A survey of quantum computing for finance
Quantum computers are expected to surpass the computational capabilities of classical
computers during this decade and have transformative impact on numerous industry sectors …
computers during this decade and have transformative impact on numerous industry sectors …
The evolution of quantum secure direct communication: on the road to the qinternet
Communication security has to evolve to a higher plane in the face of the threat from the
massive computing power of the emerging quantum computers. Quantum secure direct …
massive computing power of the emerging quantum computers. Quantum secure direct …
[HTML][HTML] How to factor 2048 bit RSA integers in 8 hours using 20 million noisy qubits
We significantly reduce the cost of factoring integers and computing discrete logarithms in
finite fields on a quantum computer by combining techniques from Shor 1994, Griffiths-Niu …
finite fields on a quantum computer by combining techniques from Shor 1994, Griffiths-Niu …
The roadmap to 6G security and privacy
Although the fifth generation (5G) wireless networks are yet to be fully investigated, the
visionaries of the 6th generation (6G) echo systems have already come into the discussion …
visionaries of the 6th generation (6G) echo systems have already come into the discussion …
Toward the first quantum simulation with quantum speedup
With quantum computers of significant size now on the horizon, we should understand how
to best exploit their initially limited abilities. To this end, we aim to identify a practical problem …
to best exploit their initially limited abilities. To this end, we aim to identify a practical problem …
Assessing requirements to scale to practical quantum advantage
While quantum computers promise to solve some scientifically and commercially valuable
problems thought intractable for classical machines, delivering on this promise will require a …
problems thought intractable for classical machines, delivering on this promise will require a …
Quantum attacks on Bitcoin, and how to protect against them
The key cryptographic protocols used to secure the internet and financial transactions of
today are all susceptible to attack by the development of a sufficiently large quantum …
today are all susceptible to attack by the development of a sufficiently large quantum …
Security considerations for Internet of Things: A survey
Interconnecting “things” and devices that takes the form of wearables, sensors, actuators,
mobiles, computers, meters, or even vehicles is a critical requirement for the current era …
mobiles, computers, meters, or even vehicles is a critical requirement for the current era …
Cultural heritage preservation by using blockchain technologies
D Trček - Heritage science, 2022 - Springer
Ubiquitous digitization enables promising options for cultural heritage preservation.
Therefore, a new approach is presented that considers deployment scenarios by linking …
Therefore, a new approach is presented that considers deployment scenarios by linking …
Performance analysis of a repetition cat code architecture: Computing 256-bit elliptic curve logarithm in 9 hours with 126 133 cat qubits
Cat qubits provide appealing building blocks for quantum computing. They exhibit a tunable
noise bias yielding an exponential suppression of bit flips with the average photon number …
noise bias yielding an exponential suppression of bit flips with the average photon number …