Results 31 to 40 of about 1,492,941 (204)

Quantum search for scaled hash function preimages [PDF]

open access: yesQuantum Information Processing, 2021
AbstractWe present the implementation of Grover’s algorithm in a quantum simulator to perform a quantum search for preimages of two scaled hash functions, whose design only uses modular addition, word rotation and bitwise exclusive or. Our implementation provides the means to assess with precision the scaling of the number of gates and depth of a full ...
Sergi Ramos-Calderer   +4 more
openaire   +3 more sources

Leftover Hashing against quantum side information [PDF]

open access: yes2010 IEEE International Symposium on Information Theory, 2010
The Leftover Hash Lemma states that the output of a two-universal hash function applied to an input with sufficiently high entropy is almost uniformly random. In its standard formulation, the lemma refers to a notion of randomness that is (usually implicitly) defined with respect to classical side information.
Tomamichel, M.   +3 more
openaire   +4 more sources

EXIT-Chart Aided Quantum Code Design Improves the Normalised Throughput of Realistic Quantum Devices

open access: yesIEEE Access, 2016
In this contribution, the Hashing bound of entanglement-assisted quantum channels is investigated in the context of quantum devices built from a range of popular materials, such as trapped ion and relying on solid state nuclear magnetic resonance, which ...
Hung Viet Nguyen   +6 more
doaj   +1 more source

The Road From Classical to Quantum Codes: A Hashing Bound Approaching Design Procedure

open access: yesIEEE Access, 2015
Powerful quantum error correction codes (QECCs) are required for stabilizing and protecting fragile qubits against the undesirable effects of quantum decoherence. Similar to classical codes, hashing bound approaching QECCs may be designed by exploiting a
Zunaira Babar   +4 more
doaj   +1 more source

Post-quantum distributed ledger technology: a systematic survey

open access: yesScientific Reports, 2023
Blockchain technology finds widespread application across various fields due to its key features such as immutability, reduced costs, decentralization, and transparency.
Nikhil Kumar Parida   +4 more
doaj   +1 more source

Limitations of the Macaulay matrix approach for using the HHL algorithm to solve multivariate polynomial systems [PDF]

open access: yesQuantum, 2023
Recently Chen and Gao \cite{ChenGao2017} proposed a new quantum algorithm for Boolean polynomial system solving, motivated by the cryptanalysis of some post-quantum cryptosystems.
Jintai Ding   +4 more
doaj   +1 more source

EXTENSION OF SSL/TLS FOR QUANTUM CRYPTOGRAPHY [PDF]

open access: yesمجلة جامعة الانبار للعلوم الصرفة, 2008
SSL/TLS is the protocol that is used for the vast majority of secure transactions over the Internet. However, this protocol needs to be extended in order to create a promising platform for the integration of quantum cryptography (QC) into the Internet ...
Sufyan T. Faraj
doaj   +1 more source

On the Performance of Interleavers for Quantum Turbo Codes

open access: yesEntropy, 2019
Quantum turbo codes (QTC) have shown excellent error correction capabilities in the setting of quantum communication, achieving a performance less than 1 dB away from their corresponding hashing bounds.
Josu Etxezarreta Martinez   +2 more
doaj   +1 more source

Quantum Hashing

open access: yes, 2013
11 pages, 2 figures, 1 ...
Ablayev, Farid, Vasiliev, Alexander
openaire   +2 more sources

Efficient entanglement purification based on noise guessing decoding [PDF]

open access: yesQuantum
In this paper, we propose a novel bipartite entanglement purification protocol built upon hashing and upon the guessing random additive noise decoding (GRAND) approach recently devised for classical error correction codes. Our protocol offers substantial
André Roque   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy