Results 41 to 50 of about 6,645,845 (367)
Most currently used cryptographic tools for protecting data are based on certain computational assumptions, which makes them vulnerable with respect to technological and algorithmic developments, such as quantum computing.
Aleksey K. Fedorov, Aleksey K. Fedorov
doaj +1 more source
Quantum algorithms revisited [PDF]
18 pages, LaTeX, 7 figures. Submitted to Proc. Roy. Soc.
R. CLEVE +3 more
openaire +3 more sources
Quantum K-nearest neighbors classification algorithm based on Mahalanobis distance
Mahalanobis distance is a distance measure that takes into account the relationship between features. In this paper, we proposed a quantum KNN classification algorithm based on the Mahalanobis distance, which combines the classical KNN algorithm with ...
Li-Zhen Gao +5 more
doaj +1 more source
Variational quantum algorithm with information sharing [PDF]
We introduce an optimisation method for variational quantum algorithms and experimentally demonstrate a 100-fold improvement in efficiency compared to naive implementations. The effectiveness of our approach is shown by obtaining multi-dimensional energy
C. Self +7 more
semanticscholar +1 more source
Quantum Relief algorithm [PDF]
Relief algorithm is a feature selection algorithm used in binary classification proposed by Kira and Rendell, and its computational complexity remarkable increases with both the scale of samples and the number of features. In order to reduce the complexity, a quantum feature selection algorithm based on Relief algorithm, also called quantum Relief ...
Wen-Jie Liu +4 more
openaire +3 more sources
Quantum prediction algorithms [PDF]
53 pages, RevTeX with ...
Kent, Adrian, McElwaine, Jim
openaire +2 more sources
Optimal Multi-Bit Toffoli Gate Synthesis
Multi-bit Toffoli gates form an essential quantum gate class for quantum algorithms. They should be efficiently decomposed into elementary single- or multi-qubit quantum gates, such as CNOT, T, and Hadarmard, for a scalable implementation of a quantum ...
Young-Min Jun, In-Chan Choi
doaj +1 more source
Quantum defragmentation algorithm [PDF]
In this addendum of our paper [D. Burgarth and V. Giovannetti, Phys. Rev. Lett. 99, 100501 (2007)] we prove that during the transformation that allows one to enforce control by relaxation on a quantum system, the ancillary memory can be kept at a finite size, independently from the fidelity one wants to achieve.
BURGARTH D, GIOVANNETTI, VITTORIO
openaire +3 more sources
Quantum Misuse Attack on Frodo
Research on the security of lattice-based public-key encryption schemes against misuse attacks is an important part of the cryptographic assessment of the National Institute of Standards and Technology (NIST) post-quantum cryptography (PQC ...
Yaru Wang, Haodong Jiang, Zhi Ma
doaj +1 more source
Variational quantum algorithm for the Poisson equation [PDF]
The Poisson equation has wide applications in many areas of science and engineering. Although there are some quantum algorithms that can efficiently solve the Poisson equation, they generally require a fault-tolerant quantum computer which is beyond the ...
Hailing Liu +6 more
semanticscholar +1 more source

