Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Toward quantum secured distributed energy resources: Adoption of post-quantum cryptography (pqc) and quantum key distribution (qkd)
Quantum computing is a game-changing technology that affects modern cryptography and
security systems including distributed energy resources (DERs) systems. Since the new …
security systems including distributed energy resources (DERs) systems. Since the new …
Qram: A survey and critique
Quantum random-access memory (QRAM) is a mechanism to access data (quantum or
classical) based on addresses which are themselves a quantum state. QRAM has a long …
classical) based on addresses which are themselves a quantum state. QRAM has a long …
Synthesizing Quantum Circuits of AES with Lower T-depth and Less Qubits
The significant progress in the development of quantum computers has made the study of
cryptanalysis based on quantum computing an active topic. To accurately estimate the …
cryptanalysis based on quantum computing an active topic. To accurately estimate the …
Assessing the benefits and risks of quantum computers
Quantum computing is an emerging technology with potentially far-reaching implications for
national prosperity and security. Understanding the timeframes over which economic …
national prosperity and security. Understanding the timeframes over which economic …
Space and time-efficient quantum multiplier in post quantum cryptography era
This paper examines the asymptotic performance of multiplication and the cost of quantum
implementation for the Naive schoolbook, Karatsuba, and Toom-Cook methods in the …
implementation for the Naive schoolbook, Karatsuba, and Toom-Cook methods in the …
Grover on KATAN: Quantum resource estimation
This article presents the cost analysis of mounting Grover's key search attack on the family of
KATAN block cipher. Several designs of the reversible quantum circuit of KATAN are …
KATAN block cipher. Several designs of the reversible quantum circuit of KATAN are …
Concrete analysis of quantum lattice enumeration
Lattice reduction algorithms such as BKZ (Block-Korkine-Zolotarev) play a central role in
estimating the security of lattice-based cryptography. The subroutine in BKZ which finds the …
estimating the security of lattice-based cryptography. The subroutine in BKZ which finds the …
Depth-optimization of quantum cryptanalysis on binary elliptic curves
This paper presents quantum cryptanalysis for binary elliptic curves from a time-efficient
implementation perspective (ie, reducing the circuit depth), complementing the previous …
implementation perspective (ie, reducing the circuit depth), complementing the previous …
New quantum circuit implementations of SM4 and SM3
J Zou, L Li, Z Wei, Y Luo, Q Liu, W Wu - Quantum Information Processing, 2022 - Springer
In this paper, we propose some new quantum circuit implementations of SM4 block cipher
and SM3 hash function, which are based on the following ideas. Firstly, we propose an …
and SM3 hash function, which are based on the following ideas. Firstly, we propose an …
A complete quantum circuit to solve the information set decoding problem
Providing strong security margins against cryptanalytic attackers equipped with quantum
computers is a major research direction fostered by the US National Institute of Standards …
computers is a major research direction fostered by the US National Institute of Standards …