Derek's wiki test space: Difference between revisions
No edit summary |
|||
(211 intermediate revisions by 4 users not shown) | |||
Line 6: | Line 6: | ||
|Data 1||Data 2 | |Data 1||Data 2 | ||
|} | |} | ||
==Comment box== | |||
{| border="1" cellpadding="5" cellspacing="0.1" style="text-align:left" | |||
|- | |||
! style="background:#efefef;" | Tip | |||
|- | |||
|Description  to our knowledge, the provable security property is often taught as being self evident and is not questioned on any level (recent advances in quantum hacking may be an exception; however, such attacks are based on discrepancies between the model and real systems as opposed to the security of the model itself). The commonly cited reason for no-cloning or quantum entanglement is very far from sufficient. Even in the technical literature, a key is often regarded as perfect whenever it is used in an application. One main purpose of this paper is to correct such a misconception and to demonstrate how the imperfect generated key affects the security proofs themselves. | |||
|} | |||
{{Infobox | |||
|style = border: 2px | |||
|bodystyle = width: 350px | |||
|abovestyle = background: #c8ccd1 | |||
|datastyle = text-align: left | |||
|above = Comment box testing | |||
|data1 = Description to our knowledge, the provable security property is often taught as being self evident and is not questioned on any level (recent advances in quantum hacking may be an exception; however, such attacks are based on discrepancies between the model and real systems as opposed to the security of the model itself). The commonly cited reason for no-cloning or quantum entanglement is very far from sufficient. Even in the technical literature, a key is often regarded as perfect whenever it is used in an application. One main purpose of this paper is to correct such a misconception and to demonstrate how the imperfect generated key affects the security proofs themselves. | |||
}} | |||
==Symbol== | ==Symbol== | ||
__MATHJAX_NODOLLAR__ | |||
I owe you 20. | |||
I owe you 20. | I owe you $20 | ||
I owe you $20 | |||
==Download test== | |||
* [[File: test.pdf]] | |||
==Infoboxtest== | ==Infoboxtest== | ||
Line 28: | Line 65: | ||
Why the heck why isn't this a file you can just unpackage into a directory rather than having to manually create 20 files, I don't know. | Why the heck why isn't this a file you can just unpackage into a directory rather than having to manually create 20 files, I don't know. | ||
I owe you $20 | |||
==More Testing== | ==More Testing== | ||
Line 72: | Line 111: | ||
* [http://www.eleceng.adelaide.edu.au/personal/dabbott/avionic_exams.xlsx Avionic exam time] | * [http://www.eleceng.adelaide.edu.au/personal/dabbott/avionic_exams.xlsx Avionic exam time] | ||
* [http://www.eleceng.adelaide.edu.au/personal/dabbott/test.ppt test download] | * [http://www.eleceng.adelaide.edu.au/personal/dabbott/test.ppt test download] | ||
* [http://www.eleceng.adelaide.edu.au/personal/dabbott/test1.ppt test1 download] | |||
===Presentations=== | |||
* https://www.youtube.com/watch?v=4P61D6JbgHE | |||
* [http://www.eleceng.adelaide.edu.au/personal/dabbott/Tips.ppt Proposal seminar slides] | |||
* [http://www.eleceng.adelaide.edu.au/personal/dabbott/Proposal_Seminar2014.pdf Proposal seminar slides] | |||
