scientific article; zbMATH DE number 1256737
From MaRDI portal
Publication:4228473
zbMath0922.68044arXivquant-ph/9605043MaRDI QIDQ4228473
Publication date: 1 March 1999
Full work available at URL: https://arxiv.org/abs/quant-ph/9605043
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items
The discrete-time quaternionic quantum walk on a graph, Challenges of adiabatic quantum evaluation of NAND trees, A survey of quantum image representations, An efficient quantum scheme for private set intersection, Participant attack on three-party quantum key agreement with two-photon entanglement, Periodicity of quantum walks defined by mixed paths and mixed cycles, Application of Grover's algorithm to check non-resiliency of a Boolean function, SoK: how (not) to design and implement post-quantum cryptography, Highlighting the mechanism of the quantum speedup by time-symmetric and relational quantum mechanics, (Quantum) cryptanalysis of misty schemes, Quantum and approximation algorithms for maximum witnesses of Boolean matrix products, Magnifying computing gaps. Establishing encrypted communication over unidirectional channels, Spatial search by continuous-time quantum walk with multiple marked vertices, Generator of an abstract quantum walk, QRDA: quantum representation of digital audio, Applications of Singh-Rajput MES in recall operations of quantum associative memory for a two-qubit system, Multi-party quantum key agreement by an entangled six-qubit state, Lower bounds of quantum black-box complexity and degree of approximating polynomials by influence of Boolean variables, A new universal and fault-tolerant quantum basis, Collusive attacks to ``circle-type multi-party quantum key agreement protocols, PEET: a Matlab tool for estimating physical gate errors in quantum information processing systems, Quantum image matching, Novel classical post-processing for quantum key distribution-based quantum private query, The number of terms in the superpositions upper bounds the amount of the coherence change, Improving quantum query complexity of Boolean matrix multiplication using graph collision, Quantum query complexity of almost all functions with fixed on-set size, A class of quantum low-density parity check codes by combining seed graphs, Image storage, retrieval, compression and segmentation in a quantum system, Multiparty quantum key agreement with single particles, A fast natural algorithm for searching, The query complexity of order-finding, The quantum search algorithms for all solutions, Automata theory based on quantum logic: Some characterizations, Reexamination of arbitrated quantum signature: the impossible and the possible, Amplitudes distribution over two copies of small quantum subsystems, A novel quantum representation for log-polar images, Quantum computer simulation using the CUDA programming model, Quantum pattern search with closed match, Cryptanalysis of the quantum group signature protocols, Phase matching in Grover's algorithm, Strategies for designing geometric transformations on quantum images, Watermarking and authentication of quantum images based on restricted geometric transformations, A flexible representation of quantum images for polynomial preparation, image compression, and processing operations, Assertoric semantics and the computational power of self-referential truth, A hybrid method for quantum global optimization, Optimality proofs of quantum weight decision algorithms, Can quantum entanglement detection schemes improve search?, Parrondo's game using a discrete-time quantum walk, Tree search and quantum computation, Quantum key agreement against collective decoherence, Noise-based logic hyperspace with the superposition of \(2^N\) states in a single wire, Quantum-assisted QD-CFS signatures, A logarithmic time complexity algorithm for pattern searching using product-sum property, Mini-maximizing two qubit quantum computations, SQR: a simple quantum representation of infrared images, Efficient quantum algorithms to construct arbitrary Dicke states, Multiple network alignment on quantum computers, Circuit QED: implementation of the three-qubit refined Deutsch-Jozsa quantum algorithm, How low can approximate degree and quantum query complexity be for total Boolean functions?, On the power of non-adaptive learning graphs, An exact quantum search algorithm with arbitrary database, Simulated versus reduced noise quantum annealing in maximum independent set solution to wireless network scheduling, Quantum image edge extraction based on classical Sobel operator for NEQR, Quantum image edge extraction based on Laplacian operator and zero-cross