Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Quantum computations: algorithms and error correction
AY Kitaev - Russian Mathematical Surveys, 1997 - iopscience.iop.org
Abstract Contents § 0. Introduction § 1. Abelian problem on the stabilizer § 2. Classical
models of computations 2.1. Boolean schemes and sequences of operations 2.2. Reversible …
models of computations 2.1. Boolean schemes and sequences of operations 2.2. Reversible …
Computational complexity: a conceptual perspective
O Goldreich - ACM Sigact News, 2008 - dl.acm.org
This book is rooted in the thesis that complexity theory is extremely rich in conceptual
content, and that this contents should be explicitly communicated in expositions and courses …
content, and that this contents should be explicitly communicated in expositions and courses …
Breaking SIDH in polynomial time
D Robert - Annual International Conference on the Theory and …, 2023 - Springer
Breaking SIDH in Polynomial Time | SpringerLink Skip to main content Advertisement
SpringerLink Account Menu Find a journal Publish with us Track your research Search Cart …
SpringerLink Account Menu Find a journal Publish with us Track your research Search Cart …
Algorithms for quantum computation: discrete logarithms and factoring
PW Shor - … 35th annual symposium on foundations of computer …, 1994 - ieeexplore.ieee.org
A computer is generally considered to be a universal computational device; ie, it is believed
able to simulate any physical computational device with a cost in computation time of at most …
able to simulate any physical computational device with a cost in computation time of at most …
[КНИГА][B] Handbook of applied cryptography
AJ Menezes, PC Van Oorschot, SA Vanstone - 2018 - taylorfrancis.com
Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an
important discipline that is not only the subject of an enormous amount of research, but …
important discipline that is not only the subject of an enormous amount of research, but …
[КНИГА][B] Introduction to algorithms
A comprehensive update of the leading algorithms text, with new material on matchings in
bipartite graphs, online algorithms, machine learning, and other topics. Some books on …
bipartite graphs, online algorithms, machine learning, and other topics. Some books on …
A method for obtaining digital signatures and public-key cryptosystems
RL Rivest, A Shamir, L Adleman - Communications of the ACM, 1978 - dl.acm.org
An encryption method is presented with the novel property that publicly revealing an
encryption key does not thereby reveal the corresponding decryption key. This has two …
encryption key does not thereby reveal the corresponding decryption key. This has two …
Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer
PW Shor - SIAM review, 1999 - SIAM
A digital computer is generally believed to be an efficient universal computing device; that is,
it is believed to be able to simulate any physical computing device with an increase in …
it is believed to be able to simulate any physical computing device with an increase in …
Introduction to automata theory, languages, and computation
In the preface from the 1979 predecessor to thOR book, Hopcroft and U11man marveled at
the fact that the subject of automata had exploded, compared with its state at the time they …
the fact that the subject of automata had exploded, compared with its state at the time they …
[PDF][PDF] Introduction to the Theory of Computation
M Sipser - ACM Sigact News, 1996 - dl.acm.org
Automata, Computability, and Complexity 1/Complexity theory 2/Computability theory
2/Automata theory 3/Mathematical Notions and Terminology 3/Sets 3/Sequences and tuples …
2/Automata theory 3/Mathematical Notions and Terminology 3/Sets 3/Sequences and tuples …