A survey of quantum computing for finance
Quantum computers are expected to surpass the computational capabilities of classical
computers during this decade and have transformative impact on numerous industry sectors …
computers during this decade and have transformative impact on numerous industry sectors …
Toward quantum secured distributed energy resources: Adoption of post-quantum cryptography (pqc) and quantum key distribution (qkd)
Quantum computing is a game-changing technology that affects modern cryptography and
security systems including distributed energy resources (DERs) systems. Since the new …
security systems including distributed energy resources (DERs) systems. Since the new …
[PDF][PDF] Falcon: Fast-Fourier lattice-based compact signatures over NTRU
This document is the supporting documentation of Falcon. It is organized as follows. Chapter
2 explains the overall design of Falcon and its rationale. Chapter 3 is a complete …
2 explains the overall design of Falcon and its rationale. Chapter 3 is a complete …
Quantum analysis of AES
Quantum computing is considered among the next big leaps in computer science. While a
fully functional quantum computer is still in the future, there is an ever-growing need to …
fully functional quantum computer is still in the future, there is an ever-growing need to …
Reducing the cost of implementing the advanced encryption standard as a quantum circuit
B Langenberg, H Pham… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
To quantify security levels in a postquantum scenario, it is common to use the quantum
resources needed to attack the Advanced Encryption Standard (AES) as a reference value …
resources needed to attack the Advanced Encryption Standard (AES) as a reference value …
Opening the black box inside Grover's algorithm
Grover's algorithm is one of the primary algorithms offered as evidence that quantum
computers can provide an advantage over classical computers. It involves an …
computers can provide an advantage over classical computers. It involves an …
The SQALE of CSIDH: sublinear Vélu quantum-resistant isogeny action with low exponents
Recent independent analyses by Bonnetain–Schrottenloher and Peikert in Eurocrypt 2020
significantly reduced the estimated quantum security of the isogeny-based commutative …
significantly reduced the estimated quantum security of the isogeny-based commutative …
Synthesizing Quantum Circuits of AES with Lower T-depth and Less Qubits
The significant progress in the development of quantum computers has made the study of
cryptanalysis based on quantum computing an active topic. To accurately estimate the …
cryptanalysis based on quantum computing an active topic. To accurately estimate the …
Quantum circuit implementations of AES with fewer qubits
We propose some quantum circuit implementations of AES with the following improvements.
Firstly, we propose some quantum circuits of the AES S-box and S-box^-1-1, which require …
Firstly, we propose some quantum circuits of the AES S-box and S-box^-1-1, which require …
Efficient implementation of PRESENT and GIFT on quantum computers
Grover search algorithm is the most representative quantum attack method that threatens the
security of symmetric key cryptography. If the Grover search algorithm is applied to …
security of symmetric key cryptography. If the Grover search algorithm is applied to …