Chunfei Ju

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
The newly developed single trajectory quadrature method is applied to a twodimensional example. The results based on different versions of new perturbation expansion and the new Green’s function deduced from this method are compared to each other, also compared to the result from the traditional perturbation theory. As the first application to(More)
A new knapsack public key cryptosystem is crypt analyzed. The cryptanalytic attack uses the Euclidean algorithm to obtain the greatest common divisor of some integers, and thus recovers the modulus. Then the attack reconstructs the multiplier by solving a linear congruence. Therefore, all the secret keys can be retrieved in polynomial time. Hence, the(More)
  • 1