Author Correction: Demonstration of Shor’s factoring algorithm for N = 21 on IBM quantum processors
Unathi Skosana, Mark Tame
doaj +2 more sources
Factoring an integer with three oscillators and a qubit. [PDF]
Brenner L +3 more
europepmc +1 more source
Quantum secured blockchain framework for enhancing post quantum data security. [PDF]
Reddy NR +5 more
europepmc +1 more source
The Mathematical Foundation of Post-Quantum Cryptography. [PDF]
Zong C.
europepmc +1 more source
A Survey on Proof of Sequential Work: Development, Security Analysis, and Application Prospects. [PDF]
Zhang J +7 more
europepmc +1 more source
Computing Shor's algorithmic steps with interference patterns of classical light. [PDF]
Wang W, You Z, Wang S, Tang Z, Ian H.
europepmc +1 more source
Enhanced EAADE: a quantum-resilient and privacy-preserving authentication protocol for secure data exchange in vehicular social networks. [PDF]
Alrashdi R +7 more
europepmc +1 more source
A Post-Quantum Public-Key Signcryption Scheme over Scalar Integers Based on a Modified LWE Structure. [PDF]
Kara M, Hammoudeh M, Alamri A, Alamri S.
europepmc +1 more source
Reducing T-count and T-depth in approximate quantum Fourier transform circuits. [PDF]
Park B, Ahn D.
europepmc +1 more source
Hybrid cryptographic approach for strengthening IoT and 5G/B5G network security. [PDF]
Kumar A, Singh P, Kamble DP, Singh I.
europepmc +1 more source

