Showing 921 - 940 results of 1,111 for search '"Quantum computing"', query time: 0.08s Refine Results
  1. 921

    Scaling up a sign-ordered Kitaev chain without magnetic flux control by Chun-Xiao Liu, Sebastian Miles, Alberto Bordin, Sebastiaan L. D. ten Haaf, Grzegorz P. Mazur, A. Mert Bozkurt, Michael Wimmer

    Published 2025-02-01
    “…Our work provides guidance for realizing a topologically protected Kitaev chain, which is the building block of error-resilient topological quantum computation.…”
    Get full text
    Article
  2. 922

    Streaming quantum state purification by Andrew M. Childs, Honghao Fu, Debbie Leung, Zhi Li, Maris Ozols, Vedang Vyas

    Published 2025-01-01
    “…This basic task has applications to quantum communication over noisy channels and quantum computation with imperfect devices, but has only been studied previously for the case of qubits. …”
    Get full text
    Article
  3. 923

    Algebraic classification of Hietarinta’s solutions of Yang-Baxter equations: invertible 4 × 4 operators by Somnath Maity, Vivek Kumar Singh, Pramod Padmanabhan, Vladimir Korepin

    Published 2024-12-01
    “…Abstract In order to examine the simulation of integrable quantum systems using quantum computers, it is crucial to first classify Yang-Baxter operators. …”
    Get full text
    Article
  4. 924

    Three-party password authenticated key agreement protocol with user anonymity based on lattice by Caifen WANG, Li CHEN

    Published 2018-02-01
    “…With the rapid development of quantum theory and the existence of polynomial algorithm in quantum computation based on discrete logarithm problem and large integer decomposition problem,the security of the algorithm was seriously threatened.Therefore,two authentication key agreement protocols were proposed rely on ring-learning-with-error (RLWE) assumption including lattice-based implicit authentication key agreement scheme and lattice-based explicit authentication key agreement scheme and proved its security.The implicit authentication key agreement protocol is less to communicate and faster to authentication,the explicit authentication key agreement protocol is more to secure.At the same time,bidirectional authentication of users and servers can resist unpredictable online dictionary attacks.The new protocol has higher efficiency and shorter key length than other password authentication key agreement protocols.It can resist quantum attacks.Therefore,the protocol is efficient,secure,and suitable for large-scale network communication.…”
    Get full text
    Article
  5. 925

    Control of a Josephson Digital Phase Detector via an SFQ-Based Flux Bias Driver by Laura Di Marino, Luigi Di Palma, Michele Riccio, Francesco Fienga, Marco Arzeo, Oleg Mukhanov

    Published 2025-01-01
    “…Quantum computation requires high-fidelity qubit readout, preserving the quantum state. …”
    Get full text
    Article
  6. 926

    Hong-Ou-Mandel quantum effect on rubber-cnt composites by L. A. Karachevtseva, V. V. Trachevskiy, O. O. Lytvynenko, M. T. Kartel

    Published 2023-02-01
    “…HOM quantum effect is perspective for high-coherent optical quantum computers on composites “rubber-carbon nanotubes”. …”
    Get full text
    Article
  7. 927

    Methods to achieve near-millisecond energy relaxation and dephasing times for a superconducting transmon qubit by Mikko Tuokkola, Yoshiki Sunada, Heidi Kivijärvi, Jonatan Albanese, Leif Grönberg, Jukka-Pekka Kaikkonen, Visa Vesterinen, Joonas Govenius, Mikko Möttönen

    Published 2025-07-01
    “…Abstract Superconducting qubits are one of the most promising physical systems for implementing quantum computers. However, executing quantum algorithms of practical computational advantage requires further improvements in the fidelities of qubit operations, which are currently limited by the energy relaxation and dephasing times of the qubits. …”
    Get full text
    Article
  8. 928

    Demonstration of Grover’s algorithm for retrieving secret keys in a basic SPN block cipher by Minh Thang Vu, Van Nghi Nguyen, Quoc Dat Le, Quang Trung Do

    Published 2024-10-01
    “…This technique can be effectively applied on IBM quantum computers for large-scale SPN block ciphers, such as AES and GOST R.34.10.2015, which are widely used today. …”
    Get full text
    Article
  9. 929

    Optimal fidelity estimation for density matrix by Yiping Lu, Liyu Lai, Jun Xiang, Yuhan Dai, Ying Zeng, Qi Li

    Published 2024-12-01
    “…Abstract Fidelity estimation is a necessary tool for evaluating noise in quantum measurement and quantum computation. The traditional fidelity estimation is to calculate the distance between two density matrices by employing direct fidelity estimation, which consumes too much copies of state. …”
    Get full text
    Article
  10. 930

    Demonstration of Grover’s algorithm for retrieving secret keys in a basic SPN block cipher by Minh Thang Vu, Van Nghi Nguyen, Quoc Dat Le, Quang Trung Do

    Published 2024-10-01
    “…This technique can be effectively applied on IBM quantum computers for large-scale SPN block ciphers, such as AES and GOST R.34.10.2015, which are widely used today. …”
    Get full text
    Article
  11. 931

    Three-party password authenticated key agreement protocol with user anonymity based on lattice by Caifen WANG, Li CHEN