* [http://www.eleceng.adelaide.edu.au/personal/dabbott/Final_Seminar2014.pdf Final seminar slides] | |||
* [http://www.eleceng.adelaide.edu.au/personal/dabbott/video.m4v Final seminar video] | |||
==Notes relating to Test space== | ==Notes relating to Test space== | ||
<references/> | <references/> |
Latest revision as of 17:13, 25 February 2024
Test space[edit]
Heading 1 | Heading 2 |
---|---|
Data 1 | Data 2 |
Comment box[edit]
Tip |
---|
Description to our knowledge, the provable security property is often taught as being self evident and is not questioned on any level (recent advances in quantum hacking may be an exception; however, such attacks are based on discrepancies between the model and real systems as opposed to the security of the model itself). The commonly cited reason for no-cloning or quantum entanglement is very far from sufficient. Even in the technical literature, a key is often regarded as perfect whenever it is used in an application. One main purpose of this paper is to correct such a misconception and to demonstrate how the imperfect generated key affects the security proofs themselves. |
{{#ifeq:|yes||
{{#if:|}}{{#if:Comment box testing|{{#if:Comment box testing ||{{#if:|{{#if: | }} }} }} }}{{#ifeq:|yes|{{#if:|{{{title}}}}}}}{{#if:|{{#if: |
|{{#if:|{{#if: | }} }} }}{{#if:|{{#if: |
|{{#if:{{{subheader2}}}|{{#if: | }} }} }}{{#if:|{{#if: |
|{{#if:{{{image1}}} {{#if:||{{#if: | }} }} }}{{#if:|{{#if: |
{{{caption1}}}}}
|{{#if:{{{image2}}}{{#if:||{{#if: | }} }} }}{{#if: |
{{{caption2}}}}}
|{{#if:Description to our knowledge, the provable security property is often taught as being self evident and is not questioned on any level (recent advances in quantum hacking may be an exception; however, such attacks are based on discrepancies between the model and real systems as opposed to the security of the model itself). The commonly cited reason for no-cloning or quantum entanglement is very far from sufficient. Even in the technical literature, a key is often regarded as perfect whenever it is used in an application. One main purpose of this paper is to correct such a misconception and to demonstrate how the imperfect generated key affects the security proofs themselves.|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if:|}}{{#if:|}} {{#ifeq:|yes||
Comment box testing | |||
---|---|---|---|
{{{label}}} | | |
}}{{{data}}} | |
{{{header}}} | |||
{{{label}}} | | |
}} | |
{{{header}}} | |||
{{{label}}} | | |
}}{{{subheader2}}} | |
{{{header}}} | |||
{{{label}}} | | |
}}{{{image1}}} {{#if:| {{{caption1}}}}} | |
{{{header}}} | |||
{{{label}}} | | |
}}{{{image2}}}{{#if:| {{{caption2}}}}} | |
| |
}}Description to our knowledge, the provable security property is often taught as being self evident and is not questioned on any level (recent advances in quantum hacking may be an exception; however, such attacks are based on discrepancies between the model and real systems as opposed to the security of the model itself). The commonly cited reason for no-cloning or quantum entanglement is very far from sufficient. Even in the technical literature, a key is often regarded as perfect whenever it is used in an application. One main purpose of this paper is to correct such a misconception and to demonstrate how the imperfect generated key affects the security proofs themselves. | ||