method, Two quantum protocols for secure Hamming distance computation, A quantum walk-assisted approximate algorithm for bounded NP optimisation problems, Efficiently embedding QUBO problems on adiabatic quantum computers, A novel protocol for multiparty quantum key management, Trapping and spreading properties of quantum walk in homological structure, Quantum image scaling using nearest neighbor interpolation, Local feature point extraction for quantum images, Image segmentation on a quantum computer, Quantum image pseudocolor coding based on the density-stratified method, Unrelated parallel machine scheduling -- perspectives and progress, Application of distributed semi-quantum computing model in phase estimation, Improved quantum query algorithms for triangle detection and associativity testing, Szegedy's quantum walk with queries, Quantum point cloud and its compression, Quantum finite automata: advances on Bertoni's ideas, Quantum image location, On the complexity of minimizing probabilistic and quantum automata, The vectorial \(\lambda\)-calculus, Two-tape finite automata with quantum and classical states, Duality quantum computing and duality quantum information processing, Quantum walks, Ihara zeta functions and cospectrality in regular graphs, Quantum algorithm for the asymmetric weight decision problem and its generalization to multiple weights, Schemes for teleportation of quantum gates, Randomized and quantum algorithms yield a speed-up for initial-value problems, On the power of Ambainis lower bounds, Quantum counterfeit coin problems, Pattern classifications using Grover's and Ventura's algorithms in a two-qubits system, Optimizing teleportation cost in distributed quantum circuits, The quantum speed up as advanced cognition of the solution, Exponential separation of quantum and classical online space complexity, Simulating a perceptron on a quantum computer, Exciton-mediated quantum search on a star graph, Characterizations of one-way general quantum finite automata, Multi-letter quantum finite automata: decidability of the equivalence and minimization of states, Quantum computation and quantum information, Quantum mechanics and computation, Fuzzy matching based on gray-scale difference for quantum images, A third-party E-payment protocol based on quantum multi-proxy blind signature, Milestone developments in quantum information and no-go theorems, Low-gate quantum golden collision finding, Improvements to quantum search techniques for block-ciphers, with applications to AES, Flexible representation and manipulation of audio signals on quantum computers, Resolving the forecasting problems of overshoot and volatility clustering using ANFIS coupling nonlinear heteroscedasticity with quantum tuning, A new quantum lower bound method, with applications to direct product theorems and time-space tradeoffs, Quantum algorithms for matching problems, On the hardness of the computational ring-LWR problem and its applications, The 50\% advanced information rule of the quantum algorithms, A quantum-inspired evolutionary algorithm using Gaussian distribution-based quantization, Quantum separation of local search and fixed point computation, Prospects of quantum-classical optimization for digital design, Joint remote state preparation of a single-atom qubit state via a GHZ entangled state, Completing the physical representation of quantum algorithms provides a quantitative explanation of their computational speedup, Simulation methods for quantum walks on graphs applied to formal language recognition, Quantum physical symbol systems, A lower bound for the Sturm-Liouville eigenvalue problem on a quantum computer, Quantum cooperative search algorithm for 3-sat, Quantum reversible circuit of AES-128, Parallel computational structure of noisy quantum circuits simulation, Implications for cognitive quantum computation and decoherence limits in the presence of large extra dimensions, String matching in \(\tilde O(\sqrt n+\sqrt m)\) quantum time, Optimal separation in exact query complexities for Simon's problem, Computational complexity of the landscape. I., A note on the search for \(k\) elements via quantum walk, A quantum Jensen-Shannon graph kernel for unattributed graphs, Quantum algorithm for triangle finding in sparse graphs, Resonant transition-based quantum computation, Quantum key agreement protocols with single photon in both polarization and spatial-mode degrees of freedom, The excitonic qubit coupled with a phonon bath on a star graph: anomalous decoherence and coherence revivals, Dynamic Grover search: applications in recommendation systems and optimization problems, Improved algorithms for quantum identification of Boolean oracles, Finding shortest lattice vectors faster using quantum search, Restoration for noise removal in quantum images, A remark on zeta functions of finite graphs via quantum walks, On a problem in quantum summation., A theoretical framework for quantum image representation and data loading scheme, Parametric quantum search algorithm as quantum walk: a quantum simulation, Quantum algorithms for finding constant-sized sub-hypergraphs, Quaternionic Grover walks and zeta functions of graphs with loops, Unified quantum no-go theorems and transforming of quantum pure states in a restricted set, Measurement device-independent quantum dialogue, Experimental realization of quantum cheque using a five-qubit quantum computer, A review on quantum search algorithms, A novel quantum scheme for secure two-party distance computation, Localization of a multi-dimensional quantum walk with one defect, Quantum watermarking scheme through Arnold scrambling and LSB steganography, Equivalence of Szegedy's and coined quantum walks, Quantum solution to a class of two-party private summation problems, Efficient classical simulation of the Deutsch-Jozsa and Simon's algorithms, The security problems in some novel arbitrated quantum signature protocols, Quantum image filtering in the spatial domain, Quantum teleportation and Grover's algorithm without the wavefunction, Comparative complexity of quantum and classical OBDDs for total and partial functions, Characterizing error propagation in quantum circuits: the isotropic index, An improved filtering method for quantum color image in frequency domain, Quantum cryptography beyond quantum key distribution, Implementing pure adaptive search with Grover's quantum algorithm, Blind quantum signature with blind quantum computation, Verifiable quantum encryption and its practical applications, Global and local translation designs of quantum image based on FRQI, Realization of Deutsch-like algorithm using ensemble computing, Polynomial interpolation and identity testing from high powers over finite fields, CSIDH: an efficient post-quantum commutative group action, Quantum protocols for untrusted computations, On the exact evaluation of certain instances of the Potts partition function by quantum computers, Enhanced quantum searching via entanglement and partial diffusion, On the cost of computing isogenies between supersingular elliptic curves, Quantum pattern recognition with probability of 100\%, Quantum algorithm design: techniques and applications, Computation in finitary stochastic and quantum processes, Interferometric computation beyond quantum theory, Multiplayer quantum games and its application as access controller in architecture of quantum computers, An optimized quantum representation for color digital images, An improved quantum voting scheme, Quantum representation and basic operations of digital signals, The mechanism of quantum computation, Combining a local search and Grover's algorithm in black-box global optimization, Machine semantics, Convergence performance comparison of quantum-inspired multi-objective evolutionary algorithms, Quantum loop programs, The geometry of quantum learning, On zeros of exponential polynomials and quantum algorithms, Using modifications to Grover's search algorithm for quantum global optimization, Binary superposed quantum decision diagrams, Quantum approaches to graph colouring, Self-protected quantum algorithms based on quantum state tomography, Graph matching using the interference of continuous-time quantum walks, Integrative connectionist learning systems inspired by nature: Current models, future trends and challenges, A note on quantum sequential machines, Claw finding algorithms using quantum walk, Optical computing, Quantum search on structured problems, Quantum lower bounds for the Goldreich-Levin problem, The Landauer resistance and band spectra for the counting quantum Turing machine., A framework for structured quantum search., Quantum summation with an application to integration., Relativized separation of EQP from \(\text{P}^{\text{NP}}\), From Monte Carlo to quantum computation, Transformation rules for CNOT-based quantum circuits and their applications, A new quantum claw-finding algorithm for three functions, A lower bound on the quantum query complexity of read-once functions, Splitting information securely with entanglement, Sharp error bounds on quantum Boolean summation in various settings, The power of various real-valued quantum queries, Quantum search algorithm for set operation, A quantum probability splitter and its