Results 31 to 40 of about 1,492,941 (204)
Quantum search for scaled hash function preimages [PDF]
AbstractWe present the implementation of Grover’s algorithm in a quantum simulator to perform a quantum search for preimages of two scaled hash functions, whose design only uses modular addition, word rotation and bitwise exclusive or. Our implementation provides the means to assess with precision the scaling of the number of gates and depth of a full ...
Sergi Ramos-Calderer +4 more
openaire +3 more sources
Leftover Hashing against quantum side information [PDF]
The Leftover Hash Lemma states that the output of a two-universal hash function applied to an input with sufficiently high entropy is almost uniformly random. In its standard formulation, the lemma refers to a notion of randomness that is (usually implicitly) defined with respect to classical side information.
Tomamichel, M. +3 more
openaire +4 more sources
EXIT-Chart Aided Quantum Code Design Improves the Normalised Throughput of Realistic Quantum Devices
In this contribution, the Hashing bound of entanglement-assisted quantum channels is investigated in the context of quantum devices built from a range of popular materials, such as trapped ion and relying on solid state nuclear magnetic resonance, which ...
Hung Viet Nguyen +6 more
doaj +1 more source
The Road From Classical to Quantum Codes: A Hashing Bound Approaching Design Procedure
Powerful quantum error correction codes (QECCs) are required for stabilizing and protecting fragile qubits against the undesirable effects of quantum decoherence. Similar to classical codes, hashing bound approaching QECCs may be designed by exploiting a
Zunaira Babar +4 more
doaj +1 more source
Post-quantum distributed ledger technology: a systematic survey
Blockchain technology finds widespread application across various fields due to its key features such as immutability, reduced costs, decentralization, and transparency.
Nikhil Kumar Parida +4 more
doaj +1 more source
Limitations of the Macaulay matrix approach for using the HHL algorithm to solve multivariate polynomial systems [PDF]
Recently Chen and Gao \cite{ChenGao2017} proposed a new quantum algorithm for Boolean polynomial system solving, motivated by the cryptanalysis of some post-quantum cryptosystems.
Jintai Ding +4 more
doaj +1 more source
EXTENSION OF SSL/TLS FOR QUANTUM CRYPTOGRAPHY [PDF]
SSL/TLS is the protocol that is used for the vast majority of secure transactions over the Internet. However, this protocol needs to be extended in order to create a promising platform for the integration of quantum cryptography (QC) into the Internet ...
Sufyan T. Faraj
doaj +1 more source
On the Performance of Interleavers for Quantum Turbo Codes
Quantum turbo codes (QTC) have shown excellent error correction capabilities in the setting of quantum communication, achieving a performance less than 1 dB away from their corresponding hashing bounds.
Josu Etxezarreta Martinez +2 more
doaj +1 more source
Efficient entanglement purification based on noise guessing decoding [PDF]
In this paper, we propose a novel bipartite entanglement purification protocol built upon hashing and upon the guessing random additive noise decoding (GRAND) approach recently devised for classical error correction codes. Our protocol offers substantial
André Roque +3 more
doaj +1 more source

