Showing 161 - 180 results of 486 for search 'quantum computing solutions', query time: 0.11s Refine Results
  1. 161
  2. 162

    Velocity gauge formulation of nonlinear optical response in Floquet quantum systems by S. Sajad Dabiri, Reza Asgari

    Published 2025-07-01
    “…Using the velocity gauge formalism, we develop a theoretical framework for computing the nonlinear optical responses of time-periodic quantum systems. …”
    Get full text
    Article
  3. 163

    Quantum Resistance Saber-Based Group Key Exchange Protocol for IoT by Fouzia Samiullah, Ming-Lee Gan, Sedat Akleylek, Y. Aun

    Published 2025-01-01
    “…Quantum computing poses a threat on current cryptography methods, prompting initiatives such as the U.S. …”
    Get full text
    Article
  4. 164

    Pulse‐Level Quantum Robust Control with Diffusion‐Based Reinforcement Learning by Yuanjing Zhang, Tao Shang, Chenyi Zhang, Xueyi Guo

    Published 2025-05-01
    “…This paper offers a promising solution to scalable, noise‐resilient quantum control in practical quantum computing applications.…”
    Get full text
    Article
  5. 165

    Improved Quantum Query Upper Bounds Based on Classical Decision Trees by Arjan Cornelissen, Nikhil S. Mande, Subhasree Patro

    Published 2025-06-01
    “…We provide a general construction based on the structure of the underlying decision tree, and prove that this can give us an up-to-quadratic quantum speed-up. In particular, we obtain a bounded-error quantum query algorithm of cost $O(\sqrt{s})$ to compute a Boolean function (more generally, a relation) that can be computed by a classical (even randomized) decision tree of size $s$. …”
    Get full text
    Article
  6. 166

    A Lightweight Variant of Falcon for Efficient Post-Quantum Digital Signature by Aigerim Kerimbayeva, Maksim Iavich, Yenlik Begimbayeva, Sergiy Gnatyuk, Sakhybay Tynymbayev, Zhanerke Temirbekova, Olga Ussatova

    Published 2025-07-01
    “…Conventional public-key cryptographic systems are increasingly threatened by advances in quantum computing, accelerating the need for robust post-quantum cryptographic solutions. …”
    Get full text
    Article
  7. 167
  8. 168

    Developing Quantum Trusted Platform Module (QTPM) to Advance IoT Security by Guobin Xu, Oluwole Adetifa, Jianzhou Mao, Eric Sakk, Shuangbao Wang

    Published 2025-04-01
    “…To address these challenges, we propose investigating a quantum-safe solution for IoT-trusted computing. Specifically, we implement the first lightweight, practical integration of a quantum random number generator (QRNG) with a software-based trusted platform module (TPM) to create a deployable quantum trusted platform module (QTPM) prototype for IoT systems to improve cryptographic capabilities. …”
    Get full text
    Article
  9. 169
  10. 170

    Migrating Software Systems Toward Post-Quantum Cryptography-A Systematic Literature Review by Christian Nather, Daniel Herzinger, Stefan-Lukas Gazdag, Jan-Philipp Steghofer, Simon Daum, Daniel Loebenberger

    Published 2024-01-01
    “…Networks such as the Internet are essential for our connected world. Quantum computing threatens its fundamental security mechanisms. …”
    Get full text
    Article
  11. 171

    TBA equations and quantum periods for D-type Argyres-Douglas theories by Katsushi Ito, Jingjing Yang

    Published 2025-01-01
    “…We study the variety of TBA systems across the Coulomb branch moduli space and find that they correspond to the Dynkin diagrams of D n Lie algebras in the minimal chamber, and reproduce the TBA equations for reflectionless D scattering theories at the maximally symmetric point. Numerical computations demonstrate that the quantum periods obtained from the Borel-Padé resummation and their WKB expansions are in agreement with the solutions of the TBA equations.…”
    Get full text
    Article
  12. 172

    Quantum key-based medical privacy protection and sharing scheme on blockchain by Dexin Zhu, Hu Zhou, Zhiqiang Zhou, Jianan Wu, Jian Zhao

    Published 2025-07-01
    “…Compared with existing solutions, our approach enhances key management security through quantum keys and improves communication resilience against attacks by leveraging chaotic systems. …”
    Get full text
    Article
  13. 173

    Post-Quantum Homomorphic Encryption: A Case for Code-Based Alternatives by Siddhartha Siddhiprada Bhoi, Arathi Arakala, Amy Beth Corman, Asha Rao

    Published 2025-05-01
    “…Since Shor’s algorithm rendered prime factorisation and discrete logarithm-based ciphers insecure with quantum computations, researchers have been working on building post-quantum homomorphic encryption (PQHE) algorithms. …”
    Get full text
    Article
  14. 174

    Cross‐cutting digital technologies as a tool to counteract sanctions restrictions by S.S. Krasnykh

    Published 2025-03-01
    “…The analysis of the possibilities of using artificial intelligence, machine learning, the Internet of things, electronic technologies, additive technologies and quantum computing as tools to counter sanctions restrictions shows the following feature – these information technologies have minimal potential for reducing restrictive measures. …”
    Get full text
    Article
  15. 175

    Lagrangian duality in quantum optimization: Overcoming QUBO limitations for constrained problems by Einar Gabbassov, Gili Rosenberg, Artur Scherer

    Published 2025-06-01
    “…We propose an approach to solving constrained combinatorial optimization problems based on embedding the concept of Lagrangian duality into the framework of adiabatic quantum computation. Within the setting of circuit-model fault-tolerant quantum computation, we demonstrate that this approach achieves a quadratic improvement in circuit depth and maintains a constraint-independent circuit width in contrast with the prevalent approach of solving constrained problems via reformulations based on the quadratic unconstrained binary optimization (QUBO) framework. …”
    Get full text
    Article
  16. 176

    Optimization Techniques on Quantum and Classical Systems: A Comprehensive Comparative Study by Shaik Hussain, Rajitha Morampudi, Priyamvada K., Bhargavi R. Naveena

    Published 2025-01-01
    “…This study compares Particle Swarm Optimization (PSO), Moth Flame Optimization (MFO), and Genetic Algorithm (GA) on three platforms : a local computer, a local computer with quantum integration, and an IBM quantum machine. …”
    Get full text
    Article
  17. 177
  18. 178
  19. 179
  20. 180

    Noisy intermediate-scale quantum simulation of the one-dimensional wave equation by Lewis Wright, Conor Mc Keever, Jeremy T. First, Rory Johnston, Jeremy Tillay, Skylar Chaney, Matthias Rosenkranz, Michael Lubasch

    Published 2024-11-01
    “…We design and implement quantum circuits for the simulation of the one-dimensional wave equation on the Quantinuum H1-1 quantum computer. …”
    Get full text
    Article