application to qubit preparation, An improved lower bound on query complexity for quantum PAC learning, Multi-party quantum key agreement with Bell states and Bell measurements, The amplified quantum Fourier transform: solving the local period problem, Intricacies of quantum computational paths, Improved quantum-inspired evolutionary algorithm for engineering design optimization, The elusive source of quantum speedup, Quantum search with variable times, Complexity limitations on quantum computation, Quantum computing as a particular case of computing with tensors, Optimization of one-way quantum computation measurement patterns, A modified quantum search algorithm, Quantum adder for superposition states, Offline arbitrated quantum blind dual-signature protocol with better performance in resisting existential forgery attack, An arbitrated proxy blind signature based on hyper entanglement analysis, Efficient quantum algorithm for similarity measures for molecules, Quantum circuit realization of morphological gradient for quantum grayscale image, A new quantum proxy signature model based on a series of genuine entangled states, The spectral analysis of the unitary matrix of a 2-tessellable staggered quantum walk on a graph, Faster search by lackadaisical quantum walk, Post-quantum static-static key agreement using multiple protocol instances, Low-communication parallel quantum multi-target preimage search, Quantum key-recovery on full AEZ, Quantum key search with side channel advice, Image classification based on quantum K-nearest-neighbor algorithm, Quantum-assisted blockchain, On the probability of finding marked connected components using quantum walks, Similarity analysis between quantum images, Quantum partial search for uneven distribution of multiple target items, A novel quantum solution to secure two-party distance computation, Quantum realization of the nearest neighbor value interpolation method for INEQR, Mapping from multiple-control Toffoli circuits to linear nearest neighbor quantum circuits, Finite-data-size study on practical universal blind quantum computation, Discrete-time quantum walk on the Cayley graph of the dihedral group, The quantum Fourier transform based on quantum vision representation, Multi-image encryption scheme based on quantum 3D Arnold transform and scaled Zhongtang chaotic system, A high capacity quantum weak blind signature based on logistic chaotic maps, Neurocomputing approach to matrix product state using quantum dynamics, Quantum Relief algorithm, An all-pair quantum SVM approach for big data multiclass classification, X states of the same spectrum and entanglement as all two-qubit states, Enhanced least significant qubit watermarking scheme for quantum images, Quantum walks: a comprehensive review, Multipartite entanglement in Grover's search algorithm, Spatial search using the discrete time quantum walk, Quantum algorithm for the multicollision problem, Quantum privacy-preserving price E-negotiation, Quantum walks on hypergraphs, Correlation property of multipartite quantum image, Permutation symmetric hypergraph states and multipartite quantum entanglement, Entanglement in the interaction between two quantum oscillators systems, Uniformity of quantum circuit families for error-free algorithms, Trojan-horse attacks on quantum key distribution with classical bob, A quantum computing primer for operator theorists, An optical model of computation, Verifiable quantum secret sharing based on a single qudit, Optimized quantum circuit partitioning, Ironwood meta key agreement and authentication protocol, A framework for reducing the overhead of the quantum oracle for use with Grover's algorithm with applications to cryptanalysis of SIKE, On certain self-orthogonal AG codes with applications to quantum error-correcting codes, Breaking LWC candidates: sESTATE and Elephant in quantum setting, Construction of distinct discrete time scattering quantum walk formulations on the honeycomb lattice, The Ihara expression for the generalized weighted zeta function of a finite simple graph, Breaking tweakable enciphering schemes using Simon's algorithm, \textsc{Ascon} v1.2: lightweight authenticated encryption and hashing, Internal symmetries and linear properties: full-permutation distinguishers and improved collisions on \textsf{Gimli}, An efficient anti-quantum lattice-based blind signature for blockchain-enabled systems, (One) failure is not an option: bootstrapping the search for failures in lattice-based encryption schemes, Tweaking the asymmetry of asymmetric-key cryptography on lattices: KEMs and signatures of smaller sizes, Improved classical