首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   287篇
  免费   63篇
  国内免费   11篇
化学   3篇
综合类   9篇
数学   133篇
物理学   216篇
  2024年   1篇
  2023年   5篇
  2022年   12篇
  2021年   13篇
  2020年   3篇
  2019年   2篇
  2018年   4篇
  2017年   7篇
  2016年   10篇
  2015年   5篇
  2014年   12篇
  2013年   15篇
  2012年   14篇
  2011年   27篇
  2010年   28篇
  2009年   21篇
  2008年   29篇
  2007年   23篇
  2006年   38篇
  2005年   22篇
  2004年   12篇
  2003年   5篇
  2002年   26篇
  2001年   5篇
  2000年   9篇
  1998年   6篇
  1997年   3篇
  1996年   2篇
  1988年   1篇
  1980年   1篇
排序方式: 共有361条查询结果,搜索用时 15 毫秒
81.
Error reconciliation is a necessary step for quantum key distribution process. In this paper, the correction ability of error reconciliation procedure which is called Winnow protocol is analyzed and estimated, moreover, it gives some expressions about it. The experiment results proved the capability of Winnow protocol are excellent. It is also indicates that the smallest N has the most correction efficiency where from the communication times between the legitimate parties and the data remaining efficiency consideration.  相似文献   
82.
This paper points out that, due to a flaw in the sender's encoding, the receiver in Gao et al.'s controlled quantum secret direct communication (CQSDC) protocol [Chin. Phys. 14 (2005), No. 5, p. 893] can reveal the whole secret message without permission from the controller. An improvement is proposed to avoid this flaw.  相似文献   
83.
Public-key cryptography is today recognized as an important tool in the provision of information security. This article gives an overview of the field on the occasion of its 22nd birthday.  相似文献   
84.
Feng Zhao  Mingxing Fu  Shaohua Wang 《Optik》2010,121(12):1053-1057
A scheme of quantum network based on multiuser differential phase shift quantum key distribution system (DPS-QKD) is proposed. In this quantum network, arbitrary two users can achieve secret bits sharing by point-to-multipoint quantum key distribution and secret bits comparison. A protocol of secret bits sharing between arbitrary two users is presented. This network can implement secret bits distribution over 200 km with higher key generation rate by today's technologies. In theory, the capacity of user numbers in this network is unlimited. Hence, our proposed quantum network can serve for a metropolitan QKD network. A wide area QKD network can be constructed with this metropolitan QKD network.  相似文献   
85.
周文刚  赵宇  朱海 《应用声学》2015,23(1):207-210
为了满足高速即时通信对密码运算的性能要求,在研究AES-ECB典型设计的基础上,提出了一种基于多线程技术的AES-ECB改进设计方案。通过对算法中间迭代过程进行分割,并将其例化为多个子线程,改进了算法运行流程,实现了子线程间的“类流水”操作。实例性能分析表明,相比于单线程,多线程性能提高了约0.46至4.27倍;当线程数为12时,算法处理性能最低为520Mbps,适用于对加解密速度要求高的应用场合。  相似文献   
86.
The security of quantum secure direct communication by entangled qutrits and entanglement swapping [Y.B. Zhan et al., Opt. Commun. 282 (2009) 4633] is analyzed. It is shown that an eavesdropper can obtain all the secret without being found by a simple intercept-and-resend attack. Finally, a possible improvement to resist this attack is proposed.  相似文献   
87.
Combining the ideas of Bauer, Teske and Weng, [1] and Gaudry, Schost [3], we give a low memory algorithm for computing the number of points on the Jacobian of a Picard curve. It is efficient enough to handle Picard curves over finite prime fields , where p is a prime with 58 bits. We present an example where the Jacobian has a prime group order of size 2174  相似文献   
88.
In this paper, we investigate the best pixel expansion of various models of visual cryptography schemes. In this regard, we consider visual cryptography schemes introduced by Tzeng and Hu (2002) [13]. In such a model, only minimal qualified sets can recover the secret image and the recovered secret image can be darker or lighter than the background. Blundo et al. (2006) [4] introduced a lower bound for the best pixel expansion of this scheme in terms of minimal qualified sets. We present another lower bound for the best pixel expansion of the scheme. As a corollary, we introduce a lower bound, based on an induced matching of hypergraph of qualified sets, for the best pixel expansion of the aforementioned model and the traditional model of visual cryptography scheme realized by basis matrices. Finally, we study access structures based on graphs and we present an upper bound for the smallest pixel expansion in terms of strong chromatic index.  相似文献   
89.
The public key cryptosystem based on rank error correcting codes (the GPT cryptosystem) was proposed in 1991. Several attacks against this system were published, including Gibson’s attacks and recent Overbeck’s attacks. In this paper, we improve the GPT system by more careful choice of parameters to withstand these attacks.   相似文献   
90.
A New Approach for Visual Cryptography   总被引:1,自引:0,他引:1  
Visual cryptography is to encrypt a secret image into some shares (transparencies) such that any qualified subset of the shares can recover the secret visually. The conventional definition requires that the revealed secret images are always darker than the backgrounds. We observed that this is not necessary, in particular, for the textual images.In this paper, we proposed an improved definition for visual cryptography based on our observation, in which the revealed images may be darker or lighter than the backgrounds. We studied properties and obtained bounds for visual cryptography schemes based on the new definition. We proposed methods to construct visual cryptography schemes based on the new definition. The experiments showed that visual cryptography schemes based on our definition indeed have better pixel expansion in average.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号