期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
The Layout and Simulation of Logarithmic Spiral Double Curved Arch Dam Transverse Joints
1
作者 DU Ting-na DU Qi-lu HUI Yuan 《Computer Aided Drafting,Design and Manufacturing》 2011年第1期8-12,共5页
Because of its good condition with mechanics, logarithmic spiral double curve arch bam has been widely used in the practical engineering. The introduction of a new method in how to divide transverse joint in arch dam ... Because of its good condition with mechanics, logarithmic spiral double curve arch bam has been widely used in the practical engineering. The introduction of a new method in how to divide transverse joint in arch dam will be given and the further research of its calculation has been done. The C++ is used in electronic procedure and the 3D simulation has been finished with AutoCAD, which will provide the object model for computer simulation of the arch dam and the division of finite element mesh. Meanwhile, this method in dividing the transverse joint in arch dam also can be taken as the calculated basis for the design and calculation of arch dam, construction lofting and the calculation of the work amount. 展开更多
关键词 the application of computer logarithmic spiral double curved arch dam transverse joints arched girder 3D modeling the design of C++ procedure
在线阅读 下载PDF
Calibration of the Infiltration Rate Curve from the LN Trend Line at Eight Sites of Interest, Based on Infiltration Tests Carried out
2
作者 Victor Rogelio Tirado Picado 《Open Journal of Applied Sciences》 CAS 2022年第7期1098-1115,共18页
The purpose of this research is to demonstrate that a calibration curve can be obtained that can be used for any infiltration test, with the double ring method, as well as an equation that helps speed up data processi... The purpose of this research is to demonstrate that a calibration curve can be obtained that can be used for any infiltration test, with the double ring method, as well as an equation that helps speed up data processing. The experimentation was carried out in eight points in Nicaragua, of which five were distributed in Managua and three in Rivas-Nandaime. These results can be used for purposes of other studies of interest. As a result, a calibration curve is obtained, and an expression equal to  is deduced, which will be the equation to determine the average infiltration of a field test occupying the double ring, for a total of 7 hours. And it is from the result that the texture of the soil can be determined by means of the indicator table. The basic methodology allowed analyzing the data since they are obtained, processed and analyzed, resulting in the calibration curve for infiltration tests. Finally, an equation was determined from the averages of the processed data, resulting in a correlation of 0.9976, above 0.5, which means it is very high and reliable. 展开更多
关键词 Double Ring INFILTRATION CALIBRATION logarithmic curve Data Adjustment
在线阅读 下载PDF
A New Digital Multilevel Proxy Signature Scheme Based on Elliptic Curve Cryptography
3
作者 QIN Yanlin WU Xiaoping 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1704-1706,共3页
Based on the analysis of elliptic curve digital signature algorithm(ECDSA),aiming at multilevel proxy signature in which the original signer delegates the digital signature authority to several proxies and its secur... Based on the analysis of elliptic curve digital signature algorithm(ECDSA),aiming at multilevel proxy signature in which the original signer delegates the digital signature authority to several proxies and its security demands, a new multilevel proxy signature scheme based on elliptic curve discrete logarithm problem (ECDLP) is presented and its security are proved. 展开更多
关键词 elliptic curve digital signature multilevel proxy signature elliptic curve discrete logarithm
在线阅读 下载PDF
Certificateless Proxy Identity-Based Signcryption Scheme Without Bilinear Pairings 被引量:8
4
作者 亓延峰 唐春明 +2 位作者 娄裕 徐茂智 郭宝安 《China Communications》 SCIE CSCD 2013年第11期37-41,共5页
Signcryption, which was introduced by ZHEN~ is a cryptographic primitive that fulfils the functions of both digital signature and encryption and guarantees confidentiality, integrity and non-repudiation in a more effi... Signcryption, which was introduced by ZHEN~ is a cryptographic primitive that fulfils the functions of both digital signature and encryption and guarantees confidentiality, integrity and non-repudiation in a more effi- cient way. Certificateless signcryption and pro- xy signcryption in identity-based cryptography were proposed for different applications. Most of these schemes are constructed by bilinear pairings from elliptic curves. However, some schemes were recently presented without pai- rings. In this paper, we present a certificateless proxy identity-based signcryption scheme with- out bilinear pairings, which is efficient and secure. 展开更多