cryptanalysis of SIKE in practice, On the compressed-oracle technique, and post-quantum security of proofs of sequential work, A study of the performance of classical minimizers in the quantum approximate optimization algorithm, Fast quantum subroutines for the simplex method, Towards quantum computing based community detection, The potential of quantum annealing for rapid solution structure identification, Periodicity of Grover walks on bipartite regular graphs with at most five distinct eigenvalues, Quantum median filter for total variation image denoising, An algebraic method to fidelity-based model checking over quantum Markov chains, Quantum algorithms for string processing, Entropy lower bounds for quantum decision tree complexity, The variational quantum eigensolver: a review of methods and best practices, Python's lunches in Jackiw-Teitelboim gravity with matter, Superimposition and antagonism in chain synthesis using entangled biphotonic control, Quantum generative adversarial networks based on Rényi divergences, Computing with quanta -- impacts of quantum theory on computation., Two-way finite automata with quantum and classical states., Quantum communication and complexity., Complexity measures and decision tree complexity: a survey., On the impossibility of interaction-free quantum sensing for small I/O bandwidth, Almost-everywhere superiority for quantum polynomial time, Mathematical models of quantum computation, One complexity theorist's view of quantum computing, On tight quantum security of HMAC and NMAC in the quantum random oracle model, Quantum collision attacks on reduced SHA-256 and SHA-512, Quantum algorithm for Boolean equation solving and quantum algebraic attack on cryptosystems, Model checking QCTL plus on quantum Markov chains, Formal semantics of a classical-quantum language, Quantum image encryption based on Baker map and 2D logistic map, Quantum support vector machine based on gradient descent, DTSMA: dominant swarm with adaptive T-distribution mutation-based slime mould algorithm, Quality of control in the Tavis-Cummings-Hubbard model, Factoring discrete-time quantum walks on distance regular graphs into continuous-time quantum walks, On forging SPHINCS\textsuperscript{+}-Haraka signatures on a fault-tolerant quantum computer, A note on quantum collision resistance of double-block-length compression functions, Secure multiparty computation in the bounded storage model, Towards quantum large-scale password guessing on real-world distributions, Quantum cryptanalysis on contracting Feistel structures and observation on related-key settings, Evaluation of quantum cryptanalysis on SPECK, Quantum algorithm for Dyck language with multiple types of brackets, Pholkos -- efficient large-state tweakable block ciphers from the AES round function, Controlled quantum secure direct communication with authentication based on quantum search algorithm, Quantum \((t,n)\) threshold proxy blind signature scheme based on Bell states, Ciphertext-only attacks against compact-LWE submitted to NIST PQC project, The polynomial learning with errors problem and the smearing condition, Beyond quadratic speedups in quantum attacks on symmetric schemes, Practical post-quantum signature schemes from isomorphism problems of trilinear forms, Quantum algorithms for anomaly detection using amplitude estimation, Succinct arguments in the quantum random oracle model, Periodicity of Grover walks on complete graphs with self-loops, Quantum attacks against type-1 generalized Feistel ciphers and applications to CAST-256, Reordering decision diagrams for quantum computing is harder than you might think, Verifiable user quantum session key agreement protocol for smart home environment, Quantum implementation and resource estimates for rectangle and knot, Secure two-party integer comparison protocol without any third party, Controlled SWAP attack and improved quantum encryption of arbitrated quantum signature schemes, Quantum cryptographic property testing of multi-output Boolean functions, Lattice surgery-based surface code architecture using remote logical CNOT operation, A quantum searching model finding one of the edges of a subgraph in a complete graph, Quantum learning of concentrated Boolean functions, A verifiable \((k, n)\)-threshold dynamic quantum secret sharing scheme, Quantum secure two-party Euclidean distance computation based on mutually unbiased bases, Asymmetric scaling of a quantum image based on bilinear interpolation with arbitrary scaling ratio, Quantum measurement detection algorithms, Faster search of clustered marked states with lackadaisical quantum walks, A