期刊文献+
共找到267篇文章
< 1 2 14 >
每页显示 20 50 100
Development of a Post Quantum Encryption Key Generation Algorithm Using Electromagnetic Wave Propagation Theory
1
作者 Vincent Mbonigaba Fulgence Nahayo +1 位作者 Octave Moutsinga Okalas-Ossami Dieudonné 《Journal of Information Security》 2024年第1期53-62,共10页
In today’s rapid widespread of digital technologies into all live aspects to enhance efficiency and productivity on the one hand and on the other hand ensure customer engagement, personal data counterfeiting has beco... In today’s rapid widespread of digital technologies into all live aspects to enhance efficiency and productivity on the one hand and on the other hand ensure customer engagement, personal data counterfeiting has become a major concern for businesses and end-users. One solution to ensure data security is encryption, where keys are central. There is therefore a need to find robusts key generation implementation that is effective, inexpensive and non-invasive for protecting and preventing data counterfeiting. In this paper, we use the theory of electromagnetic wave propagation to generate encryption keys. 展开更多
关键词 KEY Wave ELECTROMAGNETIC CRYPTOGRAPHY post quantum Network Protocol Propagation ALGORITHM
在线阅读 下载PDF
Post-Quantum Blockchain over Lattice
2
作者 Xiao Zhang Faguo Wu +2 位作者 Wang Yao Wenhua Wang Zhiming Zheng 《Computers, Materials & Continua》 SCIE EI 2020年第5期845-859,共15页
Blockchain is an emerging decentralized architecture and distributed computing paradigm underlying Bitcoin and other cryptocurrencies,and has recently attracted intensive attention from governments,financial instituti... Blockchain is an emerging decentralized architecture and distributed computing paradigm underlying Bitcoin and other cryptocurrencies,and has recently attracted intensive attention from governments,financial institutions,high-tech enterprises,and the capital markets.Its cryptographic security relies on asymmetric cryptography,such as ECC,RSA.However,with the surprising development of quantum technology,asymmetric cryptography schemes mentioned above would become vulnerable.Recently,lattice-based cryptography scheme was proposed to be secure against attacks in the quantum era.In 2018,with the aid of Bonsai Trees technology,Yin et al.[Yin,Wen,Li et al.(2018)]proposed a lattice-based authentication method which can extend a lattice space to multiple lattice spaces accompanied by the corresponding key.Although their scheme has theoretical significance,it is unpractical in actual situation due to extremely large key size and signature size.In this paper,aiming at tackling the critical issue of transaction size,we propose a post quantum blockchain over lattice.By using SampleMat and signature without trapdoor,we can reduce the key size and signature size of our