Showing 641 - 660 results of 1,111 for search '"quantum computing"', query time: 0.10s Refine Results
  1. 641

    Programming universal unitary transformations on a general-purpose silicon photonic platform by José Roberto Rausell-Campo, Daniel Pérez-López, José Capmany Francoy

    Published 2025-02-01
    “…Additionally, they are a promising platform for creating unitary linear transformations, which are key elements in quantum computing and photonic neural networks. However, a general procedure for implementing these transformations on such systems has not been established yet. …”
    Get full text
    Article
  2. 642

    Decoding quantum color codes with MaxSAT by Lucas Berent, Lukas Burgholzer, Peter-Jan H.S. Derks, Jens Eisert, Robert Wille

    Published 2024-10-01
    “…Quantum error-correcting codes play a central role on the avenue towards fault-tolerant quantum computation beyond presumed near-term applications. …”
    Get full text
    Article
  3. 643

    Quantum metamaterials: Applications in quantum information science by Solomon Uriri, Yaseera Ismail, Mhlambululi Mafu

    Published 2025-06-01
    “…Metamaterials have gradually made their way into the quantum regime since the advent of quantum computing and quantum sensing and imaging. Quantum metamaterials are a relatively new technology, and their use in quantum information processing has proliferated. …”
    Get full text
    Article
  4. 644

    Heisenberg-Limited Adaptive Gradient Estimation for Multiple Observables by Kaito Wada, Naoki Yamamoto, Nobuyuki Yoshioka

    Published 2025-04-01
    “…Our method paves a new way to precisely understand and predict various physical properties in complicated quantum systems using quantum computers.…”
    Get full text
    Article
  5. 645

    Quantum Chosen-Cipher Attack on Camellia by Yanjun Li, Qi Wang, Dingyun Huang, Jian Liu, Huiqin Xie

    Published 2025-04-01
    “…Nevertheless, research into specific symmetric cryptographic algorithms utilizing the Feistel structure is relatively scarce in quantum computing environments. This paper, for the first time, proposes a five-round distinguisher for Camellia under the quantum chosen-ciphertext attack (qCCA) setting, with its effectiveness empirically validated. …”
    Get full text
    Article
  6. 646

    Image Denoising Using Quantum Deep Convolutional Generative Adversarial Network for Medical Images by Priyanka Nandal, Sudesh Pahal, Govind Murari Upadhyay

    Published 2025-07-01
    “…The architecture of the DCGAN (deep convolutional generative adversarial networks) is augmented with a quantum computing layer to enhance the performance through quantum-generated inputs. …”
    Get full text
    Article
  7. 647

    Unstructured Adiabatic Quantum Optimization: Optimality with Limitations by Arthur Braida, Shantanav Chakraborty, Alapan Chaudhuri, Joseph Cunningham, Rutvij Menavlikar, Leonardo Novo, Jérémie Roland

    Published 2025-07-01
    “…In the circuit model of quantum computing, amplitude amplification techniques can be used to find solutions to NP-hard problems defined on $n$-bits in time $\text{poly}(n) 2^{n/2}$. …”
    Get full text
    Article
  8. 648

    Efficient Entanglement Swapping in Quantum Networks for Multi-User Scenarios by Binjie He, Seng W. Loke, Luke Lu, Dong Zhang

    Published 2025-06-01
    “…Entanglement swapping is a crucial step in quantum communication, generating long-distance entanglements between quantum users for quantum network applications, such as distributed quantum computing. This study focuses on the efficiency of entanglement swapping strategies in quantum networks, particularly in multi-user concurrent quantum communication. …”
    Get full text
    Article
  9. 649

    Improved Big Data Security Using Quantum Chaotic Map of Key Sequence by Archana Kotangale, Meesala Sudhir Kumar, Amol P. Bhagat

    Published 2025-06-01
    “…Classical cryptographic methods face increasing vulnerabilities in the face of quantum computing advancements. This research proposes an enhanced big data security framework integrating a quantum chaotic map of key sequence (QCMKS), which synergizes the principles of quantum mechanics and chaos theory to generate highly unpredictable and non-repetitive key sequences. …”
    Get full text
    Article
  10. 650

    Post-Quantum Linkable Hash-Based Ring Signature Scheme for Off-Chain Payments in IoT by Linlin He, Xiayi Zhou, Dongqin Cai, Xiao Hu, Shuanggen Liu

    Published 2025-07-01
    “…Additionally, the rise of quantum computing threatens traditional public key cryptography, making the development of post-quantum secure methods for privacy protection essential. …”
    Get full text
    Article
  11. 651

    Quantum entanglement without nonlocal causation in (3,2)-dimensional spacetime by Marco Pettini

    Published 2025-03-01
    “…Beyond its theoretical interest, entanglement is a key topic in quantum computing and quantum technologies, so any attempt to gain a deeper understanding of it could be useful.…”
    Get full text
    Article
  12. 652

    Developing Quantum Trusted Platform Module (QTPM) to Advance IoT Security by Guobin Xu, Oluwole Adetifa, Jianzhou Mao, Eric Sakk, Shuangbao Wang

    Published 2025-04-01
    “…In the context of cybersecurity, particularly for the Internet of Things (IoT), high levels of randomness are essential to secure cryptographic protocols. Quantum computing introduces significant risks to traditional encryption methods. …”
    Get full text
    Article
  13. 653

    A Post-Quantum Public-Key Signcryption Scheme over Scalar Integers Based on a Modified LWE Structure by Mostefa Kara, Mohammad Hammoudeh, Abdullah Alamri, Sultan Alamri

    Published 2025-07-01
    “…To ensure confidentiality and integrity in the era of quantum computing, most post-quantum cryptographic schemes are designed to achieve either encryption or digital signature functionalities separately. …”
    Get full text
    Article
  14. 654
  15. 655

    Emerging Technologies Driving Zero Trust Maturity Across Industries by Hrishikesh Joshi

    Published 2025-01-01
    “…The research investigates how artificial intelligence, machine learning, blockchain, quantum computing, and cloud/edge technologies are reshaping the implementation and efficacy of Zero Trust architectures. …”
    Get full text
    Article
  16. 656

    Hybrid integrated ultra-low linewidth coil stabilized isolator-free widely tunable external cavity laser by David A. S. Heim, Debapam Bose, Kaikai Liu, Andrei Isichenko, Daniel J. Blumenthal

    Published 2025-07-01
    “…Abstract Precision applications including quantum computing and sensing, mmWave/RF generation, and metrology, demand widely tunable, ultra-low phase noise lasers. …”
    Get full text
    Article
  17. 657
  18. 658

    Efficient Magic State Distillation by Zero-Level Distillation by Tomohiro Itogawa, Yugo Takada, Yutaka Hirano, Keisuke Fujii

    Published 2025-06-01
    “…Magic state distillation (MSD) is an essential element for universal fault-tolerant quantum computing, which distills a high-fidelity magic state from noisy magic states using ideal (error-corrected) Clifford operations. …”
    Get full text
    Article
  19. 659

    Hybrid quantum and in-memory computing for accelerating solving Simon’s problem by Zheng Miao, Yongxiang Li, Shiqing Wang, Zhong Sun

    Published 2025-06-01
    “…Quantum computing and in-memory computing (IMC) are two emerging paradigms that hold promise for achieving breakthroughs in computing performance. …”
    Get full text
    Article
  20. 660

    Strain-tuning of spin anisotropy in single-layer phosphorene: insights from Elliott–Yafet and Dyakonov–Perel spin relaxation by Paulina Jureczko, Marko Milivojević, Marcin Kurpas

    Published 2025-01-01
    “…Materials and systems that exhibit persistent spin texture provide a platform for creating robust spin states that can be used in quantum computing, information storage, and other advanced technological applications. …”
    Get full text
    Article