    Published 2018-02-01
    “…With the rapid development of quantum theory and the existence of polynomial algorithm in quantum computation based on discrete logarithm problem and large integer decomposition problem,the security of the algorithm was seriously threatened.Therefore,two authentication key agreement protocols were proposed rely on ring-learning-with-error (RLWE) assumption including lattice-based implicit authentication key agreement scheme and lattice-based explicit authentication key agreement scheme and proved its security.The implicit authentication key agreement protocol is less to communicate and faster to authentication,the explicit authentication key agreement protocol is more to secure.At the same time,bidirectional authentication of users and servers can resist unpredictable online dictionary attacks.The new protocol has higher efficiency and shorter key length than other password authentication key agreement protocols.It can resist quantum attacks.Therefore,the protocol is efficient,secure,and suitable for large-scale network communication.…”
    Get full text
    Article
  12. 932

    On the independence heuristic in the dual attack by Bashiri Kaveh, Wiemers Andreas

    Published 2025-07-01
    “…Post-quantum cryptography deals with the development and analysis of cryptographic schemes that are assumed to be secure even against attackers with access to a powerful quantum computer. Along the main candidates for quantum-safe solutions are cryptographic schemes, whose security is based on classic lattice problems such as the bounded-distance decoding (BDD) problem or the learning with error problem. …”
    Get full text
    Article
  13. 933

    A complexity transition in displaced Gaussian Boson sampling by Zhenghao Li, Naomi R. Solomons, Jacob F. F. Bulmer, Raj B. Patel, Ian A. Walmsley

    Published 2025-07-01
    “…For purposes of demonstrating quantum computational advantage as well as practical applications, a large photon number is often desirable. …”
    Get full text
    Article
  14. 934

    Exploring ground states of Fermi-Hubbard model on honeycomb lattices with counterdiabaticity by Jialiang Tang, Ruoqian Xu, Yongcheng Ding, Xusheng Xu, Yue Ban, Man-Hong Yung, Axel Pérez-Obiol, Gloria Platero, Xi Chen

    Published 2024-11-01
    “…Abstract Exploring the ground state properties of many-body quantum systems conventionally involves adiabatic processes, alongside exact diagonalization, in the context of quantum annealing or adiabatic quantum computation. Shortcuts to adiabaticity by counter-diabatic driving serve to accelerate these processes by suppressing energy excitations. …”
    Get full text
    Article
  15. 935

    Observation of Optical Precursor in Time‐Energy‐Entangled W Triphotons by Zhou Feng, Rui Zhuang, Sinong Liu, Guobin Liu, Kangkang Li, Yanpeng Zhang

    Published 2025-07-01
    “…Abstract In quantum communication and quantum computation, adding each entangled photon leads to an exponential increase in communication and computational capabilities. …”
    Get full text
    Article
  16. 936

    A coherent approach to quantum-classical optimization by Andrés N. Cáliz, Jordi Riu, Josep Bosch, Pau Torrente, Jose Miralles, Arnau Riera

    Published 2025-05-01
    “…Abstract Hybrid quantum-classical optimization techniques, which incorporate the pre-optimization of Variational Quantum Algorithms using Tensor Networks, have been shown to allow for the reduction of quantum computational resources. In the particular case of large optimization problems, commonly found in real-world use cases, this strategy is almost mandatory to reduce the otherwise unfathomable execution costs and improve the quality of the results. …”
    Get full text
    Article
  17. 937

    Cryo-CMOS Bias-Voltage Generation and Demultiplexing at mK Temperatures for Large-Scale Arrays of Quantum Devices by Job van Staveren, Luc Enthoven, Peter Luka Bavdaz, Marcel Meyer, Corentin Deprez, Ville Nuutinen, Russell Lake, Davide Degli Esposti, Cornelius Carlsson, Alberto Tosato, Jiang Gong, Bagas Prabowo, Masoud Babaie, Carmen G. Almudever, Menno Veldhorst, Giordano Scappucci, Fabio Sebastiano

    Published 2025-01-01
    “…The rapidly growing number of qubits in semiconductor quantum computers requires a scalable control interface, including the efficient generation of dc bias voltages for gate electrodes. …”
    Get full text
    Article
  18. 938
  19. 939

    A SURVEY ON ZERO TRUST SECURITY – APPLICATIONS AND CHALLENGES by Varun Varma Sangaraju, SV Achuta Rao, Amjan Shaik, Prasuna VG, Nagaraju P B S.R.K.R.

    Published 2025-03-01
    “…The research suggests that Multifactor Authentication (MFA) can be of great advantage when coupled with zero trust security for authentication purposes. The rise of quantum computers and data centers calls for new security measures like zero trust security. …”
    Get full text
    Article
  20. 940

    Quantum many-body scarring in a non-Abelian lattice gauge theory by Giuseppe Calajó, Giovanni Cataldi, Marco Rigobello, Darvin Wanisch, Giuseppe Magnifico, Pietro Silvi, Simone Montangero, Jad C. Halimeh

    Published 2025-03-01
    “…Our findings bring QMBS to the realm of non-Abelian LGTs, highlighting the intimate connection between scarring and gauge symmetry, and are amenable for observation in a recently proposed trapped-ion qudit quantum computer.…”
    Get full text
    Article