Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Limits on fundamental limits to computation
IL Markov - Nature, 2014 - nature.com
An indispensable part of our personal and working lives, computing has also become
essential to industries and governments. Steady improvements in computer hardware have …
essential to industries and governments. Steady improvements in computer hardware have …
Quantum computational complexity
J Watrous - arxiv preprint arxiv:0804.3401, 2008 - arxiv.org
This article surveys quantum computational complexity, with a focus on three fundamental
notions: polynomial-time quantum computations, the efficient verification of quantum proofs …
notions: polynomial-time quantum computations, the efficient verification of quantum proofs …
Fractal: Post-quantum and Transparent Recursive Proofs from Holography
We present a new methodology to efficiently realize recursive composition of succinct non-
interactive arguments of knowledge (SNARKs). Prior to this work, the only known …
interactive arguments of knowledge (SNARKs). Prior to this work, the only known …
How to record quantum queries, and applications to quantum indifferentiability
M Zhandry - Advances in Cryptology–CRYPTO 2019: 39th Annual …, 2019 - Springer
The quantum random oracle model (QROM) has become the standard model in which to
prove the post-quantum security of random-oracle-based constructions. Unfortunately, none …
prove the post-quantum security of random-oracle-based constructions. Unfortunately, none …
Verifiable quantum advantage without structure
We show the following hold, unconditionally unless otherwise stated, relative to a random
oracle:—There are NP search problems solvable by quantum polynomial-time (QPT) …
oracle:—There are NP search problems solvable by quantum polynomial-time (QPT) …
[KİTAP][B] Quantum walks and search algorithms
R Portugal - 2013 - Springer
This is a textbook about quantum walks and quantum search algorithms. The readers will
take advantage of the pedagogical aspects and learn the topics faster and make less effort …
take advantage of the pedagogical aspects and learn the topics faster and make less effort …
Random oracles in a quantum world
The interest in post-quantum cryptography—classical systems that remain secure in the
presence of a quantum adversary—has generated elegant proposals for new cryptosystems …
presence of a quantum adversary—has generated elegant proposals for new cryptosystems …
Quantum walk algorithm for element distinctness
A Ambainis - SIAM Journal on Computing, 2007 - SIAM
We use quantum walks to construct a new quantum algorithm for element distinctness and
its generalization. For element distinctness (the problem of finding two equal items among N …
its generalization. For element distinctness (the problem of finding two equal items among N …
Quantum attacks on Bitcoin, and how to protect against them
The key cryptographic protocols used to secure the internet and financial transactions of
today are all susceptible to attack by the development of a sufficiently large quantum …
today are all susceptible to attack by the development of a sufficiently large quantum …
Complexity-theoretic foundations of quantum supremacy experiments
S Aaronson, L Chen - arxiv preprint arxiv:1612.05903, 2016 - arxiv.org
In the near future, there will likely be special-purpose quantum computers with 40-50 high-
quality qubits. This paper lays general theoretical foundations for how to use such devices to …
quality qubits. This paper lays general theoretical foundations for how to use such devices to …