20 research outputs found

    Product forms as a solution base for queueing systems

    Get PDF
    A class of queueing networks has a product-form solution. It is interesting to investigate which queueing systems have solutions in the form of linear combinations of product forms. In this paper it is investigated when the equilibrium distribution of one or two-dimensional Markovian queueing systems can be written as linear combination of products of powers. Also some cases with extra supplementary variables are investigated

    Product forms as a solution base for queueing systems

    Full text link

    Applying Grover's algorithm to AES: quantum resource estimates

    Full text link
    We present quantum circuits to implement an exhaustive key search for the Advanced Encryption Standard (AES) and analyze the quantum resources required to carry out such an attack. We consider the overall circuit size, the number of qubits, and the circuit depth as measures for the cost of the presented quantum algorithms. Throughout, we focus on Clifford+T+T gates as the underlying fault-tolerant logical quantum gate set. In particular, for all three variants of AES (key size 128, 192, and 256 bit) that are standardized in FIPS-PUB 197, we establish precise bounds for the number of qubits and the number of elementary logical quantum gates that are needed to implement Grover's quantum algorithm to extract the key from a small number of AES plaintext-ciphertext pairs.Comment: 13 pages, 3 figures, 5 tables; to appear in: Proceedings of the 7th International Conference on Post-Quantum Cryptography (PQCrypto 2016

    Avalanche Polynomials of some Families of Graphs

    Get PDF
    We study the abelian sandpile model on different families of graphs. We introduced the avalanche polynomial which enumerates the size of the avalanches triggered by the addition of a particle on a recurrent configuration. This polynomial is calculated for several families of graphs. In the case of the complete graph, the result involves some known result on Parking function

    A Tight 2-Approximation for Preemptive Stochastic Scheduling

    Full text link

    Certified Signatures

    No full text

    Cryptographic Solution to a Multilevel Security Problem

    No full text
    corecore