduced significantly, where the cost of squaring and elliptic curve doubling is much lower than that of multiplication and elliptic curve addition, respectively.
In the thesis we focus our concern on the security analysis of the discrete logarithm problem of low Hamming weight product exponents. The current estimate on the security of the problem mainly depends on the approaches for the case of low Hamming weight exponents, which does not fit into the product form well.
We come up with parameterized splitting systems to resolve this problem. We show that it yields an efficient algorithm for the discrete logarithm problem of low Hamming weight exponents with lower complexity than that of any previously known algorithms.
To demonstrate its application, we attack the GPS identification scheme modified by Coron, Lefranc, and Poupard in CHES 2005 and Hoffstein and Silverman's (2,2,11)-exponents. The time complexity of our key recovery attack against the GPS scheme is 2^{61.82}, which was expected to be 2^{78}. Hoffstein and Silverman's (2,2,11)-exponent can be recovered with a time complexity of 2^{53.02}, which is the lowest among the known attacks.1. Introduction
2. The Low Hamming Weight Discrete Logarithm Problem
3. The Low Hamming Weight Product DLP
4. Parameterized Splitting Systems
5. A New Algorithm from Parameterized Splitting Systems
6. Cryptanalysis
7. Conclusion and Open ProblemsDocto
Entropic equality for worst-case work at any protocol speed
We derive an equality for non-equilibrium statistical mechanics in
finite-dimensional quantum systems. The equality concerns the worst-case work
output of a time-dependent Hamiltonian protocol in the presence of a Markovian
heat bath. It has has the form "worst-case work = penalty - optimum". The
equality holds for all rates of changing the Hamiltonian and can be used to
derive the optimum by setting the penalty to 0. The optimum term contains the
max entropy of the initial state, rather than the von Neumann entropy, thus
recovering recent results from single-shot statistical mechanics. Energy
coherences can arise during the protocol but are assumed not to be present
initially. We apply the equality to an electron box.Comment: 4 page + 14 page appendix; 8 figures; AA
The algebra of q-pseudodifferential symbols and the q-W_{KP}^n algebra
In this paper we continue with the program to explore the topography of the
space of W-type algebras. In the present case, the starting point is the work
of Khesin, Lyubashenko and Roger on the algebra of q-deformed
pseudodifferential symbols and their associated integrable hierarchies. The
analysis goes on by studying the associated hamiltonian structures for which
compact expressions are found. The fundamental Poisson brackets yield
q-deformations of W_{KP} and related W-type algebras which, in specific cases,
coincide with the ones constructed by Frenkel and Reshetikhin. The construction
underlies a continuous correspondence between the hamiltonian structures of the
Toda lattice and the KP hierarchies.Comment: 28 pages. Section 5 revised. Misprints corrected. References adde
A theoretical study of thermal conductivity in single-walled boron nitride nanotubes
We perform a theoretical investigation on the thermal conductivity of
single-walled boron nitride nanotubes (SWBNT) using the kinetic theory. By
fitting to the phonon spectrum of boron nitride sheet, we develop an efficient
and stable Tersoff-derived interatomic potential which is suitable for the
study of heat transport in sp2 structures. We work out the selection rules for
the three-phonon process with the help of the helical quantum numbers attributed to the symmetry group (line group) of the SWBNT. Our calculation
shows that the thermal conductivity diverges with length as
with exponentially decaying , which results from the competition between boundary scattering
and three-phonon scattering for flexure modes. We find that the two flexure
modes of the SWBNT make dominant contribution to the thermal conductivity,
because their zero frequency locates at where is
the rotational angle of the screw symmetry in SWBNT.Comment: accepted by PR
- โฆ