关键词 certificateless signcryption iden-tity-based cryptography proxy signcryption elliptic curve discrete logarithm problem
在线阅读 下载PDF
Minimizing CNOT-count in quantum circuit of the extended Shor’s algorithm for ECDLP
5
作者 Xia Liu Huan Yang Li Yang 《Cybersecurity》 2025年第1期153-179,共27页
The elliptic curve discrete logarithm problem(ECDLP)is a popular choice for cryptosystems due to its high level of security.However,with the advent of the extended Shor’s algorithm,there is concern that ECDLP may soo... The elliptic curve discrete logarithm problem(ECDLP)is a popular choice for cryptosystems due to its high level of security.However,with the advent of the extended Shor’s algorithm,there is concern that ECDLP may soon be vulnerable.While the algorithm does ofer hope in solving ECDLP,it is still uncertain whether it can pose a real threat in practice.From the perspective of the quantum circuits of the algorithm,this paper analyzes the feasibility of cracking ECDLP using an ion trap quantum computer with improved quantum circuits for the extended Shor’s algorithm.We give precise quantum circuits for extended Shor’s algorithm to calculate discrete logarithms on elliptic curves over prime felds,including modular subtraction,three diferent modular multiplication,and modular inverse.Additionally,we incorporate and improve upon windowed arithmetic in the circuits to reduce the CNOTcounts.Whereas previous studies mostly focused on minimizing the number of qubits or the depth of the circuit,we focus on minimizing the number of CNOT gates in the circuit,which greatly afects the running time of the algorithm on an ion trap quantum computer.Specifcally,we begin by presenting implementations of basic arithmetic operations with the lowest known CNOT-counts,along with improved constructions for modular inverse,point addition,and windowed arithmetic.Next,we precisely estimate that,to execute the extended Shor’s algorithm with the improved circuits to factor an n-bit integer,the CNOT-count required is1237n^(3)/log n+2n^(2)+n.Finally,we analyze the running time and feasibility of the extended Shor’s algorithm on an ion trap quantum computer. 展开更多
关键词 Elliptic curve discrete logarithm problem Extended Shor’s algorithm Quantum circuits Ion trap quantum computer
原文传递
Digital Multi-Signature Scheme Based on the Elliptic Curve Cryptosystem 被引量:11
6
作者 Tzer-ShyongChen Kuo-HsuanHuang Yu-FangChung 《Journal of Computer Science & Technology》 SCIE EI CSCD 2004年第4期570-572,F003,共4页
In the study, the digital multi-signature scheme, constructed by theintegration of one-way hash function and identification scheme, are proposed based on the ellipticcurve cryptosystem (ECC). To the efficiency in perf... In the study, the digital multi-signature scheme, constructed by theintegration of one-way hash function and identification scheme, are proposed based on the ellipticcurve cryptosystem (ECC). To the efficiency in performance, the ECC has been generally regarded aspositive; and the security caused by the Elliptic Curve Discrete Logarithm Problem (ECDLP) is highlyalso taken highly important. The main characteristic of the proposed scheme is that the length ofthe multi-signature is fixed rather than changeable and it will not increase with the number ofgroup members. 展开更多
关键词 IDENTIFICATION elliptic curve cryptosystem (ECC) digital multi-signaturescheme elliptic curve discrete logarithm problem
原文传递
Effective generalized equations of secure hyperelliptic curve digital signature algorithms 被引量:7
7
作者 YOU Lin ,SANG Yong-xuan College of Communication Engineering,Hangzhou Dianzi University,Hangzhou 310018,China 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2010年第2期100-108,115,共10页
A hyperelliptic curve digital signature algorithm (HECDSA) can be viewed as the hyperelliptic curve analogue of the standard digital signature algorithm (DSA). This article discusses divisor evaluations, the basic... A hyperelliptic curve digital signature algorithm (HECDSA) can be viewed as the hyperelliptic curve analogue of the standard digital signature algorithm (DSA). This article discusses divisor evaluations, the basic HECDSA, variants, two HECDSA equations and a 4-tuple HECDSA scheme, and puts forward a generalized equation for HECDSA. From this generalized equation, seven general HECDSA types are derived based on the efficiency requirements. Meanwhile, the securities of these general HECDSA types are analyzed in detail. 展开更多
关键词 hyperelliptic curve digital signature algorithm generalized equation hyperelliptic curve discrete logarithm problem
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部