期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
A Technical Note for a Shor’s Algorithm by Phase Estimation
1
作者 Gérard Fleury Philippe Lacomme 《Journal of Quantum Computing》 2022年第2期97-111,共15页
The objective of this paper concerns at first the motivation and the method of Shor’s algorithm including remarks on quantum computing introducing an algorithmic description of the method.The corner stone of the Shor... The objective of this paper concerns at first the motivation and the method of Shor’s algorithm including remarks on quantum computing introducing an algorithmic description of the method.The corner stone of the Shor’s algorithm is the modular exponentiation that is themost computational component(in time and space).A linear depth unit based on phase estimation is introduced and a description of a generic version of a modular multiplier based on phases is introduced to build block of a gates to efficient modular exponentiation circuit.Our proposal includes numerical experiments achieved on both the IBM simulator using the Qiskit library and on quantum physical optimizers provided by IBM.The shor’s algorithm based on phase estimation succeeds in factoring integer numbers with more than 35 digits using circuits with about 100 qubits. 展开更多
关键词 shor’s algorithm PHAsE
下载PDF
Navigating the Quantum Threat Landscape: Addressing Classical Cybersecurity Challenges
2
作者 Sabina Sokol 《Journal of Quantum Information Science》 2023年第2期56-77,共22页
This research paper analyzes the urgent topic of quantum cybersecurity and the current federal quantum-cyber landscape. Quantum-safe implementations within existing and future Internet of Things infrastructure are dis... This research paper analyzes the urgent topic of quantum cybersecurity and the current federal quantum-cyber landscape. Quantum-safe implementations within existing and future Internet of Things infrastructure are discussed, along with quantum vulnerabilities in public key infrastructure and symmetric cryptographic algorithms. Other relevant non-encryption-specific areas within cybersecurity are similarly raised. The evolution and expansion of cyberwarfare as well as new developments in cyber defense beyond post-quantum cryptography and quantum key distribution are subsequently explored, with an emphasis on public and private sector awareness and vigilance in maintaining strong security posture. 展开更多
关键词 Quantum Computing Post-Quantum Cryptography (PQC) Quantum Hacking CYBERsECURITY Internet of Things (IoT) shor’s Algorithm Quantum Random Number Generators (QRNGs) Pseudorandom Number Generators (RNGs) Quantum Key Distribution (QKD) symmetric Key Cryp-tography Asymmetric Key Cryptography
下载PDF
Realization of -bit semiclassical quantum Fourier transform on IBM's quantum cloud computer 被引量:1
3
作者 付向群 鲍皖苏 +5 位作者 黄合良 李坦 史建红 汪翔 张硕 李风光 《Chinese Physics B》 SCIE EI CAS CSCD 2019年第2期117-122,共6页
To overcome the difficulty of realizing large-scale quantum Fourier transform(QFT) within existing technology, this paper implements a resource-saving method(named t-bit semiclassical QFT over Z_(2~n)), which could re... To overcome the difficulty of realizing large-scale quantum Fourier transform(QFT) within existing technology, this paper implements a resource-saving method(named t-bit semiclassical QFT over Z_(2~n)), which could realize large-scale QFT using an arbitrary-scale quantum register. By developing a feasible method to realize the control quantum gate Rk, we experimentally realize the 2-bit semiclassical QFT over Z_(2~3) on IBM's quantum cloud computer, which shows the feasibility of the method. Then, we compare the actual performance of 2-bit semiclassical QFT with standard QFT in the experiments.The squared statistical overlap experimental data shows that the fidelity of 2-bit semiclassical QFT is higher than that of standard QFT, which is mainly due to fewer two-qubit gates in the semiclassical QFT. Furthermore, based on the proposed method, N = 15 is successfully factorized by implementing Shor's algorithm. 展开更多
关键词 QUANTUM cloud COMPUTATION QUANTUM FOURIER TRANsFORM sEMICLAssICAL QUANTUM FOURIER TRANsFORM shor’s algorithm
下载PDF
The Future of Quantum Computer Advantage
4
作者 Jimmy Chen 《American Journal of Computational Mathematics》 2023年第4期619-631,共13页
As technological innovations in computers begin to advance past their limit (Moore’s law), a new problem arises: What computational device would emerge after the classical supercomputers reach their physical limitati... As technological innovations in computers begin to advance past their limit (Moore’s law), a new problem arises: What computational device would emerge after the classical supercomputers reach their physical limitations? At this moment in time, quantum computers are at their starting stage and there are already some strengths and advantages when compared with modern, classical computers. In its testing period, there are a variety of ways to create a quantum computer by processes such as the trapped-ion and the spin-dot methods. Nowadays, there are many drawbacks with quantum computers such as issues with decoherence and scalability, but many of these issues are easily emended. Nevertheless, the benefits of quantum computers at the moment outweigh the potential drawbacks. These benefits include its use of many properties of quantum mechanics such as quantum superposition, entanglement, and parallelism. Using these basic properties of quantum mechanics, quantum computers are capable of achieving faster computational times for certain problems such as finding prime factors of an integer by using Shor’s algorithm. From the advantages such as faster computing times in certain situations and higher computing powers than classical computers, quantum computers have a high probability to be the future of computing after classical computers hit their peak. 展开更多
关键词 Quantum Computers QUBIT DECOHERENCE sUPERPOsITION Entanglement PARALLELIsM Hadamard Gates shor’s Algorithm Bloch sphere Moore’s Law
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部