格理论最初是作为一种密码分析工具被引入到密码学中的,用于分析背包密码体制、RSA密码体制等.在1997年,Ajtai和Dwork第一次构造了一个基于格的密码体制Ajtai-Dwork,随后在1998年出现了NTRU密码体制.当时基于整数分解及离散对数的公钥...格理论最初是作为一种密码分析工具被引入到密码学中的,用于分析背包密码体制、RSA密码体制等.在1997年,Ajtai和Dwork第一次构造了一个基于格的密码体制Ajtai-Dwork,随后在1998年出现了NTRU密码体制.当时基于整数分解及离散对数的公钥密码体制是主流,格密码一直没有得到足够的重视.直到2009年,Gentry基于格密码构造了首个全同态密码方案,格密码才得到了广泛的发展.2015年,Peikert在"格密码十年"一文中,对之前格密码的发展做了一个很好的总结.同在2015年,美国国家标准和技术研究院(National Institute of Standards and Technology,NIST)发布了"后量子密码报告",报告指出:由于量子计算技术的飞速发展,现有的公钥密码标准在量子计算下将不再安全.同时NIST在全球范围内展开了后量子密码算法标准的征集工作.格密码作为一类经典的抗量子密码,公认是后量子密码算法标准最有力的竞争者,近2年得到了飞速的发展,出现了许多优秀的研究成果.从基于格的零知识证明、格加密、格签名以及格密钥交换4个方面,对近2年格密码研究进行了总结,并对格密码的发展趋势进行了展望.展开更多
In order to develop a practical postprocessor for 5-axis machine tool,the general equations of numerically controlled(NC) data for 5-axis configurations with non-orthogonal rotary axes were exactly expressed by the in...In order to develop a practical postprocessor for 5-axis machine tool,the general equations of numerically controlled(NC) data for 5-axis configurations with non-orthogonal rotary axes were exactly expressed by the inverse kinematics,and a windows-based postprocessor written with Visual Basic was developed according to the proposed algorithm.The developed postprocessor is a general system suitable for all kinds of 5-axis machines with orthogonal and non-orthogonal rotary axes.Through implementation of the developed postprocessor and verification by a cutting simulation and machining experiment,the effectiveness of the proposed algorithm is confirmed.Compatibility is improved by allowing exchange of data formats such as rotational total center position(RTCP) controlled NC data,vector post NC data,and program object file(POF) cutter location(CL) data,and convenience is increased by adding the function of work-piece origin offset.Consequently,a practical post-processor for 5-axis machining is developed.展开更多
文摘格理论最初是作为一种密码分析工具被引入到密码学中的,用于分析背包密码体制、RSA密码体制等.在1997年,Ajtai和Dwork第一次构造了一个基于格的密码体制Ajtai-Dwork,随后在1998年出现了NTRU密码体制.当时基于整数分解及离散对数的公钥密码体制是主流,格密码一直没有得到足够的重视.直到2009年,Gentry基于格密码构造了首个全同态密码方案,格密码才得到了广泛的发展.2015年,Peikert在"格密码十年"一文中,对之前格密码的发展做了一个很好的总结.同在2015年,美国国家标准和技术研究院(National Institute of Standards and Technology,NIST)发布了"后量子密码报告",报告指出:由于量子计算技术的飞速发展,现有的公钥密码标准在量子计算下将不再安全.同时NIST在全球范围内展开了后量子密码算法标准的征集工作.格密码作为一类经典的抗量子密码,公认是后量子密码算法标准最有力的竞争者,近2年得到了飞速的发展,出现了许多优秀的研究成果.从基于格的零知识证明、格加密、格签名以及格密钥交换4个方面,对近2年格密码研究进行了总结,并对格密码的发展趋势进行了展望.
基金Work supported by the Second Stage of Brain Korea 21 Projects
文摘In order to develop a practical postprocessor for 5-axis machine tool,the general equations of numerically controlled(NC) data for 5-axis configurations with non-orthogonal rotary axes were exactly expressed by the inverse kinematics,and a windows-based postprocessor written with Visual Basic was developed according to the proposed algorithm.The developed postprocessor is a general system suitable for all kinds of 5-axis machines with orthogonal and non-orthogonal rotary axes.Through implementation of the developed postprocessor and verification by a cutting simulation and machining experiment,the effectiveness of the proposed algorithm is confirmed.Compatibility is improved by allowing exchange of data formats such as rotational total center position(RTCP) controlled NC data,vector post NC data,and program object file(POF) cutter location(CL) data,and convenience is increased by adding the function of work-piece origin offset.Consequently,a practical post-processor for 5-axis machining is developed.