Quantum certification and benchmarking

J Eisert, D Hangleiter, N Walk, I Roth… - Nature Reviews …, 2020 - nature.com
With the rapid development of quantum technologies, a pressing need has emerged for a
wide array of tools for the certification and characterization of quantum devices. Such tools …

A systematic review on the status and progress of homomorphic encryption technologies

M Alloghani, MM Alani, D Al-Jumeily, T Baker… - Journal of Information …, 2019 - Elsevier
With the emergence of big data and the continued growth in cloud computing applications,
serious security and privacy concerns emerged. Consequently, several researchers and …

[BOOK][B] Cryptography: theory and practice

DR Stinson - 2005 - api.taylorfrancis.com
THE LEGACYFirst introduced in 1995, Cryptography: Theory and Practice garnered
enormous praise and popularity, and soon became the standard textbook for cryptography …

Classical hardness of learning with errors

Z Brakerski, A Langlois, C Peikert, O Regev… - Proceedings of the forty …, 2013 - dl.acm.org
We show that the Learning with Errors (LWE) problem is classically at least as hard as
standard worst-case lattice problems. Previously this was only known under quantum …

Interactive cryptographic proofs of quantumness using mid-circuit measurements

D Zhu, GD Kahanamoku-Meyer, L Lewis, C Noel… - Nature Physics, 2023 - nature.com
The ability to perform measurements in the middle of a quantum circuit is a powerful
resource. It underlies a wide range of applications, from remote state preparation to quantum …

Understanding in-context learning in transformers and llms by learning to learn discrete functions

S Bhattamishra, A Patel, P Blunsom… - arxiv preprint arxiv …, 2023 - arxiv.org
In order to understand the in-context learning phenomenon, recent works have adopted a
stylized experimental framework and demonstrated that Transformers can learn gradient …

Outcome indistinguishability

C Dwork, MP Kim, O Reingold, GN Rothblum… - Proceedings of the 53rd …, 2021 - dl.acm.org
Prediction algorithms assign numbers to individuals that are popularly understood as
individual “probabilities”—what is the probability of 5-year survival after cancer diagnosis …

Homomorphic encryption systems statement: Trends and challenges

B Alaya, L Laouamer, N Msilini - Computer Science Review, 2020 - Elsevier
For securing our own systems, encryption got the major interest, especially when talking
about homomorphic encryption, which has spread like wildfire. Therefore, in this study, we …

Hardness of noise-free learning for two-hidden-layer neural networks

S Chen, A Gollakota, A Klivans… - Advances in Neural …, 2022 - proceedings.neurips.cc
We give superpolynomial statistical query (SQ) lower bounds for learning two-hidden-layer
ReLU networks with respect to Gaussian inputs in the standard (noise-free) model. No …

Towards efficient arithmetic for lattice-based cryptography on reconfigurable hardware

T Pöppelmann, T Güneysu - … on Cryptology and Information Security in …, 2012 - Springer
In recent years lattice-based cryptography has emerged as quantum secure and
theoretically elegant alternative to classical cryptographic schemes (like ECC or RSA). In …