On the Power of Quantum Computation

From MaRDI portal
Revision as of 00:08, 7 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:4376181

DOI10.1137/S0097539796298637zbMath0883.03024OpenAlexW2117584890MaRDI QIDQ4376181

Daniel Simon

Publication date: 10 February 1998

Published in: SIAM Journal on Computing (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1137/s0097539796298637




Related Items (only showing first 100 items - show all)

On Quantum Distinguishers for Type-3 Generalized Feistel Network Based on SeparabilityAn Optimal Separation of Randomized and Quantum Query ComplexityA public key cryptosystem based on data complexity under quantum environmentMulti-query Quantum SumsTrading quantum for classical resources in quantum data compressionQuantum security analysis of RoccaNew results on quantum boomerang attacksQuantum meet-in-the-middle attack on Feistel constructionBreaking symmetric cryptosystems using the offline distributed Grover-Meets-Simon algorithmQuantum key recovery attacks on tweakable Even-Mansour ciphersQuantum cryptanalysis of 5 rounds Feistel schemes and Benes schemesFollowing forrelation -- quantum algorithms in exploring Boolean functions' spectraQuantum attacks on generalized Feistel networks based on the strong-weak separabilityQuantum circuit implementation and resource analysis of LBlock and LiCiOptimized quantum implementation of AESA family of unitaries for the quantum period finding algorithmRapid solution of problems by quantum computationQuantum algorithm for smoothed particle hydrodynamicsA generalization of Bernstein-Vazirani algorithm with multiple secret keys and a probabilistic oraclePost-quantum security on the Lai-Massey schemeQuantum cryptanalysis of Farfalle and (generalised) key-alternating Feistel networksIntroducing nega-forrelation: quantum algorithms in analyzing nega-Hadamard and nega-crosscorrelation spectraComments on ``Efficient classical simulation of the Deutsch-Jozsa and Simon's algorithmsShor's Factoring Algorithm and Modular Exponentiation OperatorsA quantum algorithm to approximate the linear structures of Boolean functionsQuantum linearization attacksFAST: secure and high performance format-preserving encryption and tokenizationQuantum attacks on Lai-Massey structurePost-quantum plaintext-awarenessQuantum attacks on beyond-birthday-bound MACsTsallis relative α entropy of coherence dynamics in Grover′s search algorithmQuantum attacks on PRFs based on public random permutationsTwo remarks on the vectorization problemQuantum circuit implementations of SM4 block cipher based on different gate setsFurther insights on constructing quantum circuits for Camellia block cipherOn the post-quantum security of classical authenticated encryption schemesQuantum linear key-recovery attacks using the QFTUnnamed ItemUnnamed ItemAn FPGA-based quantum circuit emulation framework using heisenberg representationQuantum Query Algorithms are Completely Bounded Forms.EFFICIENT IMPLEMENTATIONS OF THE QUANTUM FOURIER TRANSFORM: AN EXPERIMENTAL PERSPECTIVEAn Introduction to Quantum Computing, without the PhysicsEFFICIENT QUANTUM ALGORITHMS FOR SOME INSTANCES OF THE NON-ABELIAN HIDDEN SUBGROUP PROBLEMANALYSIS OF QUANTUM FUNCTIONSThe Road to Quantum Computational SupremacyQuantum Query Algorithms Are Completely Bounded FormsQuantum and classical query complexities of local search are polynomially relatedDesign of quantum Fourier transforms and quantum algorithms by using circulant HamiltoniansMatchgates and classical simulation of quantum circuitsModular quantum computing and quantum-like devicesRevisiting the simulation of quantum Turing machines by quantum circuitsOn quantum algorithms for noncommutative hidden subgroupsON THE COMPLEXITY OF THE HIDDEN SUBGROUP PROBLEMCounting by quantum eigenvalue estimationQuantum computation: algorithms and applicationsUnnamed ItemAnalogies and differences between quantum and stochastic automataQuantum computation and quantum information†Optimization of $S$-boxes GOST R 34.12-2015 «Magma» quantum circuits without ancilla qubitsOn Quantum Chosen-Ciphertext Attacks and Learning with ErrorsUnnamed ItemEntanglement is Not Necessary for Perfect Discrimination between Unitary OperationsGeneration of elementary gates and Bell’s states using controlled adiabatic evolutionsQuantum Algorithms for a Set of Group Theoretic ProblemsQuantum-Secure Symmetric-Key Cryptography Based on Hidden ShiftsLattice-Based SNARGs and Their Application to More Efficient ObfuscationPhysical quantum algorithmsThe effect of electric field on RbCl asymmetric Gaussian potential quantum well qubitImproved quantum circuit modelling based on Heisenberg representationA lower bound on the quantum query complexity of read-once functions(Quantum) cryptanalysis of misty schemesA new quantum lower bound method, with applications to direct product theorems and time-space tradeoffsLower bounds of quantum black-box complexity and degree of approximating polynomials by influence of Boolean variablesThe quantum query complexity of the abelian hidden subgroup problemOn the black-box complexity of Sperner's LemmaQuantum algorithms for the \(k\)-XOR problemProgress in quantum algorithmsThe quantum query complexity of the hidden subgroup problem is polynomialQuantum computing without entanglementThe query complexity of order-findingBeyond quadratic speedups in quantum attacks on symmetric schemesPost-quantum security of the Even-Mansour cipherOptimal separation in exact query complexities for Simon's problemQuantum algorithm to solve function inversion with time-space trade-offOptimal parallel quantum query algorithmsNonadaptive quantum query complexityQuantum attacks against type-1 generalized Feistel ciphers and applications to CAST-256Classification of patterns representing apples and oranges in three-qubit systemQuantum image processing?Quantum attacks on some Feistel block ciphersEfficient slide attacksUsing Bernstein-Vazirani algorithm to attack block ciphersQuantum and classical query complexities for generalized Simon's problemPotential of Quantum Finite Automata with Exact AcceptanceQuantum algorithms for typical hard problems: a perspective of cryptanalysisComplete analysis of Simon's quantum algorithm with additional collisionsMathematical model of stored logic based computationA quantum related-key attack based on the Bernstein-Vazirani algorithmQuantum algorithms for learning the algebraic normal form of quadratic Boolean functions







This page was built for publication: On the Power of Quantum Computation