Quantum circuits with mixed states
STOC '98 Proceedings of the thirtieth annual ACM symposium on Theory of computing
Quantum vs. classical communication and computation
STOC '98 Proceedings of the thirtieth annual ACM symposium on Theory of computing
Quantum Fourier sampling simplified
STOC '99 Proceedings of the thirty-first annual ACM symposium on Theory of computing
Exponential separation of quantum and classical communication complexity
STOC '99 Proceedings of the thirty-first annual ACM symposium on Theory of computing
Factoring large numbers with programmable hardware
FPGA '00 Proceedings of the 2000 ACM/SIGDA eighth international symposium on Field programmable gate arrays
Parallelization, amplification, and exponential time simulation of quantum interactive proof systems
STOC '00 Proceedings of the thirty-second annual ACM symposium on Theory of computing
Normal subgroup reconstruction and quantum computation using group representations
STOC '00 Proceedings of the thirty-second annual ACM symposium on Theory of computing
Quantum lower bounds by quantum arguments
STOC '00 Proceedings of the thirty-second annual ACM symposium on Theory of computing
On quantum and probabilistic communication: Las Vegas and one-way protocols
STOC '00 Proceedings of the thirty-second annual ACM symposium on Theory of computing
Self-testing of universal and fault-tolerant sets of quantum gates
STOC '00 Proceedings of the thirty-second annual ACM symposium on Theory of computing
A proof of the security of quantum key distribution (extended abstract)
STOC '00 Proceedings of the thirty-second annual ACM symposium on Theory of computing
Discrete Logarithms: The Past and the Future
Designs, Codes and Cryptography - Special issue on towards a quarter-century of public key cryptography
An introduction to quantum computing for non-physicists
ACM Computing Surveys (CSUR)
Efficient quantum algorithms for some instances of the non-Abelian hidden subgroup problem
Proceedings of the thirteenth annual ACM symposium on Parallel algorithms and architectures
STOC '01 Proceedings of the thirty-third annual ACM symposium on Theory of computing
Quantum algorithms for solvable groups
STOC '01 Proceedings of the thirty-third annual ACM symposium on Theory of computing
Quantum mechanical algorithms for the nonabelian hidden subgroup problem
STOC '01 Proceedings of the thirty-third annual ACM symposium on Theory of computing
Quantum computers that can be simulated classically in polynomial time
STOC '01 Proceedings of the thirty-third annual ACM symposium on Theory of computing
A new protocol and lower bounds for quantum coin flipping
STOC '01 Proceedings of the thirty-third annual ACM symposium on Theory of computing
Counting by quantum eigenvalue estimation
Theoretical Computer Science
Quantum lower bounds by polynomials
Journal of the ACM (JACM)
Quantum lower bound for the collision problem
STOC '02 Proceedings of the thiry-fourth annual ACM symposium on Theory of computing
Polynomial-time quantum algorithms for Pell's equation and the principal ideal problem
STOC '02 Proceedings of the thiry-fourth annual ACM symposium on Theory of computing
Almost-everywhere superiority for Quantum polynomial time
Information and Computation
Computational complexity of uniform quantum circuit families and quantum Turing machines
Theoretical Computer Science
Minds and Machines
Some facets of complexity theory and cryptography: A five-lecture tutorial
ACM Computing Surveys (CSUR)
Minds and Machines
Quantum Algorithms for Highly Structured Search Problems
Quantum Information Processing
Why haven't more quantum algorithms been found?
Journal of the ACM (JACM)
Classical physics and the Church--Turing Thesis
Journal of the ACM (JACM)
Quantum Factoring, Discrete Logarithms, and the Hidden Subgroup Problem
Computing in Science and Engineering
The FFT: An Algorithm the Whole Family Can Use
Computing in Science and Engineering
Computational Complexity for Physicists
Computing in Science and Engineering
IEEE Computer Graphics and Applications
IEEE Intelligent Systems
Quantum Computing: The Final Frontier?
IEEE Intelligent Systems
Two-way finite automata with quantum and classical states
Theoretical Computer Science - Natural computing
Theoretical Computer Science
SODA '03 Proceedings of the fourteenth annual ACM-SIAM symposium on Discrete algorithms
Quantum algorithms for some hidden shift problems
SODA '03 Proceedings of the fourteenth annual ACM-SIAM symposium on Discrete algorithms
Fourier transforms and quantum computation
Theoretical aspects of computer science
On the Lower Bounds for One-Way Quantum Automata
MFCS '00 Proceedings of the 25th International Symposium on Mathematical Foundations of Computer Science
Finite Domain Constraint Satisfaction Using Quantum Computation
MFCS '02 Proceedings of the 27th International Symposium on Mathematical Foundations of Computer Science
Generalized Grover Search Algorithm for Arbitrary Initial Amplitude Distribution
QCQC '98 Selected papers from the First NASA International Conference on Quantum Computing and Quantum Communications
A Functional Cryptosystem Using a Group Action
ACISP '99 Proceedings of the 4th Australasian Conference on Information Security and Privacy
Using Fewer Qubits in Shor's Factorization Algorithm Via Simultaneous Diophantine Approximation
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
Quantum Complexities of Ordered Searching, Sorting, and Element Distinctness
ICALP '01 Proceedings of the 28th International Colloquium on Automata, Languages and Programming,
Separating Quantum and Classical Learning
ICALP '01 Proceedings of the 28th International Colloquium on Automata, Languages and Programming,
Time and Space Bounds for Reversible Simulation
ICALP '01 Proceedings of the 28th International Colloquium on Automata, Languages and Programming,
Quantum and Stochastic Branching Programs of Bounded Width
ICALP '02 Proceedings of the 29th International Colloquium on Automata, Languages and Programming
Pattern Recognition with Quantum Neural Networks
ICAPR '01 Proceedings of the Second International Conference on Advances in Pattern Recognition
A Quantum Polynomial Time Algorithm in Worst Case for Simon's Problem
ISAAC '98 Proceedings of the 9th International Symposium on Algorithms and Computation
Upper Bounds on the Size of One-Way Quantum Finite Automata
ICTCS '01 Proceedings of the 7th Italian Conference on Theoretical Computer Science
Quantum Algorithms for Intersection and Proximity Problems
ISAAC '01 Proceedings of the 12th International Symposium on Algorithms and Computation
Quantum Multi-prover Interactive Proof Systems with Limited Prior Entanglement
ISAAC '02 Proceedings of the 13th International Symposium on Algorithms and Computation
LATIN '02 Proceedings of the 5th Latin American Symposium on Theoretical Informatics
Average-Case Quantum Query Complexity
STACS '00 Proceedings of the 17th Annual Symposium on Theoretical Aspects of Computer Science
Improved Quantum Communication Complexity Bounds for Disjointness and Equality
STACS '02 Proceedings of the 19th Annual Symposium on Theoretical Aspects of Computer Science
A Quantum Goldreich-Levin Theorem with Cryptographic Applications
STACS '02 Proceedings of the 19th Annual Symposium on Theoretical Aspects of Computer Science
Some Parallel Algorithms for Integer Factorisation
Euro-Par '99 Proceedings of the 5th International Euro-Par Conference on Parallel Processing
Recent Progress and Prospects for Integer Factorisation Algorithms
COCOON '00 Proceedings of the 6th Annual International Conference on Computing and Combinatorics
Quantum Public-Key Cryptosystems
CRYPTO '00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
Oblivious Transfer in the Bounded Storage Model
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Software Geography: Physical and Economic Aspects
SOFSEM '01 Proceedings of the 28th Conference on Current Trends in Theory and Practice of Informatics Piestany: Theory and Practice of Informatics
Unconditionally Secure Digital Signature Schemes Admitting Transferability
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Efficient Oblivious Transfer in the Bounded-Storage Model
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
General-Purpose Parallel Simulator for Quantum Computing
UMC '02 Proceedings of the Third International Conference on Unconventional Models of Computation
The Quantum Computing Challenge
Informatics - 10 Years Back. 10 Years Ahead.