transaction authentication approach by a significant amount.Instead of using a whole set of vectors as a basis,we can use only one vector and rotate it enough times to form a basis.Based on the hardness assumption of Short Integer Solution(SIS),we demonstrate that the proposed anti-quantum transaction authentication scheme over lattice provides existential unforgeability against adaptive chosen-message attacks in the random oracle.As compared to the Yin et al.[Yin,Wen,Li et al.(2018)]scheme,our scheme has better performance in terms of energy consumption,signature size and signing key size.As the underlying lattice problem is intractable even for quantum computers,our scheme would work well in the quantum age. 展开更多
关键词 Blockchain post quantum LATTICE random oracle
在线阅读 下载PDF
Towards Post-Quantum Cryptography Using Thermal Noise Theory and True Random Numbers Generation 被引量:1
3
作者 Protais Ndagijimana Fulgence Nahayo +2 位作者 Marc Kokou Assogba Adoté François-Xavier Ametepe Juma Shabani 《Journal of Information Security》 2020年第3期149-160,共12页
The advent of quantum computers and algorithms challenges the semantic security of symmetric and asymmetric cryptosystems. Thus, the implementation of new cryptographic primitives is essential. They must follow the br... The advent of quantum computers and algorithms challenges the semantic security of symmetric and asymmetric cryptosystems. Thus, the implementation of new cryptographic primitives is essential. They must follow the breakthroughs and properties of quantum calculators which make vulnerable existing cryptosystems. In this paper, we propose a random number generation model based on evaluation of the thermal noise power of the volume elements of an electronic system with a volume of 58.83 cm<sup>3</sup>. We prove through the sampling of the temperature of each volume element that it is difficult for an attacker to carry out an exploit. In 12 seconds, we generate for 7 volume elements, a stream of randomly generated keys of 187 digits that will be transmitted from source to destination through the properties of quantum cryptography. 展开更多
关键词 Thermal Noise True Random Numbers ALGORITHM post-quantum Cryptography
暂未订购
Photovoltaic Properties of CdSe Quantum Dot Sensitized Inverse Opal TiO<sub>2</sub>Solar Cells: The Effect of TiCl<sub>4</sub>Post Treatment
4
作者 Motoki Hironaka Taro Toyoda +3 位作者 Kanae Hori Yuhei Ogomi Shuzi Hayase Qing Sheng 《Journal of Modern Physics》 2017年第4期522-530,共9页
Recently, semiconductor quantum dot (QD) sensitized solar cells (QDSSCs) are expected to achieve higher conversion efficiency because of the large light absorption coefficient and multiple exciton generation in QDs. T... Recently, semiconductor quantum dot (QD) sensitized solar cells (QDSSCs) are expected to achieve higher conversion efficiency because of the large light absorption coefficient and multiple exciton generation in QDs. The morphology of TiO2 electrode is one of the most important factors in QDSSCs. Inverse opal (IO) TiO2 electrode, which has periodic mesoporous structure, is useful for QDSSCs because of better penetration of electrolyte than conventional nanoparticulate TiO2 electrode. In addition, the ordered three dimensional structure of IO-TiO2 would be better for electron transport. We have found that open circuit voltage Voc of QDSSCs with IO-TiO2 electrodes was much higher (0.2 V) than that with nanoparticulate TiO2 electrodes. But short circuit current density Jsc was lower in the case of IO-TiO2 electrodes because of the smaller surface area of IO-TiO2. In this study, for increasing surface area of IO-TiO2, we applied TiCl4 post treatment on IO-TiO2 and investigated the effect of the post treatment on photovoltaic properties of CdSe QD sensitized IO-TiO2 solar cells. It was found that Jsc could be enhanced due to TiCl4 post treatment, but decreased again for more than one cycle treatment, which indicates excess post treatment may lead to worse penetration of electrolyte. Our results indicate that the appropriate post treatment can improve the energy conversion efficiency of the QDSSCs. 展开更多
关键词 quantum DOT Sensitized Solar Cells Inverse OPAL Structure TICL4 post Treatment Morphology of the TiO2 Electrode
暂未订购
基于国产深度计算单元的SPHINCS^(+)-SM3高性能优化
5
作者 宁祎静 董建阔 +4 位作者 周思源 林璟锵 孙思维 郑昉昱 葛春鹏 《计算机研究与发展》 北大核心 2026年第2期405-418,共14页
数字签名在信息安全中扮演着至关重要的角色,但传统的数字签名算法在后量子时代面临失效的风险。SPHINCS^(+)作为一种能够抵抗量子计算攻击的数字签名框架,将在后量子时代发挥越来越重要的作用。然而,SPHINCS^(+)的计算速度较慢,难以满... 数字签名在信息安全中扮演着至关重要的角色,但传统的数字签名算法在后量子时代面临失效的风险。SPHINCS^(+)作为一种能够抵抗量子计算攻击的数字签名框架,将在后量子时代发挥越来越重要的作用。然而,SPHINCS^(+)的计算速度较慢,难以满足现代密码算法对于高吞吐量和低延时的需求,极大地限制了其实用性。提出了一种基于国产深度计算单元(deep computing unit,DCU)的高效优化方案,以加速由国产哈希算法SM3实例化的SPHINCS^(+)算法。通过提高内存拷贝效率、优化SM3、改进SPHINCS^(+)的计算流程以及采用最佳计算并行度,在DCU上实现了SPHINCS^(+)-SM3的128-f模式。实验结果表明,与传统CPU实现相比,DCU上的实现显著提高了签名生成和验证的吞吐量,分别达到了2603.87倍和1281.98倍的提升,极大地增强了SPHINCS^(+)的计算效率和实用性,并推进了后量子密码算法的国产化进程。在数据流量和大量签名请求的场景下,DCU实现展现出显著优于CPU实现的性能优势。 展开更多
关键词 SPHINCS^(+) SM3 后量子密码 并行计算 DCU加速
在线阅读 下载PDF
From Standard Policy-Based Zero Trust to Absolute Zero Trust (AZT): A Quantum Leap to Q-Day Security 被引量:1
6
作者 Fazal Raheman 《Journal of Computer and Communications》 2024年第3期252-282,共31页
Cybercrime is projected to cost a whopping $23.8 Trillion by 2027. This is essentially because there’s no computer network that’s not vulnerable. Fool-proof cybersecurity of personal data in a connected computer is ... Cybercrime is projected to cost a whopping $23.8 Trillion by 2027. This is essentially because there’s no computer network that’s not vulnerable. Fool-proof cybersecurity of personal data in a connected computer is considered practically impossible. The advent of quantum computers (QC) will worsen cybersecurity. QC will be a boon for data-intensive industries by drastically reducing the computing time from years to minutes. But QC will render our current cryptography vulnerable to quantum attacks, breaking nearly all modern cryptographic systems. Before QCs with sufficient qubits arrive, we must be ready with quantum-safe strategies to protect our ICT infrastructures. Post-quantum cryptography (PQC) is being aggressively pursued worldwide as a defence from the potential Q-day threat. NIST (National Institute of Standards and Technology), in a rigorous process, tested 82 PQC schemes, 80 of which failed after the final round in 2022. Recently the remaining two PQCs were also cracked by a Swedish and a French team of cryptographers, placing NIST’s PQC standardization process in serious jeopardy. With all the NIST-evaluated PQCs failing, there’s an urgent need to explore alternate strategies. Although cybersecurity heavily relies on cryptography, recent evidence indicates that it can indeed transcend beyond encryption using Zero Vulnerability Computing (ZVC) technology. ZVC is an encryption-agnostic absolute zero trust (AZT) approach that can potentially render computers quantum resistant by banning all third-party permissions, a root cause of most vulnerabilities. Unachievable in legacy systems, AZT is pursued by an experienced consortium of European partners to build compact, solid-state devices that are robust, resilient, energy-efficient, and with zero attack surface, rendering them resistant to malware and future Q-Day threats. 展开更多
关键词 CYBERSECURITY quantum Computers post quantum Cryptography Q-Day Zero Trust
在线阅读 下载PDF
面向格密码的高面积效率基-4快速数论变换硬件架构与无访存冲突优化设计
7
作者 郑集文 赵石磊 +3 位作者 张子悦 刘志伟 于斌 黄海 《电子与信息学报》 北大核心 2026年第2期855-865,共11页
针对格基后量子密码(PQC)算法中基-2数论变换(NTT)计算效率较低以及原位计算内存访问模式复杂的问题,该文提出一种高面积效率的基-4 NTT硬件设计。首先,介绍了负包裹卷积方法的运算流程及适用条件,在此基础上提出了一种恒定几何(CG)结... 针对格基后量子密码(PQC)算法中基-2数论变换(NTT)计算效率较低以及原位计算内存访问模式复杂的问题,该文提出一种高面积效率的基-4 NTT硬件设计。首先,介绍了负包裹卷积方法的运算流程及适用条件,在此基础上提出了一种恒定几何(CG)结构的低计算复杂度基-4 NTT/INTT算法。其次,深入分析不同PQC算法中模数的共性特征,设计了基于K^(2)-RED约简的可扩展模乘单元。最后,通过优化存储器与蝶形单元之间的数据分解与重组,提出一种基于顺序循环和阶梯循环访存的读写地址生成方案,实现了高效的无访存冲突。与传统的乒乓存储模式相比,该方案可减少12.5%的存储空间。实验结果表明,在(项数,模数位宽)分别为(256,13),(256,23)和(1024,14)的3种配置下,该设计的面积-时间积(ATP)较现有方案分别降低56.4%,69.8%和50.3%以上,具有更高的面积效率。 展开更多
关键词 格基后量子密码 数论变换 恒定几何结构 K^(2)-RED约简 无访存冲突
在线阅读 下载PDF
基于CSIDH的AKE协议研究综述
8
作者 王洋 薛海洋 +2 位作者 周国庆 曹越 黄宝盛 《通信技术》 2026年第1期1-8,共8页
认证密钥交换(AKE)协议可以使得在不安全信道通信的双方安全地协商一个共享的会话密钥。随着量子计算技术的迅速发展,基于Diffie-Hellman等经典数论假设设计的AKE协议受到严峻挑战。与之相对的,基于同源的密码学,特别是基于交换超奇异同... 认证密钥交换(AKE)协议可以使得在不安全信道通信的双方安全地协商一个共享的会话密钥。随着量子计算技术的迅速发展,基于Diffie-Hellman等经典数论假设设计的AKE协议受到严峻挑战。与之相对的,基于同源的密码学,特别是基于交换超奇异同源Diffie-Hellman(CSIDH)假设设计的认证密钥交换协议成为后量子时代AKE协议的备选算法之一。为厘清基于CSIDH相关问题设计AKE协议的主流方法,通过整理文献并分类总结等方式,给出了基于CSIDH相关假设设计的、包括显式认证和隐式认证两条技术路线的AKE协议的研究综述,并分析了不同协议的优缺点。研究结论可以为我国未来抗量子AKE相关协议的设计及标准化工作提供指导。 展开更多
关键词 认证密钥交换(AKE) CSIDH 后量子密码学 综述
在线阅读 下载PDF
Futureproofing Blockchain & Cryptocurrencies against Growing Vulnerabilities & Q-Day Threat with Quantum-Safe Ledger Technology (QLT)
9
作者 Fazal Raheman 《Journal of Computer and Communications》 2024年第7期59-77,共19页
With one billion users using 380 exchanges, the security of blockchains and cryptocurrencies remains a major concern as billions are lost to hackers every year. Cryptocurrency hacks negatively impact cryptocurrency ma... With one billion users using 380 exchanges, the security of blockchains and cryptocurrencies remains a major concern as billions are lost to hackers every year. Cryptocurrency hacks negatively impact cryptocurrency markets introducing volatility. Each major scam/hack incident results in a significant price dip for most cryptocurrencies, decelerating the growth of the blockchain economy. Existing blockchain vulnerabilities are further amplified by the impending existential threat from quantum computers. While there’s no reprieve yet from the scam/hack prone blockchain economy, quantum resilience is being aggressively pursued by post quantum cryptography (PQC) researchers, despite 80 of 82 candidate PQCs failing. As PQC has no role in combating inherent vulnerabilities, securing over 1000 existing blockchains against scammers/hackers remains a top priority for this industry. This research proposes a novel Quantum-safe Ledger Technology (QLT) framework that not only secures DLTs/cryptocurrencies and exchanges from current vulnerabilities but protects them from the impending Q-day threats from future quantum computers. As blockchain-agnostic technology, the QLT framework can be easily adapted to secure any blockchain or crypto exchange. 展开更多
关键词 CYBERSECURITY quantum Computers post quantum Cryptography Q-Day Zero Trust
在线阅读 下载PDF
Hardware Security for IoT in the Quantum Era: Survey and Challenges
10
作者 Doudou Dione Boly Seck +3 位作者 Idy Diop Pierre-Louis Cayrel Demba Faye Ibrahima Gueye 《Journal of Information Security》 2023年第4期227-249,共23页
The Internet of Things (IoT) has become a reality: Healthcare, smart cities, intelligent manufacturing, e-agriculture, real-time traffic controls, environment monitoring, camera security systems, etc. are developing s... The Internet of Things (IoT) has become a reality: Healthcare, smart cities, intelligent manufacturing, e-agriculture, real-time traffic controls, environment monitoring, camera security systems, etc. are developing services that rely on an IoT infrastructure. Thus, ensuring the security of devices during operation and information exchange becomes a fundamental requirement inherent in providing