A survey of quantum computing for finance

D Herman, C Googin, X Liu, A Galda, I Safro… - arxiv preprint arxiv …, 2022 - arxiv.org
Quantum computers are expected to surpass the computational capabilities of classical
computers during this decade and have transformative impact on numerous industry sectors …

Toward quantum secured distributed energy resources: Adoption of post-quantum cryptography (pqc) and quantum key distribution (qkd)

J Ahn, HY Kwon, B Ahn, K Park, T Kim, MK Lee, J Kim… - Energies, 2022 - mdpi.com
Quantum computing is a game-changing technology that affects modern cryptography and
security systems including distributed energy resources (DERs) systems. Since the new …

[PDF][PDF] Falcon: Fast-Fourier lattice-based compact signatures over NTRU

PA Fouque, J Hoffstein, P Kirchner… - Submission to the NIST's …, 2018 - di.ens.fr
This document is the supporting documentation of Falcon. It is organized as follows. Chapter
2 explains the overall design of Falcon and its rationale. Chapter 3 is a complete …

Quantum analysis of AES

K Jang, A Baksi, H Kim, G Song, H Seo… - Cryptology ePrint …, 2022 - eprint.iacr.org
Quantum computing is considered among the next big leaps in computer science. While a
fully functional quantum computer is still in the future, there is an ever-growing need to …

Reducing the cost of implementing the advanced encryption standard as a quantum circuit

B Langenberg, H Pham… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
To quantify security levels in a postquantum scenario, it is common to use the quantum
resources needed to attack the Advanced Encryption Standard (AES) as a reference value …

Opening the black box inside Grover's algorithm

EM Stoudenmire, X Waintal - Physical Review X, 2024 - APS
Grover's algorithm is one of the primary algorithms offered as evidence that quantum
computers can provide an advantage over classical computers. It involves an …

The SQALE of CSIDH: sublinear Vélu quantum-resistant isogeny action with low exponents

J Chávez-Saab, JJ Chi-Domínguez, S Jaques… - Journal of Cryptographic …, 2022 - Springer
Recent independent analyses by Bonnetain–Schrottenloher and Peikert in Eurocrypt 2020
significantly reduced the estimated quantum security of the isogeny-based commutative …

Synthesizing Quantum Circuits of AES with Lower T-depth and Less Qubits

Z Huang, S Sun - International Conference on the Theory and …, 2022 - Springer
The significant progress in the development of quantum computers has made the study of
cryptanalysis based on quantum computing an active topic. To accurately estimate the …

Quantum circuit implementations of AES with fewer qubits

J Zou, Z Wei, S Sun, X Liu, W Wu - … on the Theory and Application of …, 2020 - Springer
We propose some quantum circuit implementations of AES with the following improvements.
Firstly, we propose some quantum circuits of the AES S-box and S-box^-1-1, which require …

Efficient implementation of PRESENT and GIFT on quantum computers

K Jang, G Song, H Kim, H Kwon, H Kim, H Seo - Applied Sciences, 2021 - mdpi.com
Grover search algorithm is the most representative quantum attack method that threatens the
security of symmetric key cryptography. If the Grover search algorithm is applied to …