全文获取类型
收费全文 | 287篇 |
免费 | 63篇 |
国内免费 | 14篇 |
专业分类
化学 | 3篇 |
综合类 | 9篇 |
数学 | 133篇 |
物理学 | 219篇 |
出版年
2024年 | 1篇 |
2023年 | 5篇 |
2022年 | 12篇 |
2021年 | 13篇 |
2020年 | 3篇 |
2019年 | 2篇 |
2018年 | 5篇 |
2017年 | 8篇 |
2016年 | 10篇 |
2015年 | 5篇 |
2014年 | 12篇 |
2013年 | 15篇 |
2012年 | 14篇 |
2011年 | 27篇 |
2010年 | 28篇 |
2009年 | 21篇 |
2008年 | 29篇 |
2007年 | 23篇 |
2006年 | 39篇 |
2005年 | 22篇 |
2004年 | 12篇 |
2003年 | 5篇 |
2002年 | 26篇 |
2001年 | 5篇 |
2000年 | 9篇 |
1998年 | 6篇 |
1997年 | 3篇 |
1996年 | 2篇 |
1988年 | 1篇 |
1980年 | 1篇 |
排序方式: 共有364条查询结果,搜索用时 0 毫秒
11.
Periodica Mathematica Hungarica - In our paper we study the usage of partially defined Boolean functions (PDBFs) for generating cryptographically strong Boolean functions. A PDBF can be considered... 相似文献
12.
We present a multiparty quantum secret sharing scheme and analyze its security. In this scheme, the sender Alice takes EPR pairs in Bell states as quantum resources. In order to obtain the shared key, all participants only need to perform Bell measurements, not to perform any local unitary operation. The total efficiency in this scheme approaches 100% as the classical information exchanged is not necessary except for the eavesdropping checks. 相似文献
13.
Lianet Contreras Rodríguez Evaristo Jos Madarro-Cap
Carlos Miguel Legn-Prez
Omar Rojas Guillermo Sosa-Gmez 《Entropy (Basel, Switzerland)》2021,23(5)
Entropy makes it possible to measure the uncertainty about an information source from the distribution of its output symbols. It is known that the maximum Shannon’s entropy of a discrete source of information is reached when its symbols follow a Uniform distribution. In cryptography, these sources have great applications since they allow for the highest security standards to be reached. In this work, the most effective estimator is selected to estimate entropy in short samples of bytes and bits with maximum entropy. For this, 18 estimators were compared. Results concerning the comparisons published in the literature between these estimators are discussed. The most suitable estimator is determined experimentally, based on its bias, the mean square error short samples of bytes and bits. 相似文献
14.
Vasiliy A. Ustimenko 《Acta Appl Math》2002,74(2):117-153
A combinatorial method of encryption with a similarity to the classical scheme of linear coding has been suggested by the author. The general idea is to treat vertices of a graph as messages and arcs of a certain length as encryption tools. We will study the quality of such an encryption in the case of graphs of high girth by comparing the probability to guess the message, (vertex) at random with the probability of breaking the key, i.e. guessing the encoding arc. In fact, the quality is good for graphs which are close to the Erdös bound, defined by the Even Cycle Theorem.In the case of parallelotopic graphs, there is a uniform way to match arcs with strings in a certain alphabet. Among parallelotopic graphs we distinguish linguistic graphs of affine type whose vertices (messages) and arcs (encoding tools) both could be naturally identified with vectors over the GF(q), and neighbors of the vertex defined by a system of linear equations. We will discuss families of linguistic and parallelotopic graphs of increasing girth as the source for assymmetric cryptographic functions and related open key algorithms.Several constructions of families of linguistic graphs of high girth with good quality, complexity and expansion coefficients will be considered. Some of those constructions have been obtained via group-theoretical and geometrical techniques. 相似文献
15.
Carles Padró Ignacio Gracia Sebastià Martín Molleví Paz Morillo 《Designs, Codes and Cryptography》2002,25(3):281-298
In a key predistribution scheme, some secret information is distributed among a set of users. For a given family of privileged groups, this secret information must enable every user in a privileged group to compute a common key associated with that group. Besides, this common key must remain unknown to some specified coalitions of users outside the privileged group. We present in this paper a new model, based on linear algebraic techniques, for the design of key predistribution schemes that unifies all previous proposals. This new model provides a common mathematical formulation and a better understanding of key predistribution schemes. Two new families of key predistribution schemes that are obtained by using this model are presented. Those families provide, for some specification structures, schemes that have better information rates than the ones given in previous proposals or fit in situations that have not been considered before. 相似文献
16.
A quantum steganography communication scheme via Greenberger-Horne-Zeilinger GHZ 4 state is constructed to investigate the possibility of remotely transferred hidden information.Moreover,the multipartite entangled states are become a hectic topic due to its important applications and deep effects on aspects of quantum information.Then,the scheme consists of sharing the correlation of four particle GHZ4 states between the legitimate users.After insuring the security of the quantum channel,they begin to hide the secret information in the cover of message.Comparing the scheme with the previous quantum steganographies,capacity and imperceptibility of hidden message are good.The security of the present scheme against many attacks is also discussed. 相似文献
17.
18.
19.
A realizable quantum encryption algorithm for qubits is presented by employing bit-wise quantum computation. System extension and bit-swapping are introduced into the encryption process, which makes the ciphertext space expanded greatly. The security of the proposed algorithm is analysed in detail and the schematic physical implementation is also provided. It is shown that the algorithm, which can prevent quantum attack strategy as well as classical attack strategy, is effective to protect qubits. Finally, we extend our algorithm to encrypt classical binary bits and quantum entanglements. 相似文献
20.
Kak’s quantum key distribution (QKD) protocol provides not only the distribution but also the integrity of secret key simultaneously
in quantum channel. Consequently the additional exchange of information, used to check whether an eavesdropper exists, is
unnecessary. In this comment, we will point out the failure of Kak’s protocol and show that Kak’s protocol does not have the
joint distribution and integration that the author declares in [1]. 相似文献