Fourier Transforms and Quantum Computation
Theoretical Aspects of Computer Science, Advanced Lectures [First Summer School on Theoretical Aspects of Computer Science, Tehran, Iran, July 2000]
Qubit Logic, Algebra and Geometry
ADG '00 Revised Papers from the Third International Workshop on Automated Deduction in Geometry
FCT '01 Proceedings of the 13th International Symposium on Fundamentals of Computation Theory
On Computational Power of Quantum Branching Programs
FCT '01 Proceedings of the 13th International Symposium on Fundamentals of Computation Theory
CLARISSE: A Machine Learning Tool to Initialize Student Models
ITS '02 Proceedings of the 6th International Conference on Intelligent Tutoring Systems
Semantically Secure McEliece Public-Key Cryptosystems-Conversions for McEliece PKC
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
PKC '02 Proceedings of the 5th International Workshop on Practice and Theory in Public Key Cryptosystems: Public Key Cryptography
PKC '02 Proceedings of the 5th International Workshop on Practice and Theory in Public Key Cryptosystems: Public Key Cryptography
Introduction to Recent Quantum Algorithms
MFCS '01 Proceedings of the 26th International Symposium on Mathematical Foundations of Computer Science
On Quantum Versions of the Yao Principle
STACS '02 Proceedings of the 19th Annual Symposium on Theoretical Aspects of Computer Science
PSPACE has constant-round quantum interactive proof systems
Theoretical Computer Science - Algorithms,automata, complexity and games
One complexity theorist's view of quantum computing
Theoretical Computer Science - Algorithms,automata, complexity and games
Quantum lower bounds by quantum arguments
Journal of Computer and System Sciences - Special issue on STOC 2000
Hidden translation and orbit coset in quantum computing
Proceedings of the thirty-fifth annual ACM symposium on Theory of computing
Adiabatic quantum state generation and statistical zero knowledge
Proceedings of the thirty-fifth annual ACM symposium on Theory of computing
Exponential algorithmic speedup by a quantum walk
Proceedings of the thirty-fifth annual ACM symposium on Theory of computing
PSPACE Has Constant-Round Quantum Interactive Proof Systems
FOCS '99 Proceedings of the 40th Annual Symposium on Foundations of Computer Science
On Quantum and Classical Space-Bounded Processes with Algebraic Transition Amplitudes
FOCS '99 Proceedings of the 40th Annual Symposium on Foundations of Computer Science
FOCS '99 Proceedings of the 40th Annual Symposium on Foundations of Computer Science
Quantum multi-prover interactive proof systems with limited prior entanglement
Journal of Computer and System Sciences
Building quantum wires: the long and the short of it
Proceedings of the 30th annual international symposium on Computer architecture
Modeling quantum computing in Haskell
Haskell '03 Proceedings of the 2003 ACM SIGPLAN workshop on Haskell
A Computational Model for Quantum Measurement
Quantum Information Processing
A quantum algorithm using NMR computers to break secret-key cryptosystems
New Generation Computing - Quantum computing
Splitting information securely with entanglement
Information and Computation
High-Performance QuIDD-Based Simulation of Quantum Circuits
Proceedings of the conference on Design, automation and test in Europe - Volume 2
Datapath and control for quantum wires
ACM Transactions on Architecture and Code Optimization (TACO)
Improving Gate-Level Simulation of Quantum Circuits
Quantum Information Processing
Generic quantum Fourier transforms
SODA '04 Proceedings of the fifteenth annual ACM-SIAM symposium on Discrete algorithms
The power of basis selection in fourier sampling: hidden subgroup problems in affine groups
SODA '04 Proceedings of the fifteenth annual ACM-SIAM symposium on Discrete algorithms
A new protocol and lower bounds for quantum coin flipping
Journal of Computer and System Sciences - STOC 2001
ACM SIGACT News
Multilinear formulas and skepticism of quantum computing
STOC '04 Proceedings of the thirty-sixth annual ACM symposium on Theory of computing
Exponential separation of quantum and classical one-way communication complexity
STOC '04 Proceedings of the thirty-sixth annual ACM symposium on Theory of computing
Quantum lower bounds for the collision and the element distinctness problems
Journal of the ACM (JACM)
IBM Journal of Research and Development
The quantum query complexity of the hidden subgroup problem is polynomial
Information Processing Letters - Devoted to the rapid publication of short contributions to information processing
Quantum computing without entanglement
Theoretical Computer Science
The query complexity of order-finding
Information and Computation
Processing issues in top-down approaches to quantum computer development in Silicon
Microelectronic Engineering - Proceedings of the 29th international conference on micro and nano engineering
Simulation and verification II: simulating quantum computing: quantum express
Proceedings of the 35th conference on Winter simulation: driving innovation
A lower bound on the quantum query complexity of read-once functions
Journal of Computer and System Sciences
Quantum networks: from quantum cryptography to quantum architecture
ACM SIGCOMM Computer Communication Review
New lattice-based cryptographic constructions
Journal of the ACM (JACM)
Deterministic polynomial-time quantum algorithms for Simon's problem
Computational Complexity
Guest Column: NP-complete problems and physical reality
ACM SIGACT News
Proceedings of the thirty-seventh annual ACM symposium on Theory of computing
Tensor norms and the classical communication complexity of nonlocal quantum measurement
Proceedings of the thirty-seventh annual ACM symposium on Theory of computing
Fast quantum algorithms for computing the unit group and class group of a number field
Proceedings of the thirty-seventh annual ACM symposium on Theory of computing
Polynomial time quantum algorithm for the computation of the unit group of a number field
Proceedings of the thirty-seventh annual ACM symposium on Theory of computing
Time, space, and energy in reversible computing
Proceedings of the 2nd conference on Computing frontiers
Classical and Quantum Complexity of the Sturm--Liouville Eigenvalue Problem
Quantum Information Processing
Evolution of a human-competitive quantum fourier transform algorithm using genetic programming
GECCO '05 Proceedings of the 7th annual conference on Genetic and evolutionary computation
ACM Transactions on Algorithms (TALG)
Quantum branching programs and space-bounded nonuniform quantum complexity
