-
921
Scaling up a sign-ordered Kitaev chain without magnetic flux control
Published 2025-02-01“…Our work provides guidance for realizing a topologically protected Kitaev chain, which is the building block of error-resilient topological quantum computation.…”
Get full text
Article -
922
Streaming quantum state purification
Published 2025-01-01“…This basic task has applications to quantum communication over noisy channels and quantum computation with imperfect devices, but has only been studied previously for the case of qubits. …”
Get full text
Article -
923
Algebraic classification of Hietarinta’s solutions of Yang-Baxter equations: invertible 4 × 4 operators
Published 2024-12-01“…Abstract In order to examine the simulation of integrable quantum systems using quantum computers, it is crucial to first classify Yang-Baxter operators. …”
Get full text
Article -
924
Three-party password authenticated key agreement protocol with user anonymity based on lattice
Published 2018-02-01“…With the rapid development of quantum theory and the existence of polynomial algorithm in quantum computation based on discrete logarithm problem and large integer decomposition problem,the security of the algorithm was seriously threatened.Therefore,two authentication key agreement protocols were proposed rely on ring-learning-with-error (RLWE) assumption including lattice-based implicit authentication key agreement scheme and lattice-based explicit authentication key agreement scheme and proved its security.The implicit authentication key agreement protocol is less to communicate and faster to authentication,the explicit authentication key agreement protocol is more to secure.At the same time,bidirectional authentication of users and servers can resist unpredictable online dictionary attacks.The new protocol has higher efficiency and shorter key length than other password authentication key agreement protocols.It can resist quantum attacks.Therefore,the protocol is efficient,secure,and suitable for large-scale network communication.…”
Get full text
Article -
925
Control of a Josephson Digital Phase Detector via an SFQ-Based Flux Bias Driver
Published 2025-01-01“…Quantum computation requires high-fidelity qubit readout, preserving the quantum state. …”
Get full text
Article -
926
Hong-Ou-Mandel quantum effect on rubber-cnt composites
Published 2023-02-01“…HOM quantum effect is perspective for high-coherent optical quantum computers on composites “rubber-carbon nanotubes”. …”
Get full text
Article -
927
Methods to achieve near-millisecond energy relaxation and dephasing times for a superconducting transmon qubit
Published 2025-07-01“…Abstract Superconducting qubits are one of the most promising physical systems for implementing quantum computers. However, executing quantum algorithms of practical computational advantage requires further improvements in the fidelities of qubit operations, which are currently limited by the energy relaxation and dephasing times of the qubits. …”
Get full text
Article -
928
Demonstration of Grover’s algorithm for retrieving secret keys in a basic SPN block cipher
Published 2024-10-01“…This technique can be effectively applied on IBM quantum computers for large-scale SPN block ciphers, such as AES and GOST R.34.10.2015, which are widely used today. …”
Get full text
Article -
929
Optimal fidelity estimation for density matrix
Published 2024-12-01“…Abstract Fidelity estimation is a necessary tool for evaluating noise in quantum measurement and quantum computation. The traditional fidelity estimation is to calculate the distance between two density matrices by employing direct fidelity estimation, which consumes too much copies of state. …”
Get full text
Article -
930
Demonstration of Grover’s algorithm for retrieving secret keys in a basic SPN block cipher
Published 2024-10-01“…This technique can be effectively applied on IBM quantum computers for large-scale SPN block ciphers, such as AES and GOST R.34.10.2015, which are widely used today. …”
Get full text
Article -
931
Three-party password authenticated key agreement protocol with user anonymity based on lattice
Published 2018-02-01“…With the rapid development of quantum theory and the existence of polynomial algorithm in quantum computation based on discrete logarithm problem and large integer decomposition problem,the security of the algorithm was seriously threatened.Therefore,two authentication key agreement protocols were proposed rely on ring-learning-with-error (RLWE) assumption including lattice-based implicit authentication key agreement scheme and lattice-based explicit authentication key agreement scheme and proved its security.The implicit authentication key agreement protocol is less to communicate and faster to authentication,the explicit authentication key agreement protocol is more to secure.At the same time,bidirectional authentication of users and servers can resist unpredictable online dictionary attacks.The new protocol has higher efficiency and shorter key length than other password authentication key agreement protocols.It can resist quantum attacks.Therefore,the protocol is efficient,secure,and suitable for large-scale network communication.…”
Get full text
Article -
932
On the independence heuristic in the dual attack
Published 2025-07-01“…Post-quantum cryptography deals with the development and analysis of cryptographic schemes that are assumed to be secure even against attackers with access to a powerful quantum computer. Along the main candidates for quantum-safe solutions are cryptographic schemes, whose security is based on classic lattice problems such as the bounded-distance decoding (BDD) problem or the learning with error problem. …”
Get full text
Article -
933
A complexity transition in displaced Gaussian Boson sampling
Published 2025-07-01“…For purposes of demonstrating quantum computational advantage as well as practical applications, a large photon number is often desirable. …”
Get full text
Article -
934
Exploring ground states of Fermi-Hubbard model on honeycomb lattices with counterdiabaticity
Published 2024-11-01“…Abstract Exploring the ground state properties of many-body quantum systems conventionally involves adiabatic processes, alongside exact diagonalization, in the context of quantum annealing or adiabatic quantum computation. Shortcuts to adiabaticity by counter-diabatic driving serve to accelerate these processes by suppressing energy excitations. …”
Get full text
Article -
935
Observation of Optical Precursor in Time‐Energy‐Entangled W Triphotons
Published 2025-07-01“…Abstract In quantum communication and quantum computation, adding each entangled photon leads to an exponential increase in communication and computational capabilities. …”
Get full text
Article -
936
A coherent approach to quantum-classical optimization
Published 2025-05-01“…Abstract Hybrid quantum-classical optimization techniques, which incorporate the pre-optimization of Variational Quantum Algorithms using Tensor Networks, have been shown to allow for the reduction of quantum computational resources. In the particular case of large optimization problems, commonly found in real-world use cases, this strategy is almost mandatory to reduce the otherwise unfathomable execution costs and improve the quality of the results. …”
Get full text
Article -
937
Cryo-CMOS Bias-Voltage Generation and Demultiplexing at mK Temperatures for Large-Scale Arrays of Quantum Devices
Published 2025-01-01“…The rapidly growing number of qubits in semiconductor quantum computers requires a scalable control interface, including the efficient generation of dc bias voltages for gate electrodes. …”
Get full text
Article -
938
-
939
A SURVEY ON ZERO TRUST SECURITY – APPLICATIONS AND CHALLENGES
Published 2025-03-01“…The research suggests that Multifactor Authentication (MFA) can be of great advantage when coupled with zero trust security for authentication purposes. The rise of quantum computers and data centers calls for new security measures like zero trust security. …”
Get full text
Article -
940
Quantum many-body scarring in a non-Abelian lattice gauge theory
Published 2025-03-01“…Our findings bring QMBS to the realm of non-Abelian LGTs, highlighting the intimate connection between scarring and gauge symmetry, and are amenable for observation in a recently proposed trapped-ion qudit quantum computer.…”
Get full text
Article