主题分布
Pairing (3; 21%)
Condensed matter physics (2; 14%)
Superfluidity (2; 14%)
Physics (1; 7%)
Computer science (1; 7%)
Programming language (1; 7%)
Theoretical computer science (1; 7%)
Implementation (1; 7%)
Presentation (1; 7%)
Condensation (1; 7%)
出版年分布
2025 (0; 0%)
2024 (0; 0%)
2023 (0; 0%)
2022 (0; 0%)
2021 (0; 0%)
2020 (0; 0%)
2019 (0; 0%)
2018 (0; 0%)
2017 (1; 33%)
2016 (0; 0%)
出版社分布
Oxford University Press (1; 50%)
Cambridge University Press (1; 50%)
馆藏分布
麻省理工大学 (2; 20%)
斯坦福大学 (1; 10%)
剑桥大学 (1; 10%)
康奈尔大学 (1; 10%)
牛津大学 (1; 10%)
哈佛大学 (1; 10%)
芝加哥大学 (1; 10%)
耶鲁大学 (1; 10%)
普林斯顿大学 (1; 10%)
Pairing
核子超流动性
ISBN:9780521147699,出版年:2005,中图分类号:O4 被引 165次

Preface 1. Introduction 2. The pairing force and seniority 3. The BCS theory 4. Spontaneous symmetry breaking 5. Pairing vibrations 6. Phase transitions 7. Plastic behaviour of nuclei and other finite systems 8. Sources of pairing in nuclei 9. Beyond mean field 10. Induced interaction 11. Pairing in exotic nuclei Appendices References Index.

量子液体物理学
ISBN:9780198526438,出版年:2008,中图分类号:O4 被引 324次

1. Introduction:quantum statistics,Bose-Einstein condensation and Cooper pairing. 2. Bose-Einstein condensation:its definition,origin,occurrence and consequences. 3. Liquid 4-He. 4. The Bose alkali gases. 5. Classical superconductivity. 6. Superfluid 3-He 7. Cuprate superconductivity. 8. Miscellaneous topics.

配对密码指南
ISBN:9781498729505,出版年:2017,中图分类号:TP3 被引 66次

This book is devoted to efficient pairing computations and implementations, useful tools for cryptographers working on topics like identity-based cryptography and the simplification of existing protocols like signature schemes. As well as exploring the basic mathematical background of finite fields and elliptic curves, Guide to Pairing-Based Cryptography offers an overview of the most recent developments in optimizations for pairing implementation. Each chapter includes a presentation of the problem it discusses, the mathematical formulation, a discussion of implementation issues, solutions accompanied by code or pseudocode, several numerical results, and references to further reading and notes. Intended as a self-contained handbook, this book is an invaluable resource for computer scientists, applied mathematicians and security professionals interested in cryptography.

  • 1