| |
}} | ||
| |
}} | ||
| |
}} | ||
| |
}} | ||
| |
}} | ||
| |
}} | ||
| |
}} | ||
| |
}} | ||
| |
}} | ||
| |
}} | ||
| |
}} | ||
| |
}} | ||
| |
}} | ||
| |
}} | ||
| |
}} | ||
| |
}} | ||
| |
}} | ||
| |
}} | ||
| |
}} | ||
| |
}} | ||
| |
}} | ||
| |
}} | ||
| |
}} | ||
| |
}} | ||
| |
}} | ||
| |
}} | ||
| |
}} | ||
| |
}} | ||
| |
}} | ||
| |
}} | ||
| |
}} | ||
| |
}} | ||
| |
}} | ||
| |
}} | ||
| |
}} | ||
| |
}} | ||
| |
}} | ||
| |
}} | ||
| |
}} | ||
| |
}} | ||
| |
}} | ||
| |
}} | ||
| |
}} | ||
| |
}} | ||
| |
}} | ||
| |
}} | ||
| |
}} | ||
| |
}} | ||
| |
}} | ||
| |
}} | ||
| |
}} | ||
| |
}} | ||
| |
}} | ||
| |
}} | ||
| |
}} | ||
| |
}} | ||
| |
}} | ||
| |
}} | ||
| |
}} | ||
| |
}} | ||
| |
}} | ||
| |
}} | ||
| |
}} | ||
| |
}} | ||
| |
}} | ||
| |
}} | ||
| |
}} | ||
| |
}} | ||
| |
}} | ||
| |
}} | ||
| |
}} | ||
| |
}} | ||
| |
}} | ||
| |
}} | ||
| |
}} | ||
| |
}} | ||
| |
}} | ||
| |
}} | ||
| |
}} | ||
{{{below}}} | |||
{{#if:| <span|<div}} class="noprint plainlinks navbar" style="background:none; padding:0; font-weight:normal;; font-size:xx-small; ">{{#if:1||This box: }}{{#if:|[}}[[{{#switch:
|#default = | = {{#ifeq: | | Template:{{{name}}} | }} }}|{{#if:1|v|view}}]] • [[|{{#if:1|d|talk}}]]{{#if:|| • [{{fullurl:{{#switch: |#default = | = {{#ifeq: | | Template:{{{name}}} | }}}}|action=edit}}{{#if:1|e|edit}}]}}{{#if:|]}}{{#if:| |}} |
}}
Symbol[edit]
__MATHJAX_NODOLLAR__ I owe you 20.
I owe you $20
I owe you $20
Download test[edit]
Infoboxtest[edit]
{{#ifeq:|yes||
{{#if:Infobox testing|}}{{#if:|{{#if:{{{above}}} ||{{#if:|{{#if: | }} }} }} }}{{#ifeq:|yes|{{#if:Infobox testing|Infobox testing}}}}{{#if:|{{#if: |
|{{#if:|{{#if: | }} }} }}{{#if:|{{#if: |
|{{#if:{{{subheader2}}}|{{#if: | }} }} }}{{#if:

|{{#if:|{{#if: | }} }} }}{{#if:|{{#if: |{{#if:|
{{{caption1}}}}}
|{{#if:{{{image2}}}{{#if:||{{#if: | }} }} }}{{#if:Main Heading |
{{{caption2}}}}}
|{{#if:|{{#if: | }} }}{{#if:First set of data |
|{{#if:Data|{{#if:Label | }} }}{{#if:Remove this line (optional) |
|{{#if:More data|{{#if:More Label | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if: |
|{{#if:|{{#if: | }} }}{{#if:|}}{{#if:|}} {{#ifeq:|yes||
}}
OK this is the test bed for the u-beaut infobox. What a pain to install. For the record, I followed the info at this link: http://www.etcwiki.org/wiki/Mediawiki_template_guide
Why the heck why isn't this a file you can just unpackage into a directory rather than having to manually create 20 files, I don't know.
I owe you $20
More Testing[edit]
According to scientists, the Sun is pretty big.[1]
The Moon, however, is not so big.[2]
MathJax Test[edit]
Here is an inline equation: \( x^2 \)
Here is a display equation: \begin{align} \int 2x \; dx &= x^2 + C \tag{1}\label{eqn:integral} \end{align}
That last equation was Eqn. \ref{eqn:integral}.
\( \int_a^y f(\alpha\,)\,dy , \)
and in display form
\[ \int_a^y f(\alpha\,)\,dy . \]
Scratch[edit]
Therefore, the minimal cost = $50 million 360 = $18,000 million = $18 billion. The maximal cost is = $50 million 20,300 = $1,016,500 million = $1 trillion (approx).
Scratch pad downloads[edit]
Presentations[edit]
- https://www.youtube.com/watch?v=4P61D6JbgHE
- Proposal seminar slides
- Proposal seminar slides
- Final seminar slides
- Final seminar video