safe and reliable IoT services. NIST requires hardware implementations that are protected against SCAs for the lightweight cryptography standardization process. These attacks are powerful and non-invasive and rely on observing the physical properties of IoT hardware devices to obtain secret information. In this paper, we present a survey of research on hardware security for the IoT. In addition, the challenges of IoT in the quantum era with the first results of the NIST standardization process for post-quantum cryptography are discussed. 展开更多
关键词 IOT Hardware Security Side-Channel Attacks post-quantum Cryptography NIST
在线阅读 下载PDF
快速数论变换算法硬件实现研究综述 被引量:1
11
作者 董秀则 于庚辰 +1 位作者 杨鸿刚 高献伟 《北京电子科技学院学报》 2025年第1期26-36,共11页
随着量子计算机的迅速发展,传统密码方案面临严重的安全威胁。在后量子密码方案中,格密码因其高安全性、广泛用途和强灵活性,成为最具潜力的一类。多项式乘法是格密码理论中的关键模块,快速数论变换算法能够显著提升多项式乘法的计算速... 随着量子计算机的迅速发展,传统密码方案面临严重的安全威胁。在后量子密码方案中,格密码因其高安全性、广泛用途和强灵活性,成为最具潜力的一类。多项式乘法是格密码理论中的关键模块,快速数论变换算法能够显著提升多项式乘法的计算速度,从而提高格密码算法的整体效率。这种算法在大规模并行计算和资源受限的环境中表现尤为出色,高性能的快速数论变换硬件实现可以带来显著的计算加速、功耗降低和并行化处理能力,快速数论变换算法的设计直接决定了格密码算法的安全性和高效性。本文简要介绍了格密码理论及其面临的困难问题,探讨了快速数论变换算法的基本概念与结构,并对近年来其在硬件实现方面的进展进行了研究。最后,从公钥加密、数字签名和密钥交换三个方面对相关研究进行了总结与概括。 展开更多
关键词 格密码体制 后量子密码 快速数论变换 多项式乘法
在线阅读 下载PDF
Navigating the Quantum Threat Landscape: Addressing Classical Cybersecurity Challenges
12
作者 Sabina Sokol 《Journal of Quantum Information Science》 2023年第2期56-77,共22页
This research paper analyzes the urgent topic of quantum cybersecurity and the current federal quantum-cyber landscape. Quantum-safe implementations within existing and future Internet of Things infrastructure are dis... This research paper analyzes the urgent topic of quantum cybersecurity and the current federal quantum-cyber landscape. Quantum-safe implementations within existing and future Internet of Things infrastructure are discussed, along with quantum vulnerabilities in public key infrastructure and symmetric cryptographic algorithms. Other relevant non-encryption-specific areas within cybersecurity are similarly raised. The evolution and expansion of cyberwarfare as well as new developments in cyber defense beyond post-quantum cryptography and quantum key distribution are subsequently explored, with an emphasis on public and private sector awareness and vigilance in maintaining strong security posture. 展开更多
关键词 quantum Computing post-quantum Cryptography (PQC) quantum Hacking CYBERSECURITY Internet of Things (IoT) Shor’s Algorithm quantum Random Number Generators (QRNGs) Pseudorandom Number Generators (RNGs) quantum Key Distribution (QKD) Symmetric Key Cryp-tography Asymmetric Key Cryptography
在线阅读 下载PDF
基于后量子密码改进算法的FPGA设计优化 被引量:2
13
作者 田洪亮 王馨语 张海武 《粘接》 2025年第2期155-157,共3页
为了提高硬件整体的运算效率,研究提出了一种可以降低Crystals-Kyber算法复杂度的改进算法,硬件实现方式采用基于频率抽取的数论变换(NTT)算法。通过合并NTT计算层减少需要的的内存量,设计了一种迭代型NTT和流水型NTT相结合的硬件结构... 为了提高硬件整体的运算效率,研究提出了一种可以降低Crystals-Kyber算法复杂度的改进算法,硬件实现方式采用基于频率抽取的数论变换(NTT)算法。通过合并NTT计算层减少需要的的内存量,设计了一种迭代型NTT和流水型NTT相结合的硬件结构。与之前其他的设计相比较,基于Crystals-Kyber算法的可编程门阵列(FPGA)优化实现了高效的NTT多项式乘法。实验结果表明,所提方案优化算法使用了较快的计算速度和较少的计算周期,以及较小的面积时间乘积(Area Time,AT),改进的Crystals-Kyber算法与其他算法相比,至少缩短了39.13%的NTT计算周期,并缩短了47.50%计算时间,优化了基于格密码的执行时间和硬件资源开销。 展开更多
关键词 后量子密码 NTT算法 FPGA
在线阅读 下载PDF
Crystals-Dilithium数字签名技术硬件实现综述
14
作者 崔益军 李梦雪 +2 位作者 王辈 王成华 刘伟强 《电子学报》 北大核心 2025年第7期2558-2578,共21页
随着量子计算技术的不断发展,依赖传统公钥密码体制三大功能(密钥协商/数字签名/公钥加密)的各种应用系统将不再安全.为应对量子威胁,以美国国家标准与技术研究院(National Institute of Standards and Technology,NIST)为首的国际标准... 随着量子计算技术的不断发展,依赖传统公钥密码体制三大功能(密钥协商/数字签名/公钥加密)的各种应用系统将不再安全.为应对量子威胁,以美国国家标准与技术研究院(National Institute of Standards and Technology,NIST)为首的国际标准组织积极征集与部署后量子密码(Post Quantum Cryptography,PQC)算法的标准化工作,致力于在真正实用型量子计算机问世之前,提前完成传统公钥密码算法到PQC算法的迁移过渡.Crystals-Dilithium是NIST-PQC标准中的一种基于格的数字签名算法,其安全性高,运算速度快,是实现抵抗量子攻击数字签名算法的重要路径之一.本文从主流Crystals-Dilithium数字签名算法的理论基础出发,从底层关键组件的优化方法和整体硬件构架设计方法着手,围绕硬件资源优化和性能优化等现有方法和成果对比展开分析介绍,为研究者们后续研究探明方向,希望为设计性能与硬件资源均衡的后量子数字签名密码芯片提供有力参考. 展开更多
关键词 后量子密码 格密码 Crystals-Dilithium数字签名 硬件实现 优化方案
在线阅读 下载PDF
具有用户自主链接及验证者条件撤销的格基群签名
15
作者 陈颖 何德彪 +1 位作者 彭聪 罗敏 《软件学报》 北大核心 2025年第10期4444-4460,共17页
群签名作为一种隐私保护的重要技术,为用户匿名性提供良好的保障.然而,普通群签名方案存在可追溯签名者身份的群管理员,与区块链去中心化的特性相悖,难以满足对于隐私性要求更严格的应用场景.结合防双重认证签名技术,提出一种具有用户... 群签名作为一种隐私保护的重要技术,为用户匿名性提供良好的保障.然而,普通群签名方案存在可追溯签名者身份的群管理员,与区块链去中心化的特性相悖,难以满足对于隐私性要求更严格的应用场景.结合防双重认证签名技术,提出一种具有用户自主链接及验证者条件撤销的群签名,较好地实现了用户隐私与平台管理之间的平衡,并给出了格上实例化方案.通过随机谕言机模型下的安全性分析,方案满足无私匿名性、可追溯性和不可诽谤性.通过性能分析,方案的时间开销和通信开销均在可接受范围内.最后,设计了一种基于区块链的后量子安全医疗数据共享条件隐私保护系统,给出方案的具体应用实例. 展开更多
关键词 群签名 后量子密码 区块链 条件隐私保护 格密码
在线阅读 下载PDF
Olithium:基于格的无陷门在线/离线签名方案
16
作者 王后珍 段小超 +2 位作者 文嘉明 王亚辉 张焕国 《计算机学报》 北大核心 2025年第4期877-892,共16页
随着互联网和大数据时代的到来,数据在传输过程中的安全性和效率问题日益凸显。作为保障数据完整性并验证发送者身份的核心技术,数字签名显得尤为重要。与此同时,量子计算机的发展对传统的签名方案构成了巨大威胁。在这一背景下,美国国... 随着互联网和大数据时代的到来,数据在传输过程中的安全性和效率问题日益凸显。作为保障数据完整性并验证发送者身份的核心技术,数字签名显得尤为重要。与此同时,量子计算机的发展对传统的签名方案构成了巨大威胁。在这一背景下,美国国家标准与技术研究院于2023年公布了基于CRYSTALS-Dilithium算法的抗量子签名标准ML-DSA的草案。为了使其能更好地应用于海量的数据传输等场景,本文在此基础上设计了一个无陷门在线/离线签名方案,称之为Olithium。该方案允许签名者在未收到消息时(离线阶段)产生签名的一部分,并在收到消息后(在线阶段)继续完成签名。最终,能在存储空间小幅增加的前提下,将在线签名时间缩短约50%。本文还以数字证书颁发场景为例,说明该方案的现实有效性。 展开更多
关键词 后量子密码 在线/离线签名 数字证书 基于格的密码学 优化实现
在线阅读 下载PDF
面向格密码的可配置NTT硬件快速实现
17
作者 韩炼冰 房利国 +1 位作者 王松 刘鸿博 《通信技术》 2025年第10期1119-1124,共6页
数论变换(NTT)是一种提高多项式乘法计算效率的加速技术。为提高NTT运算速度,提出了一种面向格密码的可配置NTT硬件快速实现方法。该方法通过预计算和预缩放简化计算过程,降低计算复杂度,并利用多级流水线技术提高存取效率,降低蝶形单... 数论变换(NTT)是一种提高多项式乘法计算效率的加速技术。为提高NTT运算速度,提出了一种面向格密码的可配置NTT硬件快速实现方法。该方法通过预计算和预缩放简化计算过程,降低计算复杂度,并利用多级流水线技术提高存取效率,降低蝶形单元运算等待时间。设计了可配置硬件架构,支持配置多个蝶形单元并行计算,提出了可配置多随机存取存储器(RAM)存储设计方案及数据存储分配方法,避免了多个蝶形单元共享内存访问冲突,提高了数据存取效率。最后,在Xilinx公司Artix-7系列现场可编程门阵列(FPGA)中进行了实现评估。结果表明,完成一次NTT运算最快仅需要1.23μs,与相关研究相比运算速度提升了5%~28%。 展开更多
关键词 后量子密码 多项式乘法 数论变换 蝶形运算 FPGA
在线阅读 下载PDF
基于CUDA平台的后量子密码算法babyKyber并行设计
18
作者 肖超恩 余福蓉 +1 位作者 王建新 孙凯勃 《北京电子科技学院学报》 2025年第2期11-20,共10页
针对物联网设备在后量子时代面临的新型安全挑战,本文基于CUDA架构提出面向babyKyber算法的并行优化方案。研究聚焦该算法中多项式乘法与数论变换等核心模块,通过细粒度并行将运算拆解至GPU线程级实现计算加速,同时采用粗粒度并行构建... 针对物联网设备在后量子时代面临的新型安全挑战,本文基于CUDA架构提出面向babyKyber算法的并行优化方案。研究聚焦该算法中多项式乘法与数论变换等核心模块,通过细粒度并行将运算拆解至GPU线程级实现计算加速,同时采用粗粒度并行构建多线程块架构以提升算法吞吐量。特别地,本文通过动态线程块配置实验探索GPU资源利用率优化路径。实验数据表明:优化后的并行方案在NVIDIA GeForce MX150平台实现千万级吞吐量,较CPU平台获得三个数量级的加速增益。该研究为后量子密码算法在资源受限物联网终端的工程化部署提供可行解决方案。 展开更多
关键词 后量子密码 Kyber GPU babyKyber 物联网
在线阅读 下载PDF
Statistical Mechanics for Weak Measurements and Quantum Inseparability
19
作者 Salwa Al Saleh 《Journal of Quantum Information Science》 2016年第1期10-15,共6页
In weak measurement thought experiment, an ensemble consists of M quantum particles and N states. We observe that separability of the particles is lost, and hence we have fuzzy occupation numbers for the particles in ... In weak measurement thought experiment, an ensemble consists of M quantum particles and N states. We observe that separability of the particles is lost, and hence we have fuzzy occupation numbers for the particles in the ensemble. Without sharply measuring each particle state, quantum interferences add extra possible configurations of the ensemble, this explains the Quantum Pigeonhole Principle. This principle adds more entropy to the system;hence the particles seem to have a new kind of correlations emergent from particles not having a single, well-defined state. We formulated the Quantum Pigeonhole Principle in the language of abstract Hilbert spaces, then generalized it to systems consisting of mixed states. This insight into the fundamentals of quantum statistical mechanics could help us understand the interpretation of quantum mechanics more deeply, and possibly have implication on quantum computing and information theory. 展开更多
关键词 quantum Computing Copenhagen Interpretation quantum Pigeonhole Principle quantum Correlation Information Theory quantum Statistical Mechanics Weak Measurement quantum Measurement post Selection
在线阅读 下载PDF
后摩尔时代集成电路发展的新机遇——第二十期中国计算机学会秀湖会议报告
20
作者 王颖(整理) 金洲(整理) +1 位作者 邵恩(整理) 王梦迪(整理) 《计算》 2025年第2期88-95,共8页
随着摩尔定律的微缩红利逐渐消退,全球半导体行业迈入以多元化技术路径为核心的后摩尔时代。2024年10月,第二十期中国计算机学会(China Computer Federation,CCF)秀湖会议以“后摩尔时代集成电路发展的新机遇”为主题,汇聚学术界与产业... 随着摩尔定律的微缩红利逐渐消退,全球半导体行业迈入以多元化技术路径为核心的后摩尔时代。2024年10月,第二十期中国计算机学会(China Computer Federation,CCF)秀湖会议以“后摩尔时代集成电路发展的新机遇”为主题,汇聚学术界与产业界20余位专家,围绕处理器指令集新生态、新型芯片架构、智能电子设计自动化(electronic design automation,EDA)技术革新与系统先进封装集成四大议题展开深度探讨。会议提出,构建自主可控的人工智能(arificial itelligence,AI)软硬件生态、突破新型存储与存内计算技术瓶颈、推动开源芯片生态全球化、发展面向先进集成技术、量子计算与光计算的智能EDA工具,将成为后摩尔时代技术突破的关键方向。通过跨学科协作与产业链整合,我国有望在A1算力、芯片架构及生态建设领域实现弯道超车,为全球半导体技术变革提供“中国方案”。本文梳理会议核心观点与共识,揭示后摩尔时代技术发展趋势及其对产业创新的深远影响。 展开更多
关键词 后摩尔 处理器指令集 量子计算 智能电子设计自动化
在线阅读 下载PDF
上一页 1 2 14 下一页 到第
使用帮助 返回顶部