Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Type of Medium
Language
Region
Access
  • 1
    UID:
    b3kat_BV046957639
    Format: 1 Online-Ressource (XII, 274 Seiten) , Illustrationen
    Edition: 1st ed. 2021
    ISBN: 9789811551918
    Series Statement: Mathematics for Industry
    Content: This open access book presents selected papers from International Symposium on Mathematics, Quantum Theory, and Cryptography (MQC), which was held on September 25-27, 2019 in Fukuoka, Japan. The international symposium MQC addresses the mathematics and quantum theory underlying secure modeling of the post quantum cryptography including e.g. mathematical study of the light-matter interaction models as well as quantum computing. The security of the most widely used RSA cryptosystem is based on the difficulty of factoring large integers. However, in 1994 Shor proposed a quantum polynomial time algorithm for factoring integers, and the RSA cryptosystem is no longer secure in the quantum computing model. This vulnerability has prompted research into post-quantum cryptography using alternative mathematical problems that are secure in the era of quantum computers. In this regard, the National Institute of Standards and Technology (NIST) began to standardize post-quantum cryptography in 2016. This book is suitable for postgraduate students in mathematics and computer science, as well as for experts in industry working on post-quantum cryptography
    Note: Sustainable Cryptography -- What Kind of Insight Provide Analytical Solutions of Quantum Models? -- Emerging Ultrastrong Coupling between Light and Matter Observed in Circuit Quantum Electrodynamics -- Quantum Random Numbers Generated by a Cloud Superconducting Quantum Computer -- Quantum Factoring Algorithm: Resource Estimation and Survey of Experiments -- A Review of Secret Key Distribution Based on Bounded Observability -- Towards Constructing Fully Homomorphic Encryption without Ciphertext Noise from Group Theory -- Number Theoretic Study in Quantum Interactions -- From the Bloch Sphere to Phase Space Representations with the Gottesman-Kitaev-Preskill Encoding -- A Data Concealing Technique with Random Noise Disturbance and A Restoring Technique for the Concealed Data by Stochastic Process Estimation
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9789811551901
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9789811551925
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9789811551932
    Language: English
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    almahu_9949301203102882
    Format: 1 online resource (275 pages)
    ISBN: 9789811551918
    Series Statement: Mathematics for Industry Ser. ; v.33
    Note: Intro -- Foreword -- Preface -- Contents -- About the Editors -- < -- ExternalRef> -- < -- RefSource> -- swati.meherishi@springer.com< -- /RefSource> -- < -- RefTarget Address= -- Keynote -- Sustainable Cryptography -- What Kind of Insight Provide Analytical Solutions of Quantum Models? -- References -- Emerging Ultrastrong Coupling Between Light and Matter Observed in Circuit Quantum Electrodynamics -- References -- Summary -- Verified Numerical Computations and Related Applications -- A Review of Secret Key Distribution Based on Bounded Observability -- References -- Quantum Computing and Information Theory -- Quantum Random Numbers Generated by a Cloud Superconducting Quantum Computer -- 1 Introduction -- 2 Statistical Tests for Random Number Generators -- 3 NIST SP 800-22 -- 3.1 Frequency Test -- 3.2 Frequency Test Within a Block -- 3.3 Runs Test -- 3.4 The Longest Run of Ones Within a Block Test -- 3.5 Discrete Fourier Transform Test -- 3.6 Approximate Entropy Test -- 3.7 Cumulative Sums Test -- 4 Quantum Random Number Generation on the Cloud Quantum Computer -- 5 Conclusion -- References -- Quantum Factoring Algorithm: Resource Estimation and Survey of Experiments -- 1 Introduction -- 2 Outline of Shor's Quantum Factoring Algorithm (Shor) -- 2.1 Quantum Computation -- 2.2 Shor's Quantum Factoring Algorithm -- 2.3 Circuit Construction and Resource Estimation for Shor's Quantum Factoring Algorithm -- 2.4 Survey of Quantum Experiments for Factoring -- 3 Quantum Circuits Without Using the Order Information -- 3.1 Quantum Factoring Experiment Shown in IBMspsChuang -- 3.2 Quantum Factoring Experiment Shown in joseph -- 3.3 Quantum Factoring Experiment Shown in realization -- 4 Quantum Circuits with Explicitly Using the Order information -- 4.1 Quantum Factoring Experiment of N=15 Shown in photonic. , 4.2 Quantum Factoring Experiment of N=21 Shown in spsqubitrecycing -- 4.3 Oversimplified Shor's Algorithm (oversimplified) -- 5 Summary and Concluding Remarks -- References -- Towards Constructing Fully Homomorphic Encryption without Ciphertext Noise from Group Theory -- 1 Introduction -- 1.1 Our Contributions -- 2 Preliminaries -- 3 Our Framework for FHE -- 3.1 Group-Theoretic Realization of Functions -- 3.2 Lift of Realization of Functions -- 3.3 The Proposed Framework -- 4 Examples of Realizations of Functions in Groups -- 4.1 Deterministic Case: Known Result -- 4.2 Deterministic Case: Proposed Constructions -- 4.3 Preliminaries: On Random Sampling of Group Elements -- 4.4 Probabilistic Case: ``Commutator-Separable'' Groups -- 4.5 Probabilistic Case: Simple Groups -- 5 Towards Achieving Secure Lift of Realization -- 5.1 A Remark on the Choice of Random Variables -- 5.2 Insecurity of a Matrix-Based Naive Construction -- 5.3 Observation for Avoiding Linear Constraints -- 5.4 Another Trial Using Tietze Transformations -- References -- From the Bloch Sphere to Phase-Space Representations with the Gottesman-Kitaev-Preskill Encoding -- 1 Introduction -- 2 GKP Encoding of Qubit States -- 3 Phase-Space Wigner Representation of GKP Encoded States -- 4 Quantification of Negativity of the Wigner Function for GKP Encoded States -- 5 Conclusions -- References -- Quantum Interactions -- Number Theoretic Study in Quantum Interactions -- References -- A Data Concealing Technique with Random Noise Disturbance and a Restoring Technique for the Concealed Data by Stochastic Process Estimation -- 1 Introduction -- 2 Mathematical Setups -- 2.1 How to Conceal Data -- 2.2 How to Restore Data -- 3 Example of Functionals and Simulation -- 3.1 An Example of the Set of Functionals -- 3.2 Simulation of Concealing and Restoring Data on Physical Layer. , 4 Application to Data on Physical Layer and Presentation Layer -- 4.1 Binary Data of Pictorial Image -- 4.2 Analog Data of Pictorial Image -- 5 Conclusion and Future Work -- References -- Quantum Optics with Giant Atoms-the First Five Years -- 1 Introduction -- 2 Theory for Giant Atoms -- 2.1 One Giant Atom -- 2.2 One Giant Atom with Time Delay -- 2.3 Multiple Giant Atoms -- 3 Experiments with Giant Atoms -- 3.1 Superconducting Qubits and Surface Acoustic Waves -- 3.2 Superconducting Qubits and Microwave Transmission Lines -- 3.3 Cold Atoms in Optical Lattices -- 4 Conclusion and Outlook -- References -- Topics in Mathematics -- Extended Divisibility Relations for Constraint Polynomials of the Asymmetric Quantum Rabi Model -- 1 Introduction -- 2 The Confluent Picture of the Asymmetric Quantum Rabi Model -- 3 Extended Divisibility Properties for Constraint and Related Polynomials -- 4 Open Problems -- 4.1 Number of Exceptional Solutions of the AQRM -- 4.2 Classification of Parameter Regimes -- References -- Generalized Group-Subgroup Pair Graphs -- 1 Introduction -- 1.1 Conventions -- 2 Preliminaries -- 3 Cayley Graphs and Group-Subgroup Pair Graphs -- 3.1 Cayley Graphs -- 3.2 Group-Subgroup Pair Graphs -- 4 Homogeneity -- 5 Generalized Group-Subgroup Pair Graph -- 5.1 Definition -- 5.2 Examples -- 6 Spectra of G(G,H,S) -- 6.1 Adjacency Matrix of G(G,H,S) -- 6.2 When H is abelian -- 6.3 Petersen Extension -- References -- Post-Quantum Cryptography -- A Survey of Solving SVP Algorithms and Recent Strategies for Solving the SVP Challenge -- 1 Introduction -- 2 Mathematical Background -- 2.1 Lattices and Their Bases -- 2.2 Successive Minima, Hermite's Constants, and Gaussian Heuristic -- 2.3 Introduction to Lattice Problems -- 3 Solving SVP Algorithms -- 3.1 Exact-SVP Algorithms -- 3.2 Approximate-SVP Algorithms. , 4 The SVP Challenge and Recent Strategies -- 4.1 The Random Sampling Strategy -- 4.2 The Sub-Sieving Strategy -- References -- Recent Developments in Multivariate Public Key Cryptosystems -- 1 Introduction -- 2 UOV, Rainbow, and Variants of HFE -- 2.1 Basic Constructions of Multivariate Public Key Cryptosystems -- 2.2 UOV -- 2.3 Rainbow -- 2.4 HFE -- 2.5 Variants of HFE -- 3 New Encryption Schemes -- 3.1 HFERP -- 3.2 ZHFE -- 3.3 EFC -- 3.4 ABC -- 4 Conclusion -- References -- Ramanujan Graphs for Post-Quantum Cryptography -- 1 Introduction -- 2 Ramanujan Graphs and Their Cryptographic Applications -- 2.1 Security on Cayley Hashes and Word Problems -- 2.2 Lifting Attacks -- 3 The Families of LPS-Type Graphs -- 3.1 Proof of the Ramanujan-Ness of Graphs XP,Q(p,q) when P=13 -- 4 Relationship Between LPS-Type Graphs and Pizer's Graphs -- 4.1 Similarities and Differences -- 5 Open Problems -- References -- Post-Quantum Constant-Round Group Key Exchange from Static Assumptions -- 1 Introduction -- 1.1 Background -- 1.2 Our Contributions -- 1.3 Key Techniques -- 1.4 Organization -- 2 Preliminaries -- 2.1 Group Key Exchange -- 2.2 SIDH and CSIDH Key Exchange -- 3 New Assumptions on Supersingular Invariants -- 3.1 New Assumptions on Supersingular j-Invariants -- 3.2 New Assumptions on Supersingular Montgomery Coefficients -- 4 Proposed Post-Quantum Group Key Exchange (GKE) -- 4.1 A Generic JV-Type Compiler for GKE from Two-Party KE (ch18JusVau96) -- 4.2 Constant-Round GKE from Static Standard Assumptions -- 4.3 Two-Round Product-BD (PBD) GKE from d-DSJP Assumption -- 4.4 Two-Round PBD GKE from d-DSMP Assumption -- References -- 19 Correction to: International Symposium on Mathematics, Quantum Theory, and Cryptography. , Correction to: T. Takagi et al. (eds.), International Symposium on Mathematics, Quantum Theory, and Cryptography, Mathematics for Industry 33, https://doi.org/10.1007/978-981-15-5191-8 -- Index.
    Additional Edition: Print version: Takagi, Tsuyoshi International Symposium on Mathematics, Quantum Theory, and Cryptography Singapore : Springer Singapore Pte. Limited,c2020 ISBN 9789811551901
    Language: English
    Keywords: Electronic books. ; Electronic books. ; Electronic books.
    URL: FULL  ((Currently Only Available on Campus))
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    almahu_9948595061002882
    Format: XII, 274 p. 83 illus., 24 illus. in color. , online resource.
    Edition: 1st ed. 2021.
    ISBN: 9789811551918
    Series Statement: Mathematics for Industry, 33
    Content: This open access book presents selected papers from International Symposium on Mathematics, Quantum Theory, and Cryptography (MQC), which was held on September 25-27, 2019 in Fukuoka, Japan. The international symposium MQC addresses the mathematics and quantum theory underlying secure modeling of the post quantum cryptography including e.g. mathematical study of the light-matter interaction models as well as quantum computing. The security of the most widely used RSA cryptosystem is based on the difficulty of factoring large integers. However, in 1994 Shor proposed a quantum polynomial time algorithm for factoring integers, and the RSA cryptosystem is no longer secure in the quantum computing model. This vulnerability has prompted research into post-quantum cryptography using alternative mathematical problems that are secure in the era of quantum computers. In this regard, the National Institute of Standards and Technology (NIST) began to standardize post-quantum cryptography in 2016. This book is suitable for postgraduate students in mathematics and computer science, as well as for experts in industry working on post-quantum cryptography.
    Note: Sustainable Cryptography -- What Kind of Insight Provide Analytical Solutions of Quantum Models? -- Emerging Ultrastrong Coupling between Light and Matter Observed in Circuit Quantum Electrodynamics -- Quantum Random Numbers Generated by a Cloud Superconducting Quantum Computer -- Quantum Factoring Algorithm: Resource Estimation and Survey of Experiments -- A Review of Secret Key Distribution Based on Bounded Observability -- Towards Constructing Fully Homomorphic Encryption without Ciphertext Noise from Group Theory -- Number Theoretic Study in Quantum Interactions -- From the Bloch Sphere to Phase Space Representations with the Gottesman-Kitaev-Preskill Encoding -- A Data Concealing Technique with Random Noise Disturbance and A Restoring Technique for the Concealed Data by Stochastic Process Estimation.
    In: Springer Nature eBook
    Additional Edition: Printed edition: ISBN 9789811551901
    Additional Edition: Printed edition: ISBN 9789811551925
    Additional Edition: Printed edition: ISBN 9789811551932
    Language: English
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    almafu_9959328480102883
    Format: 1 online resource (xiv, 538 pages) : , illustrations
    ISBN: 9781118313558 , 1118313550 , 9781118313541 , 1118313542 , 9781118313534 , 1118313534
    Content: "Based on a number of breakthroughs in SiC material science and fabrication technology in the 1980s and 1990s, the first SiC Schottky barrier diodes (SBDs) were released as commercial products in 2001. The SiC SBD market has grown significantly since that time, and SBDs are now used in a variety of power systems, particularly switch-mode power supplies and motor controls. SiC power MOSFETs entered commercial production in 2011, providing rugged, high-efficiency switches for high-frequency power systems. In this wide-ranging book, the authors draw on their considerable experience to present both an introduction to SiC materials, devices, and applications and an in-depth reference for scientists and engineers working in this fast-moving field."--
    Note: ""Title Page""; ""Copyright""; ""About the Authors""; ""Preface""; ""Chapter 1: Introduction""; ""1.1 Progress in Electronics""; ""1.2 Features and Brief History of Silicon Carbide""; ""1.3 Outline of This Book""; ""References""; ""Chapter 2: Physical Properties of Silicon Carbide""; ""2.1 Crystal Structure""; ""2.2 Electrical and Optical Properties""; ""2.3 Thermal and Mechanical Properties""; ""2.4 Summary""; ""References""; ""Chapter 3: Bulk Growth of Silicon Carbide""; ""3.1 Sublimation Growth""; ""3.2 Polytype Control in Sublimation Growth"" , ""3.3 Defect Evolution and Reduction in Sublimation Growth""""3.4 Doping Control in Sublimation Growth""; ""3.5 High- Temperature Chemical Vapor Deposition""; ""3.6 Solution Growth""; ""3.7 3C-SiC Wafers Grown by Chemical Vapor Deposition""; ""3.8 Wafering and Polishing""; ""3.9 Summary""; ""References""; ""Chapter 4: Epitaxial Growth of Silicon Carbide""; ""4.1 Fundamentals of SiC Homoepitaxy""; ""4.2 Doping Control in SiC CVD""; ""4.3 Defects in SiC Epitaxial Layers""; ""4.4 Fast Homoepitaxy of SiC""; ""4.5 SiC Homoepitaxy on Non-standard Planes"" , ""4.6 SiC Homoepitaxy by Other Techniques""""4.7 Heteroepitaxy of 3C-SiC""; ""4.8 Summary""; ""References""; ""Chapter 5: Characterization Techniques and Defects in Silicon Carbide""; ""5.1 Characterization Techniques""; ""5.2 Extended Defects in SiC""; ""5.3 Point Defects in SiC""; ""5.4 Summary""; ""References""; ""Chapter 6: Device Processing of Silicon Carbide""; ""6.1 Ion Implantation""; ""6.2 Etching""; ""6.3 Oxidation and Oxide/SiC Interface Characteristics""; ""6.4 Metallization""; ""6.5 Summary""; ""References""; ""Chapter 7: Unipolar and Bipolar Power Diodes"" , ""7.1 Introduction to SiC Power Switching Devices""""7.2 Schottky Barrier Diodes (SBDs)""; ""7.3 pn and pin Junction Diodes""; ""7.4 Junction-Barrier Schottky (JBS) and Merged pin-Schottky (MPS) Diodes""; ""References""; ""Chapter 8: Unipolar Power Switching Devices""; ""8.1 Junction Field-Effect Transistors (JFETs)""; ""8.2 Metal-Oxide-Semiconductor Field-Effect Transistors (MOSFETs)""; ""References""; ""Chapter 9: Bipolar Power