Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article; zbMATH DE number 799789 - MaRDI portal

scientific article; zbMATH DE number 799789

From MaRDI portal
Publication:4847941

zbMath1005.11506MaRDI QIDQ4847941

Peter W. Shor

Publication date: 25 October 1995


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.


Lua error in Module:PublicationMSCList at line 37: attempt to index local 'msc_result' (a nil value).


Related Items (89)

Matrix Lie group as an algebraic structure for NTRU like cryptosystemFuzzy matching based on gray-scale difference for quantum imagesLimits on the Efficiency of (Ring) LWE Based Non-interactive Key ExchangeGroup ring based public key cryptosystemsCategorical quantum cryptography for access control in cloud computingSimulation of entanglement generation and variation in quantum computationEfficient and exact quantum compressionPhase condition for the Grover algorithmJoint remote state preparation of a single-atom qubit state via a GHZ entangled stateSecure multiparty computation in the bounded storage modelOn the higher-bit version of approximate inhomogeneous short integer solution problemOn tameness of Matsumoto-Imai central maps in three variables over the finite field \(\mathbb F_2\)Quantum physical symbol systemsArbitrated quantum signature scheme based on cluster statesThe status of polycyclic group-based cryptography: a survey and open problemsDeterministic joint remote preparation of an equatorial hybrid state via high-dimensional Einstein-Podolsky-Rosen pairs: active versus passive receiverHypothetical solution of the problem of measurement through the notion of quantum backward causalityEfficient Code Based Hybrid and Deterministic Encryptions in the Standard ModelAnalysis of optical parity gates of generating Bell state for quantum information and secure quantum communication via weak cross-Kerr nonlinearity under decoherence effectQuantum circuit realization of the bilinear interpolation method for GQIRRecent advances in room temperature single-photon emittersCryptanalysis of a multi-party quantum key agreement protocol with single particlesSimulation of three-spin evolution under \(XX\) Hamiltonian on quantum processor of IBM-quantum experienceCoherence and entanglement in Grover and Harrow-Hassidim-Lloyd algorithmOn the continuity of quantum correlation quantifiersJoint remote preparation of single-photon three-qubit state with hyperentangled state via linear-optical elementsResearch on key technologies of controlled bidirectional quantum teleportationImplementing Grover oracle for lightweight block ciphers under depth constraintsA novel quantum blockchain scheme base on quantum entanglement and DPoSExperimental pairwise entanglement estimation for an \(N\)-qubit system. A machine learning approach for programming quantum hardwareAutomatic design of quantum circuits. Generation of quantum teleportation protocolsEntanglement universality of TGX states in qubit-qutrit systemsQuantum blind signature scheme based on quantum walkSeparability of heterogeneous quantum systems using multipartite concurrence and tangleImage encryption algorithm based on discrete quantum Baker map and Chen hyperchaotic systemAn improved lower bound on query complexity for quantum PAC learningUnified quantum no-go theorems and transforming of quantum pure states in a restricted setA review on quantum search algorithmsOn the various ways of quantum implementation of the modular exponentiation function for Shor's factorizationVerifiable quantum \((k,n)\)-threshold secret key sharingHierarchical joint remote state preparation in noisy environmentProbabilistic nonunitary gate in imaginary time evolutionQuantum solution to a class of two-party private summation problemsScheme for directly measuring the concurrences of Collins-Gisin and Werner classes polarization entangled mixed statesAn efficient controlled quantum secure direct communication and authentication by using four particle cluster statesQuantum Monte Carlo simulationThe independence of reduced subgroup-stateSide Channels in the McEliece PKCQuantum Cryptography: Key Distribution and BeyondA Quantum Implementation Model for Artificial Neural NetworksQuantum Resistant Public Key Encryption Scheme polarRLCEComputation in finitary stochastic and quantum processesSecure two-party computation in a quantum worldCircuit QED: implementation of the three-qubit refined Deutsch-Jozsa quantum algorithmQuantum reservoir computing: a reservoir approach toward quantum machine learning on near-term quantum devicesQuantum computing as a particular case of computing with tensorsSimulation of general three-body interactions in a nuclear magnetic resonance ensemble quantum computerQuantum search algorithm for exceptional vertexes in regular graphs and its circuit implementationA quantum algorithm for a FULL adder operation based on registers of the CPU in a quantum-gated computerCryptanalysis of a key exchange protocol based on the ring \(E_p^{(m)}\)Discrete quantum Fourier transform using weak cross-Kerr nonlinearity and displacement operator and photon-number-resolving measurement under the decoherence effectQuantum conferenceShortcuts to adiabatic for implementing controlled-not gate with superconducting quantum interference device qubitsX states of the same spectrum and entanglement as all two-qubit statesMultipartite entanglement in Grover's search algorithmTechniques for Formal Modelling and Analysis of Quantum SystemsEfficient Implementation of Hybrid Encryption from Coding TheoryThe complexity of the quantum adiabatic algorithmImproved Zero-Knowledge Identification with LatticesOn the mathematics of quantum computersOptimized quantum circuit partitioningUnnamed ItemQuantum evolutionary algorithm with rotational gate and \(H_\epsilon\)-gate updating in real and integer domains for optimizationQuantum circuits for calculating the squared sum of the inner product of quantum states and its applicationLimits on the efficiency of (ring) LWE-based non-interactive key exchangeOn the classical complexity of sampling from quantum interference of indistinguishable bosonsOptical computingUnnamed ItemVariant of Niederreiter-based signature scheme for blockchain technologyQuantum algorithm for the root-finding problemMinimal-entanglement entanglement-assisted quantum error correction codes from modified circulant matricesFactorization of the tenth Fermat numberHow quantum is the speedup in adiabatic unstructured search?Quantum e-commerce: a comparative study of possible protocols for online shopping and other tasks related to e-commercePhotonic scheme of quantum phase estimation for quantum algorithms via quantum dotsEntanglement measures of a pentapartite W-class state in the noninertial frameMultipartite mixed maximally entangled states: mixed states with entanglement 1Lattice-Based SNARGs and Their Application to More Efficient ObfuscationImplementation of lattice trapdoors on modules and applications




This page was built for publication: