20 research outputs found
Post-Quantum Key Exchange Protocols
If an eavesdropper Eve is equipped with quantum computers, she can easily
break the public key exchange protocols used today. In this paper we will
discuss the post-quantum Diffie-Hellman key exchange and private key exchange
protocols.Comment: 11 pages, 2 figures. Submitted to SPIE DSS 2006; v2 citation typos
fixed; v3 appendix typos correcte
A Framework on Collaboration: an Interdisciplinary Project across Multiple Colleges
The order of complexity in carrying out collaborative research at multiple campuses poses a challenge to standard knowledge management systems. In this paper, we present a collaboration framework in which computer science students work in partnership with computer scientists, mathematicians and physicists on an emerging field of research, quantum information science. We first develop a few heuristic criteria to determine the rationale that makes project a successful one. We then demonstrate that our knowledge management systems produce publishable results and grant proposals within our framework
Recommended from our members
Ensemble: 2004-10-06 - UNT Symphony Orchestra
Concert performed at UNT Murchison Performing Arts Center, Winspear Hall on October 6, 2011 at 8:00 pm