Results 1 to 10 of about 61 (48)

Materials Experiment and Analysis Database: Material library with Bi,Mn,Sb,V,Co deposited by INKJET on 2014-02-04 from Plate 00012531 annealed at 550.0C to add O on 2014-02-09

open access: yes, 2021
This record is a component of the Materials Experiment and Analysis Database (MEAD). It contains raw data and metadata from millions of materials synthesis and characterization experiments, as well as the analysis and distillation of that data into ...
Gregoire, John, Soedarmadji, Edwin
core   +6 more sources

Quantum median filter for total variation image denoising [PDF]

open access: yes, 2022
In this new computing paradigm, named quantum computing, researchers from all over the world are taking their first steps in designing quantum circuits for image process- ing, through a difficult process of knowledge transfer.
De Santis, Simone   +3 more
core   +2 more sources

A Modified Quantum-Inspired Genetic Algorithm Using Lengthening Chromosome Size and an Adaptive Look-Up Table to Avoid Local Optima [PDF]

open access: yes, 2023
Quantum-inspired genetic algorithm which combines the quantum mechanics concepts 1 and the genetic algorithm to enhance the search capability of that has been popular and provide an 2 efficient search mechanism.
Hakemi, Shahin   +3 more
core   +1 more source

Graph isomorphism and Gaussian boson sampling

open access: yesSpecial Matrices, 2021
We introduce a connection between a near-term quantum computing device, specifically a Gaussian boson sampler, and the graph isomorphism problem. We propose a scheme where graphs are encoded into quantum states of light, whose properties are then probed ...
Brádler Kamil   +4 more
doaj   +1 more source

Quantum algorithms for computing general discrete logarithms and orders with tradeoffs

open access: yesJournal of Mathematical Cryptology, 2021
We generalize our earlier works on computing short discrete logarithms with tradeoffs, and bridge them with Seifert's work on computing orders with tradeoffs, and with Shor's groundbreaking works on computing orders and general discrete logarithms.
Ekerå Martin
doaj   +1 more source

A new type of digital signature algorithms with a hidden group [PDF]

open access: yes, 2023
The known designs of digital signature schemes with a hidden group, which use finite non-commutative algebras as algebraic support, are based on the computational complexity of the so-called hidden discrete logarithm problem.
Dmitriy N. Moldovyan
core   +1 more source

A framework for reducing the overhead of the quantum oracle for use with Grover’s algorithm with applications to cryptanalysis of SIKE

open access: yesJournal of Mathematical Cryptology, 2020
In this paper we provide a framework for applying classical search and preprocessing to quantum oracles for use with Grover’s quantum search algorithm in order to lower the quantum circuit-complexity of Grover’s algorithm for single-target search ...
Biasse Jean-François, Pring Benjamin
doaj   +1 more source

A subexponential-time, polynomial quantum space algorithm for inverting the CM group action

open access: yesJournal of Mathematical Cryptology, 2020
We present a quantum algorithm which computes group action inverses of the complex multiplication group action on isogenous ordinary elliptic curves, using subexponential time, but only polynomial quantum space.
Jao David   +3 more
doaj   +1 more source

Vibronic spectra of molecules – an experiment with a quantum computer simulator [PDF]

open access: yes, 2023
In addition to the exciting fundamental questions of quantum computing and implementation possibilities of quantum computers, it is important to look for application areas of quantum computing, to point out practical cases which justify the need for this
Kozsik, Tamás   +2 more
core   +1 more source

A trade-off between classical and quantum circuit size for an attack against CSIDH

open access: yesJournal of Mathematical Cryptology, 2020
We propose a heuristic algorithm to solve the underlying hard problem of the CSIDH cryptosystem (and other isogeny-based cryptosystems using elliptic curves with endomorphism ring isomorphic to an imaginary quadratic order 𝒪).
Biasse Jean-François   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy