supported by Beijing Natural Science Foundation(No:4232034);the Fundamental Research Funds for the Central Universities(No:328202222).
The attacker in white-box model has full access to software implementation of a cryptographic algorithm and full control over its execution environment.In order to solve the issues of high storage cost and inadequate ...
supported by the National Natural Science Foundation of China under Grant Nos.92265209,11174081 and 62305285;the Natural Science Foundation of Chongqing under Grant No.CSTB2024NSCQ-MSX0643;the Shanghai Municipal Science and Technology Major Project under Grant No.2019SHZDZX01。
Quantum algorithms offer more enhanced computational efficiency in comparison to their classical counterparts when solving specific tasks.In this study,we implement the quantum permutation algorithm utilizing a polar ...
supported by National Natural Science Foundation of China(Grant Nos.11971396,12131018 and 12161141001).
Let V be a vertex operator superalgebra and g=(12···k)be a k-cycle which is viewed as an automorphism of the tensor product vertex operator superalgebra V^(■k).In this paper,we construct an explicit isomorphism fr...
This work was supported by the Natural Science Foundation of Anhui Province(2008085MA09);the National Natural Science Foundation of China(11671375).
The three common genetic models(or modes of inheritance)in association analysis are the dominant,additive,and recessive models.It is known that the Cochran-Armitage trend test(CATT)which correctly incorporates informa...
In combinatorics, permutations are important objects with many operations. In this paper, we define a coupling product on permutations and prove that the space spanned by permutations is a graded algebra.
National Natural Science Foundation of China(Grant No.12171362)。
Fishburn permutations are in bijection with several important combinatorial structures including interval orders.In this paper,we use the method of generating trees to enumerate two classes of pattern-avoiding Fishbur...
The University Grants Commission,Government of India,supported the research work in the form of a Junior Research Fellowship(190520461818).
It is challenging to devise lightweight cryptographic primitives efficient in both hardware and software that can provide an optimum level of security to diverse Internet of Things applications running on low-end cons...
supported by the National Key Research and Development Program of China (Grant No.2022YFB2701900);the National Natural Science Foundation of China (Grant No.62202444);the Fundamental Research Funds for the Central Universities。
The rapid development of modern cryptographic applications such as zero-knowledge,secure multiparty computation,fully homomorphic encryption has motivated the design of new so-called arithmetization-oriented symmetric...
We explore the entanglement features of pure symmetric N-qubit states characterized by N-distinct spinors with a particular focus on the Greenberger-Horne-Zeilinger (GHZ) states and , an equal superposition of W and o...
supported by National Natural Science Foundation of China(Grant Nos.61731002,62271024)。
Size generalization is important for learning resource allocation policies in wireless systems with time-varying scales.If a neural network for learning a wireless policy is not generalizable to the size of its input,...