Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Quantum technology for military applications
M Krelina - EPJ Quantum Technology, 2021 - epjqt.epj.org
Quantum technology is an emergent and potentially disruptive discipline, with the ability to
affect many human activities. Quantum technologies are dual-use technologies, and as such …
affect many human activities. Quantum technologies are dual-use technologies, and as such …
Qram: A survey and critique
Quantum random-access memory (QRAM) is a mechanism to access data (quantum or
classical) based on addresses which are themselves a quantum state. QRAM has a long …
classical) based on addresses which are themselves a quantum state. QRAM has a long …
A fault-tolerant honeycomb memory
Abstract Recently, Hastings & Haah introduced a quantum memory defined on the
honeycomb lattice. Remarkably, this honeycomb code assembles weight-six parity checks …
honeycomb lattice. Remarkably, this honeycomb code assembles weight-six parity checks …
Performance analysis of a repetition cat code architecture: Computing 256-bit elliptic curve logarithm in 9 hours with 126 133 cat qubits
Cat qubits provide appealing building blocks for quantum computing. They exhibit a tunable
noise bias yielding an exponential suppression of bit flips with the average photon number …
noise bias yielding an exponential suppression of bit flips with the average photon number …
Quantum algorithms for attacking hardness assumptions in classical and post‐quantum cryptography
JF Biasse, X Bonnetain, E Kirshanova… - IET Information …, 2023 - Wiley Online Library
In this survey, the authors review the main quantum algorithms for solving the computational
problems that serve as hardness assumptions for cryptosystem. To this end, the authors …
problems that serve as hardness assumptions for cryptosystem. To this end, the authors …
Assessing the benefits and risks of quantum computers
Quantum computing is an emerging technology with potentially far-reaching implications for
national prosperity and security. Understanding the timeframes over which economic …
national prosperity and security. Understanding the timeframes over which economic …
The SQALE of CSIDH: sublinear Vélu quantum-resistant isogeny action with low exponents
J Chávez-Saab, JJ Chi-Domínguez, S Jaques… - Journal of Cryptographic …, 2022 - Springer
Recent independent analyses by Bonnetain–Schrottenloher and Peikert in Eurocrypt 2020
significantly reduced the estimated quantum security of the isogeny-based commutative …
significantly reduced the estimated quantum security of the isogeny-based commutative …
Magic state cultivation: growing T states as cheap as CNOT gates
We refine ideas from Knill 1996, Jones 2016, Chamberland 2020, Gidney 2023+ 2024,
Bombin 2024, and Hirano 2024 to efficiently prepare good $| T\rangle $ states. We call our …
Bombin 2024, and Hirano 2024 to efficiently prepare good $| T\rangle $ states. We call our …
Optimizing resource efficiencies for scalable full-stack quantum computers
In the race to build scalable quantum computers, minimizing the resource consumption of
their full stack to achieve a target performance becomes crucial. It mandates a synergy of …
their full stack to achieve a target performance becomes crucial. It mandates a synergy of …
Classically verifiable quantum advantage from a computational bell test
Existing experimental demonstrations of quantum computational advantage have had the
limitation that verifying the correctness of the quantum device requires exponentially costly …
limitation that verifying the correctness of the quantum device requires exponentially costly …