Theoretical Computer Science
On Halting Process of Quantum Turing Machine
Open Systems & Information Dynamics
Designs, Codes and Cryptography
Quantum and classical complexity classes: separations, collapses, and closure properties
Information and Computation
The Symmetric Group Defies Strong Fourier Sampling
FOCS '05 Proceedings of the 46th Annual IEEE Symposium on Foundations of Computer Science
On quantum versions of record-breaking algorithms for SAT
ACM SIGACT News
Human-Competitive Evolution of Quantum Computing Artefacts by Genetic Programming
Evolutionary Computation
Gate-level simulation of quantum circuits
ASP-DAC '03 Proceedings of the 2003 Asia and South Pacific Design Automation Conference
Synthesis of quantum logic circuits
Proceedings of the 2005 Asia and South Pacific Design Automation Conference
Universal test for quantum one-way permutations
Theoretical Computer Science - Mathematical foundations of computer science 2004
Architectural implications of quantum computing technologies
ACM Journal on Emerging Technologies in Computing Systems (JETC)
On the computational power of probabilistic and quantum branching program
Information and Computation
On the Complexity of Searching for a Maximum of a Function on a Quantum Computer
Quantum Information Processing
A randomized stochastic optimization algorithm: Its estimation accuracy
Automation and Remote Control
Zero-knowledge against quantum attacks
Proceedings of the thirty-eighth annual ACM symposium on Theory of computing
A polynomial quantum algorithm for approximating the Jones polynomial
Proceedings of the thirty-eighth annual ACM symposium on Theory of computing
Limitations of quantum coset states for graph isomorphism
Proceedings of the thirty-eighth annual ACM symposium on Theory of computing
The Quantum Setting with Randomized Queries for Continuous Problems
Quantum Information Processing
Proceedings of the 2006 ACM symposium on Applied computing
An introduction to quantum cryptography
Crossroads
Polynomial degree vs. quantum query complexity
Journal of Computer and System Sciences - Special issue on FOCS 2003
Information and Computation
On the security of stepwise triangular systems
Designs, Codes and Cryptography
Extended methodology of RS design and instances based on GIP
Journal of Computer Science and Technology
Some formal tools for analyzing quantum automata
Theoretical Computer Science - In honour of Professor Christian Choffrut on the occasion of his 60th birthday
On computing ordN(2) and its application
Information and Computation
Revisiting a limit on efficient quantum computation
Proceedings of the 44th annual Southeast regional conference
Proceedings of the 44th annual Southeast regional conference
Scaling and Better Approximating Quantum Fourier Transform by Higher Radices
IEEE Transactions on Computers
On the power of Ambainis lower bounds
Theoretical Computer Science
Uniformity of quantum circuit families for error-free algorithms
Theoretical Computer Science
Generic quantum Fourier transforms
ACM Transactions on Algorithms (TALG)
Polynomial-time quantum algorithms for Pell's equation and the principal ideal problem
Journal of the ACM (JACM)
Quantum Information Processing
Quantum protocols for untrusted computations
Journal of Discrete Algorithms
Quantum Patterns and Types for Entanglement and Separability
Electronic Notes in Theoretical Computer Science (ENTCS)
Unconditionally secure ring authentication
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
The Sturm-Liouville Eigenvalue Problem and NP-Complete Problems in the Quantum Setting with Queries
Quantum Information Processing
Supercomputing applications to the numerical modeling of industrial and applied mathematics problems
The Journal of Supercomputing
Quantum cryptography: A survey
ACM Computing Surveys (CSUR)
Secure communications with an asymptotic secrecy model
Knowledge-Based Systems
The quantum query complexity of the abelian hidden subgroup problem
Theoretical Computer Science
Efficient and exact quantum compression
Information and Computation
Proceedings of the 34th annual international symposium on Computer architecture
Proceedings of the thirty-ninth annual ACM symposium on Theory of computing
Negative weights make adversaries stronger
Proceedings of the thirty-ninth annual ACM symposium on Theory of computing
One-more matching conjugate problem and security of braid-based signatures
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
ACM SIGACT News
Proceedings of the 24th international conference on Machine learning
Quantum period reconstruction of approximate sequences
Information Processing Letters
Proceedings of the 44th annual Design Automation Conference
Quantum algorithms for Simon's problem over general groups
SODA '07 Proceedings of the eighteenth annual ACM-SIAM symposium on Discrete algorithms
Quantum algorithm for a generalized hidden shift problem
SODA '07 Proceedings of the eighteenth annual ACM-SIAM symposium on Discrete algorithms
Checking equivalence of quantum circuits and states
Proceedings of the 2007 IEEE/ACM international conference on Computer-aided design
Quantum certificate complexity
Journal of Computer and System Sciences
Decoherence in quantum walks – a review
Mathematical Structures in Computer Science
Optimal computation with non-unitary quantum walks
Theoretical Computer Science
Interval-valued computations and their connection with PSPACE
Theoretical Computer Science
The problem of robot random motion tracking learning algorithms
ISPRA'07 Proceedings of the 6th WSEAS International Conference on Signal Processing, Robotics and Automation
The problem of robot random motion tracking learning algorithms
ISPRA'07 Proceedings of the 6th WSEAS International Conference on Signal Processing, Robotics and Automation
Proceedings of the 2008 Asia and South Pacific Design Automation Conference
Quantum inductive inference by finite automata
Theoretical Computer Science
Circuit development using biological components: Principles, models and experimental feasibility
Analog Integrated Circuits and Signal Processing
Microcoded Architectures for Ion-Tap Quantum Computers
ISCA '08 Proceedings of the 35th Annual International Symposium on Computer Architecture
Quantum Data and Control Made Easier
Electronic Notes in Theoretical Computer Science (ENTCS)
Quantum computing: beyond the limits of conventional computation
International Journal of Parallel, Emergent and Distributed Systems - Emergent Computation
Determining the equivalence for one-way quantum finite automata
Theoretical Computer Science
Can quantum mechanics help distributed computing?
ACM SIGACT News
A one-time signature using run-length encoding
Information Processing Letters
New Digital Signature Scheme in Gaussian Monoid
Informatica
From Logic to Physics: How the Meaning of Computation Changed over Time
CiE '07 Proceedings of the 3rd conference on Computability in Europe: Computation and Logic in the Real World
Cryptanalysis of the TRMC-4 Public Key Cryptosystem
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
Energy Dissipation Effect on a Quantum Neural Network
Neural Information Processing
A New Construction of Multivariate Public Key Encryption Scheme through Internally Perturbed Plus
ICCSA '08 Proceedings of the international conference on Computational Science and Its Applications, Part II
Linear-algebraic λ-calculus: higher-order, encodings, and confluence.
RTA '08 Proceedings of the 19th international conference on Rewriting Techniques and Applications
Proceedings of the 9th AISC international conference, the 15th Calculemas symposium, and the 7th international MKM conference on Intelligent Computer Mathematics
A Framework for Efficient and Composable Oblivious Transfer
CRYPTO 2008 Proceedings of the 28th Annual conference on Cryptology: Advances in Cryptology
Decision Support Systems
Quantum Information Processing
Side Channels in the McEliece PKC
PQCrypto '08 Proceedings of the 2nd International Workshop on Post-Quantum Cryptography
Classical and Quantum Algorithms for Exponential Congruences
Theory of Quantum Computation, Communication, and Cryptography
On the Design and Optimization of a Quantum Polynomial-Time Attack on Elliptic Curve Cryptography
Theory of Quantum Computation, Communication, and Cryptography
Counting Method for Multi-party Computation over Non-abelian Groups
CANS '08 Proceedings of the 7th International Conference on Cryptology and Network Security
Graph Edit Distance without Correspondence from Continuous-Time Quantum Walks
SSPR & SPR '08 Proceedings of the 2008 Joint IAPR International Workshop on Structural, Syntactic, and Statistical Pattern Recognition
Graph Design for Secure Multiparty Computation over Non-Abelian Groups
ASIACRYPT '08 Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Graph matching using the interference of continuous-time quantum walks
Pattern Recognition
Quantum Information Processing
Self-protected quantum algorithms based on quantum state tomography
Quantum Information Processing
An Efficient Quantum Algorithm for the Hidden Subgroup Problem over Weyl-Heisenberg Groups
Mathematical Methods in Computer Science
Perfectly reliable and secure message transmission tolerating mobile adversary
International Journal of Applied Cryptography
New NP-Complete Problems Associated with Lattices
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Schmidt Decomposition for Quantum Entanglement in Quantum Algorithms
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Making Cryptographic Primitives Harder
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
A Digital Signature Scheme Based on NP-Complete Lattice Problems
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
A Symbolic Classical Computer Language for Simulation of Quantum Algorithms
QI '09 Proceedings of the 3rd International Symposium on Quantum Interaction
Graph matching using the interference of discrete-time quantum walks
Image and Vision Computing
Polynomial-time theory of matrix groups
Proceedings of the forty-first annual ACM symposium on Theory of computing
Quantum algorithms using the curvelet transform
Proceedings of the forty-first annual ACM symposium on Theory of computing
Efficient discrete-time simulations of continuous-time quantum query algorithms
Proceedings of the forty-first annual ACM symposium on Theory of computing
Security Analysis of Multivariate Polynomials for Hashing
Information Security and Cryptology
Solving the subset-sum problem with a light-based device
Natural Computing: an international journal
Natural Computing: an international journal
Note: A note on quantum sequential machines
Theoretical Computer Science
Coined quantum walks lift the cospectrality of graphs and trees
Pattern Recognition
Quantum Testers for Hidden Group Properties
Fundamenta Informaticae - Machines, Computations and Universality, Part II
Unconditionally Secure Blind Authentication Codes: The Model, Constructions, and Links to Commitment
Formal to Practical Security
The status of the P versus NP problem
Communications of the ACM - The Status of the P versus NP Problem
Hierarchy and equivalence of multi-letter quantum finite automata
Theoretical Computer Science
Interactions between computer algebra (Gröbner bases) and cryptology
Proceedings of the 2009 international symposium on Symbolic and algebraic computation
Claw finding algorithms using quantum walk
Theoretical Computer Science
Quantum algorithms for Simon's problem over nonabelian groups
ACM Transactions on Algorithms (TALG)
Graphical reasoning in compact closed categories for quantum computation
Annals of Mathematics and Artificial Intelligence
A Mathematica Package for Simulation of Quantum Computation
CASC '09 Proceedings of the 11th International Workshop on Computer Algebra in Scientific Computing
Computing a Solution for the Subset Sum Problem with a Light Based Device
OSC '09 Proceedings of the 2nd International Workshop on Optical SuperComputing
Cryptanalysis of the Square Cryptosystems
ASIACRYPT '09 Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Fiat-Shamir with Aborts: Applications to Lattice and Factoring-Based Signatures
ASIACRYPT '09 Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Cryptanalysis of a Multivariate Public Key Encryption Scheme with Internal Perturbation Structure
Information Security Applications
Breaking the Model: Finalisation and a Taxonomy of Security Attacks
Electronic Notes in Theoretical Computer Science (ENTCS)
Quantum and classical complexity classes: Separations, collapses, and closure properties
Information and Computation
On the computational power of probabilistic and quantum branching program
Information and Computation
Information and Computation
Quantum computing and abstract state machines
ASM'03 Proceedings of the abstract state machines 10th international conference on Advances in theory and practice
Experimental quantum computation with molecules
DLT'02 Proceedings of the 6th international conference on Developments in language theory
Quantum physical synthesis: Improving physical design by netlist modifications
Microelectronics Journal
Security aspects of practical quantum cryptography
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
When stream cipher analysis meets public-key cryptography
SAC'06 Proceedings of the 13th international conference on Selected areas in cryptography
Quantum sampling for balanced allocations
COCOON'03 Proceedings of the 9th annual international conference on Computing and combinatorics
Quantum computing: 1-way quantum automata
DLT'03 Proceedings of the 7th international conference on Developments in language theory
l-invertible cycles for multivariate quadratic (MQ) public key cryptography
PKC'07 Proceedings of the 10th international conference on Practice and theory in public-key cryptography
An efficient quantum algorithm for the hidden subgroup problem in extraspecial groups
STACS'07 Proceedings of the 24th annual conference on Theoretical aspects of computer science
Weak Fourier-Schur sampling, the hidden subgroup problem, and the quantum collision problem
STACS'07 Proceedings of the 24th annual conference on Theoretical aspects of computer science
On quantum algorithms for noncommutative hidden subgroups
STACS'99 Proceedings of the 16th annual conference on Theoretical aspects of computer science
Probabilities to accept languages by quantum finite automata
COCOON'99 Proceedings of the 5th annual international conference on Computing and combinatorics
Cryptanalysis of the public-key encryption based on braid groups
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Quantum adiabatic evolution algorithm for a quantum neural network
ICANN/ICONIP'03 Proceedings of the 2003 joint international conference on Artificial neural networks and neural information processing
TCHo: a hardware-oriented trapdoor cipher
ACISP'07 Proceedings of the 12th Australasian conference on Information security and privacy
Graph similarity using interfering quantum walks
CAIP'07 Proceedings of the 12th international conference on Computer analysis of images and patterns
On secure multi-party computation in black-box groups
CRYPTO'07 Proceedings of the 27th annual international cryptology conference on Advances in cryptology
Transitive signatures from braid groups
INDOCRYPT'07 Proceedings of the cryptology 8th international conference on Progress in cryptology
High precision quantum query algorithm for computing AND-based boolean functions
Proceedings of the 7th ACM international conference on Computing frontiers
Cryptanalysis of the TRMS signature scheme of PKC'05
AFRICACRYPT'08 Proceedings of the Cryptology in Africa 1st international conference on Progress in cryptology
An efficient quantum algorithm for the hidden subgroup problem in nil-2 groups
LATIN'08 Proceedings of the 8th Latin American conference on Theoretical informatics
Total break of the l-IC signature scheme
PKC'08 Proceedings of the Practice and theory in public key cryptography, 11th international conference on Public key cryptography
Lattice-based identification schemes secure under active attacks
PKC'08 Proceedings of the Practice and theory in public key cryptography, 11th international conference on Public key cryptography
Basing weak public-key cryptography on strong one-way functions
TCC'08 Proceedings of the 5th conference on Theory of cryptography
BQP and the polynomial hierarchy
Proceedings of the forty-second ACM symposium on Theory of computing
What can be observed locally? round-based models for quantum distributed computing
DISC'09 Proceedings of the 23rd international conference on Distributed computing
Application of bio-inspired algorithm to the problem of integer factorisation
International Journal of Bio-Inspired Computation
Quantum coin-flipping-based authentication
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
What did qubits ever do for me: an answer for CS2 students
Proceedings of the fifteenth annual conference on Innovation and technology in computer science education
The geometry of quantum learning
Quantum Information Processing
On zeros of exponential polynomials and quantum algorithms
Quantum Information Processing
Algorithms on ensemble quantum computers
Natural Computing: an international journal
Trace monoids with idempotent generators and measure-only quantum automata
Natural Computing: an international journal
Exploiting multiple-antenna diversity for shared secret key generation in wireless networks
INFOCOM'10 Proceedings of the 29th conference on Information communications
Fast equivalence-checking for quantum circuits
Proceedings of the 2010 IEEE/ACM International Symposium on Nanoscale Architectures
Synthesis of the optimal 4-bit reversible circuits
Proceedings of the 47th Design Automation Conference
On quantum information and the protection by quantum codes
Proceedings of the 11th International Conference on Computer Systems and Technologies and Workshop for PhD Students in Computing on International Conference on Computer Systems and Technologies
Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research
Limitations of quantum coset states for graph isomorphism
Journal of the ACM (JACM)
Quantum algorithms for highly non-linear Boolean functions
SODA '10 Proceedings of the twenty-first annual ACM-SIAM symposium on Discrete Algorithms
Algorithms for ray class groups and Hilbert class fields
SODA '10 Proceedings of the twenty-first annual ACM-SIAM symposium on Discrete Algorithms
Post-quantum cryptography: code-based signatures
AST/UCMA/ISA/ACN'10 Proceedings of the 2010 international conference on Advances in computer science and information technology
Measurement-based and universal blind quantum computation
SFM'10 Proceedings of the Formal methods for quantitative aspects of programming languages, and 10th international conference on School on formal methods for the design of computer, communication and software systems
Code-based public-key cryptosystems and their applications
ICITS'09 Proceedings of the 4th international conference on Information theoretic security
Toward basing fully homomorphic encryption on worst-case hardness
CRYPTO'10 Proceedings of the 30th annual conference on Advances in cryptology
Disentanglement and decoherence from classical non-Markovian noise: random telegraph noise
Quantum Information Processing
Enhancement of Multispectral Ikonos Satellite Image Using Quantum Information Processing
Fundamenta Informaticae
A timing attack against patterson algorithm in the McEliece PKC
ICISC'09 Proceedings of the 12th international conference on Information security and cryptology
Quantum query algorithms for conjunctions
UC'10 Proceedings of the 9th international conference on Unconventional computation
A new hard problem over non-commutative finite groups for cryptographic protocols
MMM-ACNS'10 Proceedings of the 5th international conference on Mathematical methods, models and architectures for computer network security
Generic constructions for verifiably encrypted signatures without random oracles or NIZKs
ACNS'10 Proceedings of the 8th international conference on Applied cryptography and network security
Prototype of a quantum cryptography system for the end user
ACS'09 Proceedings of the 9th WSEAS international conference on Applied computer science
Information sharing using entangled states and its applications to quantum card tricks
Decision Support Systems
Scalar System F for Linear-Algebraic λ-Calculus: Towards a Quantum Physical Logic
Electronic Notes in Theoretical Computer Science (ENTCS)
The polynomial degree of recursive Fourier sampling
TQC'10 Proceedings of the 5th conference on Theory of quantum computation, communication, and cryptography
SIMPL systems, or: can we design cryptographic hardware without secret key information?
SOFSEM'11 Proceedings of the 37th international conference on Current trends in theory and practice of computer science
Complexity classes of equivalence problems revisited
Information and Computation
On the Impossibility of a Quantum Sieve Algorithm for Graph Isomorphism
SIAM Journal on Computing
Quantum Computation and the Evaluation of Tensor Networks
SIAM Journal on Computing
Auxiliary qubit selection: a physical synthesis technique for quantum circuits
Quantum Information Processing
Linear recurring sequences for the UOV key generation
PKC'11 Proceedings of the 14th international conference on Practice and theory in public key cryptography conference on Public key cryptography
Solving the generalized Subset Sum problem with a light based device
Natural Computing: an international journal
The search for structure in quantum computation
FOSSACS'11/ETAPS'11 Proceedings of the 14th international conference on Foundations of software science and computational structures: part of the joint European conferences on theory and practice of software
The computational complexity of linear optics
Proceedings of the forty-third annual ACM symposium on Theory of computing
Fast parallel DNA-based algorithms for molecular computation: discrete logarithm
The Journal of Supercomputing
On the Effect of Quantum Interaction Distance on Quantum Addition Circuits
ACM Journal on Emerging Technologies in Computing Systems (JETC)
Study on discrete adiabatic quantum computation in 3-SAT problems
Artificial Life and Robotics
Kipnis-shamir attack on unbalanced oil-vinegar scheme
ISPEC'11 Proceedings of the 7th international conference on Information security practice and experience
Decomposing finite Abelian groups
Quantum Information & Computation
Upper bounds on the noise threshold for fault-tolerant quantum computing
Quantum Information & Computation
Limitations of passive protection of quantum information
Quantum Information & Computation
Block-based quantum-logic synthesis
Quantum Information & Computation
Security of a kind of quantum secret sharing with single photons
Quantum Information & Computation
Counting, fanout and the complexity of quantum ACC
Quantum Information & Computation
The role of symmetries in adiabatic quantum algorithms
Quantum Information & Computation
Fast equivalence-checking for quantum circuits
Quantum Information & Computation
Quantum lower bound for recursive Fourier sampling
Quantum Information & Computation
Circuit for Shor's algorithm using 2n+3 qubits
Quantum Information & Computation
Quantum solution to the hidden subgroup problem for poly-near-hamiltonian groups
Quantum Information & Computation
Quantum computing and polynomial equations over the finite field Z2
Quantum Information & Computation
Graph-based simulation of quantum computation in the density matrix representation
Quantum Information & Computation
Secure assisted quantum computation
Quantum Information & Computation
Physically-motivated dynamical algorithms for the graph isomorphism problem
Quantum Information & Computation
Quantum lower bounds for fanout
Quantum Information & Computation
Quantum Information & Computation
Universal quantum computation with shutter logic
Quantum Information & Computation
Quantum advantage without entanglement
Quantum Information & Computation
Entanglement and its role in Shor's algorithm
Quantum Information & Computation
Hidden symmetry detection on a quantum computer
Quantum Information & Computation
Convex hulls of varieties and entanglement measures based on the roof construction
Quantum Information & Computation
Universal quantum circuit for N-qubit quantum gate: a programmable quantum gate
Quantum Information & Computation
Quantum computation from a quantum logical perspective
Quantum Information & Computation
Quantum algorithm design using dynamic learning
Quantum Information & Computation
Entanglement purification with two-way classical communication
Quantum Information & Computation
Universal fault tolerant quantum computation on bilinear nearest neighbor arrays
Quantum Information & Computation
Quantum measurements for hidden subgroup problems with optimal sample complexity
Quantum Information & Computation
Efficient quantum algorithm for identifying hidden polynomials
Quantum Information & Computation
Graph embedding using a quasi-quantum analogue of the hitting times of continuous time quantum walks
Quantum Information & Computation
Quantum communication complexity of block-composed functions
Quantum Information & Computation
Quantum algorithms for shifted subset problems
Quantum Information & Computation
An O(m2)-depth quantum algorithm for the elliptic curve discrete logarithm problem over GF(2m)a
Quantum Information & Computation
On the quantum hardness of solving isomorphism problems as nonabelian hidden shift problems
Quantum Information & Computation
Sharp probability estimates for Shor's order-finding algorithm
Quantum Information & Computation
Efficient quantum algorithms for the hidden subgroup problem over semi-direct product groups
Quantum Information & Computation
On solving systems of random linear disequations
Quantum Information & Computation
The geometry of quantum computation
Quantum Information & Computation
Solid-state crystal lattice NMR quantum computation
Quantum Information & Computation
Measuring 4-local qubit observables could probabilistically solve PSPACE
Quantum Information & Computation
The equivalence of sampling and searching
CSR'11 Proceedings of the 6th international conference on Computer science: theory and applications
Finite groups and complexity theory: from leningrad to saint petersburg via las vegas
CSR'11 Proceedings of the 6th international conference on Computer science: theory and applications
An algorithm for computing a basis of a finite abelian group
CAI'11 Proceedings of the 4th international conference on Algebraic informatics
ACNS'11 Proceedings of the 9th international conference on Applied cryptography and network security
Quantum commitments from complexity assumptions
ICALP'11 Proceedings of the 38th international colloquim conference on Automata, languages and programming - Volume Part I
New constructions of public-key encryption schemes from conjugacy search problems
Inscrypt'10 Proceedings of the 6th international conference on Information security and cryptology
Inscrypt'10 Proceedings of the 6th international conference on Information security and cryptology
Classical cryptographic protocols in a quantum world
CRYPTO'11 Proceedings of the 31st annual conference on Advances in cryptology
McEliece and niederreiter cryptosystems that resist quantum fourier sampling attacks
CRYPTO'11 Proceedings of the 31st annual conference on Advances in cryptology
Periodicity and cyclic shifts via linear sketches
APPROX'11/RANDOM'11 Proceedings of the 14th international workshop and 15th international conference on Approximation, randomization, and combinatorial optimization: algorithms and techniques
Problems of Information Transmission
Small public keys and fast verification for multivariate quadratic public key systems
CHES'11 Proceedings of the 13th international conference on Cryptographic hardware and embedded systems
Journal of the ACM (JACM)
MIRAGE'11 Proceedings of the 5th international conference on Computer vision/computer graphics collaboration techniques
Frontiers of information technology
IBM Journal of Research and Development
Integer Programming Subject to Monomial Constraints
SIAM Journal on Optimization
An efficient provable distinguisher for HFE
ICALP'06 Proceedings of the 33rd international conference on Automata, Languages and Programming - Volume Part II
Quantum period reconstruction of binary sequences
AAECC'06 Proceedings of the 16th international conference on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
Improved simulation of quantum random walks
ISCIS'05 Proceedings of the 20th international conference on Computer and Information Sciences
A quantum lower bound for the query complexity of simon's problem
ICALP'05 Proceedings of the 32nd international conference on Automata, Languages and Programming
Characterizations of one-way general quantum finite automata
Theoretical Computer Science
Zero-knowledge proof of generalized compact knapsacks (or a novel identification/signature scheme)
ATC'06 Proceedings of the Third international conference on Autonomic and Trusted Computing
Quantum noisy rational function reconstruction
COCOON'05 Proceedings of the 11th annual international conference on Computing and Combinatorics
Optimality proofs of quantum weight decision algorithms
Quantum Information Processing
The complexity of black-box ring problems
COCOON'06 Proceedings of the 12th annual international conference on Computing and Combinatorics
Public-key cryptographic primitives provably as secure as subset sum
TCC'10 Proceedings of the 7th international conference on Theory of Cryptography
Large superfluous keys in multivariate quadratic asymmetric systems
PKC'05 Proceedings of the 8th international conference on Theory and Practice in Public Key Cryptography
Reflections for quantum query algorithms
Proceedings of the twenty-second annual ACM-SIAM symposium on Discrete Algorithms
Parallelising matrix operations on clusters for an optimal control-based quantum compiler
Euro-Par'06 Proceedings of the 12th international conference on Parallel Processing
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
A study of the security of unbalanced oil and vinegar signature schemes
CT-RSA'05 Proceedings of the 2005 international conference on Topics in Cryptology
Exact quantum algorithms for the leader election problem
STACS'05 Proceedings of the 22nd annual conference on Theoretical Aspects of Computer Science
Exact Quantum Algorithms for the Leader Election Problem
ACM Transactions on Computation Theory (TOCT)
Different approaches to proof systems
TAMC'10 Proceedings of the 7th annual conference on Theory and Applications of Models of Computation
Computational indistinguishability between quantum states and its cryptographic application
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
One-time proxy signature based on quantum cryptography
Quantum Information Processing
A public key cryptosystem based on three new provable problems
Theoretical Computer Science
CRYPTO'06 Proceedings of the 26th annual international conference on Advances in Cryptology
Information-theoretically secure key-insulated multireceiver authentication codes
AFRICACRYPT'10 Proceedings of the Third international conference on Cryptology in Africa
Cryptanalysis of two quartic encryption schemes and one improved MFE scheme
PQCrypto'10 Proceedings of the Third international conference on Post-Quantum Cryptography
PQCrypto'10 Proceedings of the Third international conference on Post-Quantum Cryptography
A timing attack against the secret permutation in the mceliece PKC
PQCrypto'10 Proceedings of the Third international conference on Post-Quantum Cryptography
Unconditionally secure electronic voting
Towards Trustworthy Elections
Breaking a new instance of TTM cryptosystems
ACNS'06 Proceedings of the 4th international conference on Applied Cryptography and Network Security
Machine learning in a quantum world
AI'06 Proceedings of the 19th international conference on Advances in Artificial Intelligence: Canadian Society for Computational Studies of Intelligence
Statistically-Hiding quantum bit commitment from approximable-preimage-size quantum one-way function
TQC'09 Proceedings of the 4th international conference on Theory of Quantum Computation, Communication, and Cryptography
Discrete-Log-Based additively homomorphic encryption and secure WSN data aggregation
ICICS'09 Proceedings of the 11th international conference on Information and Communications Security
A smart card implementation of the mceliece PKC
WISTP'10 Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices
Towards electrical, integrated implementations of SIMPL systems
WISTP'10 Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices
General fault attacks on multivariate public key cryptosystems
PQCrypto'11 Proceedings of the 4th international conference on Post-Quantum Cryptography
On the differential security of multivariate public key cryptosystems
PQCrypto'11 Proceedings of the 4th international conference on Post-Quantum Cryptography
Implementation of mceliece based on quasi-dyadic goppa codes for embedded devices
PQCrypto'11 Proceedings of the 4th international conference on Post-Quantum Cryptography
Random oracles in a quantum world
ASIACRYPT'11 Proceedings of the 17th international conference on The Theory and Application of Cryptology and Information Security
Practical key-recovery for all possible parameters of SFLASH
ASIACRYPT'11 Proceedings of the 17th international conference on The Theory and Application of Cryptology and Information Security
SIMPL systems as a keyless cryptographic and security primitive
Cryptography and Security
The circuit model of quantum computation and its simulation with mathematica
MMCP'11 Proceedings of the 2011 international conference on Mathematical Modeling and Computational Science
Quantum McEliece public-key cryptosystem
Quantum Information & Computation
Finding hidden Borel subgroups of the general linear group
Quantum Information & Computation
Changing the gate order for optimal LNN conversion
RC'11 Proceedings of the Third international conference on Reversible Computation
A Θ( √ n)-depth quantum adder on the 2D NTC quantum computer architecture
ACM Journal on Emerging Technologies in Computing Systems (JETC)
Feature: The Impact of Quantum Computing on Cryptography
Network Security
CSP-DHIES: a new public-key encryption scheme from matrix conjugation
Security and Communication Networks
An efficient lattice-based secret sharing construction