Switching Devices""; ""9.1 Bipolar Junction Transistors (BJTs)""; ""9.2 Insulated-Gate Bipolar Transistors (IGBTs)""; ""9.3 Thyristors""; ""References"" , ""Chapter 10: Optimization and Comparison of Power Devices""""10.1 Blocking Voltage and Edge Terminations for SiC Power Devices""; ""10.2 Optimum Design of Unipolar Drift Regions""; ""10.3 Comparison of Device Performance""; ""References""; ""Chapter 11: Applications of Silicon Carbide Devices in Power Systems""; ""11.1 Introduction to Power Electronic Systems""; ""11.2 Basic Power Converter Circuits""; ""11.3 Power Electronics for Motor Drives""; ""11.4 Power Electronics for Renewable Energy""; ""11.5 Power Electronics for Switch-Mode Power Supplies""
    Additional Edition: Print version: Kimoto, Tsunenobu, 1963- Fundamentals of silicon carbide technology. Singapore : John Wiley & Sons Singapore Pte. Ltd., [2014] ISBN 9781118313527
    Language: English
    Subjects: Engineering , Physics
    RVK:
    RVK:
    Keywords: Electronic books. ; Electronic books. ; Electronic books. ; Electronic books.
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    b3kat_BV047175485
    Format: 1 Online-Ressource (XI, 119 p. 99 illus., 86 illus. in color)
    Edition: 1st ed. 2021
    ISBN: 9783030626808
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-62679-2
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-62681-5
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-62682-2
    Language: English
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    UID:
    b3kat_BV045384423
    Format: 1 DVD-Video (99 min) , farbig , 12 cm
    Note: Orig.: Deutschland 2017 , Deutsch
    Language: German
    Keywords: Film ; DVD-Video ; Film ; Film
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    UID:
    gbv_1778421199
    Format: 1 Online-Ressource (274 p.)
    ISBN: 9789811551918
    Series Statement: Mathematics for Industry
    Content: This open access book presents selected papers from International Symposium on Mathematics, Quantum Theory, and Cryptography (MQC), which was held on September 25-27, 2019 in Fukuoka, Japan. The international symposium MQC addresses the mathematics and quantum theory underlying secure modeling of the post quantum cryptography including e.g. mathematical study of the light-matter interaction models as well as quantum computing. The security of the most widely used RSA cryptosystem is based on the difficulty of factoring large integers. However, in 1994 Shor proposed a quantum polynomial time algorithm for factoring integers, and the RSA cryptosystem is no longer secure in the quantum computing model. This vulnerability has prompted research into post-quantum cryptography using alternative mathematical problems that are secure in the era of quantum computers. In this regard, the National Institute of Standards and Technology (NIST) began to standardize post-quantum cryptography in 2016. This book is suitable for postgraduate students in mathematics and computer science, as well as for experts in industry working on post-quantum cryptography
    Note: English
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    UID:
    b3kat_BV044530746
    Format: 1 Online-Ressource (VIII, 368 p. 23 illus., 6 illus. in color)
    ISBN: 9789811050657
    Series Statement: Mathematics for Industry 29
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-981-10-5064-0
    Language: English
    Subjects: Computer Science
    RVK:
    URL: Volltext  (URL des Erstveröffentlichers)
    Author information: Takagi, Tsuyoshi 1969-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    UID:
    gbv_364171375
    Format: [28] Bl. , überw. Ill.
    Language: German
    Keywords: Ausstellungskatalog
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    UID:
    gbv_615875416
    Format: [32] S. , zahlr. Ill.
    ISBN: 9783941318137
    Series Statement: Goldrausch / hrsg. von Goldrausch-Künstlerinnenprojekt Art IT
    Language: German
    Keywords: Kimoto, Keiko 1977- ; Ausstellungskatalog ; Ausstellung ; Ausstellungskatalog
    Author information: Effinger, Birgit 1961-
    Author information: Dillkofer, Katrin 1978-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages