A survey of quantum computing for finance

D Herman, C Googin, X Liu, A Galda, I Safro… - arxiv preprint arxiv …, 2022 - arxiv.org
Quantum computers are expected to surpass the computational capabilities of classical
computers during this decade and have transformative impact on numerous industry sectors …

The evolution of quantum secure direct communication: on the road to the qinternet

D Pan, GL Long, L Yin, YB Sheng… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
Communication security has to evolve to a higher plane in the face of the threat from the
massive computing power of the emerging quantum computers. Quantum secure direct …

[HTML][HTML] How to factor 2048 bit RSA integers in 8 hours using 20 million noisy qubits

C Gidney, M Ekerå - Quantum, 2021 - quantum-journal.org
We significantly reduce the cost of factoring integers and computing discrete logarithms in
finite fields on a quantum computer by combining techniques from Shor 1994, Griffiths-Niu …

The roadmap to 6G security and privacy

P Porambage, G Gür, DPM Osorio… - IEEE Open Journal …, 2021 - ieeexplore.ieee.org
Although the fifth generation (5G) wireless networks are yet to be fully investigated, the
visionaries of the 6th generation (6G) echo systems have already come into the discussion …

Toward the first quantum simulation with quantum speedup

AM Childs, D Maslov, Y Nam… - Proceedings of the …, 2018 - National Acad Sciences
With quantum computers of significant size now on the horizon, we should understand how
to best exploit their initially limited abilities. To this end, we aim to identify a practical problem …

Assessing requirements to scale to practical quantum advantage

ME Beverland, P Murali, M Troyer, KM Svore… - arxiv preprint arxiv …, 2022 - arxiv.org
While quantum computers promise to solve some scientifically and commercially valuable
problems thought intractable for classical machines, delivering on this promise will require a …

Quantum attacks on Bitcoin, and how to protect against them

D Aggarwal, GK Brennen, T Lee, M Santha… - arxiv preprint arxiv …, 2017 - arxiv.org
The key cryptographic protocols used to secure the internet and financial transactions of
today are all susceptible to attack by the development of a sufficiently large quantum …

Security considerations for Internet of Things: A survey

A Jurcut, T Niculcea, P Ranaweera, NA Le-Khac - SN Computer Science, 2020 - Springer
Interconnecting “things” and devices that takes the form of wearables, sensors, actuators,
mobiles, computers, meters, or even vehicles is a critical requirement for the current era …

Cultural heritage preservation by using blockchain technologies

D Trček - Heritage science, 2022 - Springer
Ubiquitous digitization enables promising options for cultural heritage preservation.
Therefore, a new approach is presented that considers deployment scenarios by linking …

Performance analysis of a repetition cat code architecture: Computing 256-bit elliptic curve logarithm in 9 hours with 126 133 cat qubits

É Gouzien, D Ruiz, FM Le Régent, J Guillaud… - Physical Review Letters, 2023 - APS
Cat qubits provide appealing building blocks for quantum computing. They exhibit a tunable
noise bias yielding an exponential suppression of bit flips with the average photon number …