Learn More
ID/password-based authentication is commonly used in network services. Some users set different ID/password pairs for different services, but other users reuse a pair of ID/password to other services. Such recycling allows the list attack in which an adversary tries to spoof a target user by using a list of IDs and passwords obtained from other system by(More)
Spin-dependent lepton-nucleon scattering data have been used to investigate the validity of the concept of quark-hadron duality for the spin asymmetry A1. Longitudinally polarized positrons were scattered off a longitudinally polarized hydrogen target for values of Q2 between 1.2 and 12 GeV2 and values of W2 between 1 and 4 GeV2. The average double-spin(More)
A discrete logarithm problem with auxiliary input (DLP-wAI) is a problem to find α from G, αG, α d G in an additive cyclic group generated by an element G of prime order r, and a positive integer d satisfying d|(r − 1). The infeasibility of this problem assures the security of some cryptographic schemes. In 2006, Cheon proposed a novel algorithm for solving(More)
The HERMES experiment is collecting data on inclusive and semi-inclusive deep inelastic scattering of polarised positrons from polarised targets of H, D, and 3 He. These data give information on the spin structure of the nucleon. This paper describes the forward angle spectrometer built for this purpose. The spectrometer includes numerous tracking chambers(More)