WISTP'12 Proceedings of the 6th IFIP WG 11.2 international conference on Information Security Theory and Practice: security, privacy and trust in computing systems and ambient intelligent ecosystems
An efficient IND-CCA2 secure variant of the niederreiter encryption scheme in the standard model
ACISP'12 Proceedings of the 17th Australasian conference on Information Security and Privacy
Improving quantum query complexity of boolean matrix multiplication using graph collision
ICALP'12 Proceedings of the 39th international colloquium conference on Automata, Languages, and Programming - Volume Part I
Quantum Testers for Hidden Group Properties
Fundamenta Informaticae - Machines, Computations and Universality, Part II
Reconstructing strings from substrings with quantum queries
SWAT'12 Proceedings of the 13th Scandinavian conference on Algorithm Theory
Quantum walks: a comprehensive review
Quantum Information Processing
An improved claw finding algorithm using quantum walk
MFCS'07 Proceedings of the 32nd international conference on Mathematical Foundations of Computer Science
Optimal algorithmic cooling of spins
UC'07 Proceedings of the 6th international conference on Unconventional Computation
Quantum Information Processing
Security of ping-pong protocol based on pairs of completely entangled qudits
Quantum Information Processing
A useful strong lower bound on two-qubit concurrence
Quantum Information Processing
Towards one cycle per bit asymmetric encryption: code-based cryptography on reconfigurable hardware
CHES'12 Proceedings of the 14th international conference on Cryptographic Hardware and Embedded Systems
Efficient implementations of MQPKS on constrained devices
CHES'12 Proceedings of the 14th international conference on Cryptographic Hardware and Embedded Systems
Closed-form formula on quantum factorization effectiveness
Quantum Information Processing
Pseudorandom generators based on subcovers for finite groups
Inscrypt'11 Proceedings of the 7th international conference on Information Security and Cryptology
Direct implementation of an N-qubit controlled-unitary gate in a single step
Quantum Information Processing
The amplified quantum Fourier transform: solving the local period problem
Quantum Information Processing
Quantum speed-up for unsupervised learning
Machine Learning
Multivariate public key cryptosystems from diophantine equations
Designs, Codes and Cryptography
Proxy signature scheme based on isomorphisms of polynomials
NSS'12 Proceedings of the 6th international conference on Network and System Security
OR Forum---Quantum Mechanics and Human Decision Making
Operations Research
Quantum fourier transform over symmetric groups
Proceedings of the 38th international symposium on International symposium on symbolic and algebraic computation
A class of quantum low-density parity check codes by combining seed graphs
Quantum Information Processing
Quantum phase estimation with arbitrary constant-precision phase shift operators
Quantum Information & Computation
Quantum binary field inversion: improved circuit depth via choice of basis representation
Quantum Information & Computation
Reduction from non-injective hidden shift problem to injective hidden shift problem
Quantum Information & Computation
Linear recurring sequences for the UOV key generation revisited
ICISC'12 Proceedings of the 15th international conference on Information Security and Cryptology
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
Superlinear advantage for exact quantum algorithms
Proceedings of the forty-fifth annual ACM symposium on Theory of computing
Efficient hierarchical identity-based signatures from lattices
International Journal of Electronic Security and Digital Forensics
Improving the security of arbitrated quantum signature against the forgery attack
Quantum Information Processing
How to share a lattice trapdoor: threshold protocols for signatures and (H)IBE
ACNS'13 Proceedings of the 11th international conference on Applied Cryptography and Network Security
Smaller keys for code-based cryptography: QC-MDPC mceliece implementations on embedded devices
CHES'13 Proceedings of the 15th international conference on Cryptographic Hardware and Embedded Systems
Exponential quantum speed-ups are generic
Quantum Information & Computation
Quantum Information & Computation
Efficient quantum circuits for binary elliptic curve arithmetic: reducing T-gate complexity
Quantum Information & Computation
Mini-maximizing two qubit quantum computations
Quantum Information Processing
Reexamination of arbitrated quantum signature: the impossible and the possible
Quantum Information Processing
Line ordering of reversible circuits for linear nearest neighbor realization
Quantum Information Processing
The rational approximations of the unitary groups
Quantum Information Processing
A quantum physical design flow using ILP and graph drawing
Quantum Information Processing
Towards provably secure proxy signature scheme based on Isomorphisms of Polynomials
Future Generation Computer Systems
RMDDS: Reed-muller decision diagram synthesis of reversible logic circuits
ACM Journal on Emerging Technologies in Computing Systems (JETC)
Lattice-based message recovery signature schemes
International Journal of Electronic Security and Digital Forensics
Quantum computing and communications - Introduction and challenges
Computers and Electrical Engineering
Quantum Information Processing
Quantum computation in the decoherence-free subspaces with cavity QED
Quantum Information Processing
Quantum circuit physical design methodology with emphasis on physical synthesis
Quantum Information Processing
Selecting efficient phase estimation with constant-precision phase shift operators
Quantum Information Processing
Quantum Information Processing
On the probability of generating a lattice
Journal of Symbolic Computation
Proving the Power of Postselection
Fundamenta Informaticae - MFCS & CSL 2010 Satellite Workshops: Selected Papers
Quantum algorithms for one-dimensional infrastructures
Quantum Information & Computation
Classical simulations of Abelian-group normalizer circuits with intermediate measurements
Quantum Information & Computation
Quantum Information & Computation
Hi-index | 0.02 |
A digital computer is generally believed to be an efficient universal computing device; that is, it is believed able to simulate any physical computing device with an increase in computation time by at most a polynomial factor. This may not be true when quantum mechanics is taken into consideration. This paper considers factoring integers and finding discrete logarithms, two problems which are generally thought to be hard on a classical computer and which have been used as the basis of several proposed cryptosystems. Efficient randomized algorithms are given for these two problems on a hypothetical quantum computer. These algorithms take a number of steps polynomial in the input size, e.g., the number of digits of the integer to be factored.