Challenges of blockchain in new generation energy systems and future outlooks
Recently, the blockchain technology has attracted widespread attention due to its
advantageous features, eg, decentralization, transparency, traceability, and immutability. To …
advantageous features, eg, decentralization, transparency, traceability, and immutability. To …
Synthesis and optimization of reversible circuits—a survey
Reversible logic circuits have been historically motivated by theoretical research in low-
power electronics as well as practical improvement of bit manipulation transforms in …
power electronics as well as practical improvement of bit manipulation transforms in …
Toward the first quantum simulation with quantum speedup
With quantum computers of significant size now on the horizon, we should understand how
to best exploit their initially limited abilities. To this end, we aim to identify a practical problem …
to best exploit their initially limited abilities. To this end, we aim to identify a practical problem …
[HTML][HTML] Vulnerability of blockchain technologies to quantum attacks
JJ Kearney, CA Perez-Delgado - Array, 2021 - Elsevier
Quantum computation represents a threat to many cryptographic protocols in operation
today. It has been estimated that by 2035, there will exist a quantum computer capable of …
today. It has been estimated that by 2035, there will exist a quantum computer capable of …
Quantum security analysis of CSIDH
X Bonnetain, A Schrottenloher - … on the Theory and Applications of …, 2020 - Springer
CSIDH is a recent proposal for post-quantum non-interactive key-exchange, based on
supersingular elliptic curve isogenies. It is similar in design to a previous scheme by …
supersingular elliptic curve isogenies. It is similar in design to a previous scheme by …
A review of techniques for implementing elliptic curve point multiplication on hardware
A Verri Lucca, GA Mariano Sborz… - Journal of Sensor and …, 2020 - mdpi.com
Cryptography is considered indispensable among security measures applied to data
concerning insecure means of transmission. Among various existent algorithms on …
concerning insecure means of transmission. Among various existent algorithms on …
Scalable network for simultaneous pairwise quantum key distribution via entanglement-based time-bin coding
E Fitzke, L Bialowons, T Dolejsky, M Tippmann… - PRX Quantum, 2022 - APS
We present a scalable star-shaped quantum-key-distribution (QKD) optical-fiber network.
We use wavelength-division demultiplexing (WDM) of broadband photon pairs to establish …
We use wavelength-division demultiplexing (WDM) of broadband photon pairs to establish …
Quantum circuit design of a T-count optimized integer multiplier
E Muñoz-Coreas, H Thapliyal - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Quantum circuits of many qubits are extremely difficult to realize; thus, the number of qubits
is an important metric in a quantum circuit design. Further, scalable and reliable quantum …
is an important metric in a quantum circuit design. Further, scalable and reliable quantum …
Quantum reversible circuit of AES-128
M Almazrooie, A Samsudin, R Abdullah… - Quantum information …, 2018 - Springer
An explicit quantum design of AES-128 is presented in this paper. The design is structured
to utilize the lowest number of qubits. First, the main components of AES-128 are designed …
to utilize the lowest number of qubits. First, the main components of AES-128 are designed …