Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article; zbMATH DE number 1030974 - MaRDI portal

scientific article; zbMATH DE number 1030974

From MaRDI portal
Publication:4343414

zbMath0876.94023MaRDI QIDQ4343414

Richard J. Lipton, Dan Boneh

Publication date: 6 July 1997


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (29)

New public key cryptosystems from combinatorial group theoryTesting the shift-equivalence of polynomials using quantum machinesSample complexity of hidden subgroup problemQuantum computation with classical light: the Deutsch algorithmTesting shift-equivalence of polynomials by deterministic, probabilistic and quantum machines.Mathematical etudes on quantum computationQuantum algorithms for typical hard problems: a perspective of cryptanalysisQuantum public-key signature scheme based on asymmetric quantum encryption with trapdoor informationIsogeny formulas for Jacobi intersection and twisted Hessian curvesElementary quantum gates between long-distance qubits mediated by a resonatorFull quantum equivalence of group action DLog and CDH, and moreEstimating the cost of generic quantum pre-image attacks on SHA-2 and SHA-3On the arithmetic of the endomorphisms ring \(\text{End}(\mathbb Z_p\times\mathbb Z_{p^2})\).A combinatorial approach to quantum random functionsOn the uselessness of quantum queriesComputational indistinguishability between quantum states and its cryptographic applicationQuantum algorithm design: techniques and applicationsKey exchange protocols over noncommutative rings. The case ofOn quantum algorithms for noncommutative hidden subgroupsQuantum Random Walks – New Method for Designing Quantum AlgorithmsQuantum deduction rulesQuantum computing: survey and analysisRecursive information transducers: Computation modelsThe hidden subgroup problem and MKTPQuantum model of computations: Underlying principles and achievementsLeveraging the hardness of dihedral coset problem for quantum cryptographyDeterministic algorithms for the hidden subgroup problemQuantum differential cryptanalysisOne complexity theorist's view of quantum computing




This page was built for publication: