Qibo: a framework for quantum simulation with hardware acceleration

S Efthymiou, S Ramos-Calderer… - Quantum Science …, 2021 - iopscience.iop.org
We present Qibo, a new open-source software for fast evaluation of quantum circuits and
adiabatic evolution which takes full advantage of hardware accelerators. The growing …

Opening the black box inside Grover's algorithm

EM Stoudenmire, X Waintal - Physical Review X, 2024 - APS
Grover's algorithm is one of the primary algorithms offered as evidence that quantum
computers can provide an advantage over classical computers. It involves an …

Simulating the quantum Fourier transform, Grover's algorithm, and the quantum counting algorithm with limited entanglement using tensor networks

M Niedermeier, JL Lado, C Flindt - Physical Review Research, 2024 - APS
Quantum algorithms reformulate computational problems as quantum evolutions in a large
Hilbert space. Most quantum algorithms assume that the time evolution is perfectly unitary …

Evaluation of Grover's algorithm toward quantum cryptanalysis on ChaCha

B Bathe, R Anand, S Dutta - Quantum Information Processing, 2021 - Springer
In this work, we have analyzed ChaCha against Grover's search algorithm. We designed a
reversible quantum circuit of ChaCha and then estimated the resources required to …

Converting of Boolean expression to linear equations, inequalities and QUBO penalties for cryptanalysis

AI Pakhomchik, VV Voloshinov, VM Vinokur… - Algorithms, 2022 - mdpi.com
There exists a wide range of constraint programming (CP) problems defined on Boolean
functions depending on binary variables. One of the approaches to solving CP problems is …

M&M'S: Mix and Match Attacks on Schnorr-type Blind Signatures with Repetition

K Do, L Hanzlik, E Paracucchi - … on the Theory and Applications of …, 2024 - Springer
Blind signatures allow the issuing of signatures on messages chosen by the user so that
they ensure blindness of the message against the signer. Moreover, a malicious user cannot …

Nostradamus goes quantum

BJ Benedikt, M Fischlin, M Huppert - … on the Theory and Application of …, 2022 - Springer
In the Nostradamus attack, introduced by Kelsey and Kohno (Eurocrypt 2006), the adversary
has to commit to a hash value y of an iterated hash function H such that, when later given a …

Quantum Binary Field Multiplication with Optimized Toffoli Depth and Extension to Quantum Inversion

K Jang, W Kim, S Lim, Y Kang, Y Yang, H Seo - Sensors, 2023 - mdpi.com
The Shor's algorithm can find solutions to the discrete logarithm problem on binary elliptic
curves in polynomial time. A major challenge in implementing Shor's algorithm is the …

Fuzzy quality certification of wheat

CS Simionescu, CP Plenovici, CL Augustin… - Agriculture, 2022 - mdpi.com
This paper presents a fuzzy quality certification of wheat. This analysis is based on the fuzzy
analysis model of wheat. We developed a Matlab application with the help of which we …

QBIoV: a secure data sharing scheme for the Internet of vehicles based on quantum-enabled blockchain

A Liu, X Chen, G Xu, Z Wang, Y Sun, Y Wang… - Quantum Information …, 2024 - Springer
Internet of vehicles (IoV) technology connects various types of vehicles through the Internet
of Things to achieve mutual communication and data sharing, thereby promoting the …