novel quantum image watermarking scheme for tamper localization and self-recovery, Quantum zero correlation linear cryptanalysis, Cryptanalysis of LEDAcrypt, QIRHSI: novel quantum image representation based on HSI color space model, Quantum \(k\)-means algorithm based on Manhattan distance, Quantum absentminded driver problem revisited, Boundary extension methods to quantum signal mean filtering, Combinatorial and rotational quantum abstract detecting systems, Compression and reduction of \(N\ast1\) states by unitary matrices, Parallel quantum addition for Korean block ciphers, Practical post-quantum password-authenticated key exchange based-on module-lattice, \(T\)-\textit{depth} reduction method for efficient \textit{SHA}-256 quantum circuit construction, Grover on SM3, The average search probabilities of discrete-time quantum walks, Permutation-based special linear transforms with application in quantum image encryption algorithm, Geometric entanglement and quantum phase transition in generalized cluster-XY models, An improved flexible representation of quantum images, Efficient quantum steganography scheme using inverted pattern approach, Multi-server blind quantum computation protocol with limited classical communication among servers, Probability amplitude-encoded multichannel representation for quantum audio signals, A novel qutrit representation of quantum image, Quantum computations for disambiguation and question answering, Some efficient quantum circuit implementations of Camellia, Multipartite mixed maximally entangled states: mixed states with entanglement 1, A fast quantum image encryption algorithm based on affine transform and fractional-order Lorenz-like chaotic dynamical system, A quantum algorithm of K-means toward practical use, A new type of spectral mapping theorem for quantum walks with a moving shift on graphs, Quantum partial search algorithm with smaller oracles for multiple target items, Quantum cryptanalysis of the full AES-256-based Davies-Meyer, Hirose and MJH hash functions, An improved quantum algorithm for the quantum learning with errors problem, Boosting for quantum weak learners, Quantum permutation pad for universal quantum-safe cryptography, Image encryption with quantum cellular neural network, Applications of the Lambert-Tsallis \(W_q\) function in quantum photonic Gaussian boson sampling, Quantum image edge extraction based on improved Prewitt operator, Quantum image scaling based on bilinear interpolation with arbitrary scaling ratio, A hybrid classical-quantum algorithm for digital image processing, On state transfer in Cayley graphs for abelian groups, Improved BV-based quantum attack on block ciphers, Physical constraint-aware CNOT quantum circuit synthesis and optimization, A \((k, n)\)-threshold dynamic quantum secure multiparty multiplication protocol, Quantum algorithm for learning secret strings and its experimental demonstration, Novel controlled quantum dialogue protocols without information leakage, On subset-resilient hash function families, Analysis of client-side security for long-term time-stamping services, W-OTS\textsuperscript{+} up my sleeve! A hidden secure fallback for cryptocurrency wallets, Security comparisons and performance analyses of post-quantum signature algorithms, Upper bounds on communication in terms of approximate rank, ASM specification and refinement of a quantum algorithm, Classical and quantum algorithms for generic syndrome decoding problems and applications to the Lee metric, Quantum key search for ternary LWE, Attacks on beyond-birthday-bound MACs in the quantum setting, Quantum indistinguishability for public key encryption, Quantum Demiric-Selcuk meet-in-the-middle attacks on reduced-round AES, Semi-quantum voting protocol, Finding hash collisions with quantum computers by using differential trails with smaller probability than birthday bound, Implementing Grover oracles for quantum key search on AES and LowMC, Optimal merging in quantum \(k\)-xor and \(k\)-sum algorithms, The security analysis and improvement of some novel quantum proxy signature schemes, Commutativity of quantum weakest preconditions, An \(R||C_{\max}\) quantum scheduling algorithm, Non-Pauli observables for CWS codes, Quantum search with certainty based on modified Grover algorithms: optimum choice of parameters, Merkle's key agreement protocol is optimal: an \(O(n^2)\) attack on any key agreement from random oracles, Optimal parallel quantum query algorithms, Subspace projection method for unstructured searches with noisy quantum oracles using a signal-based quantum emulation device, Privacy-preserving point-inclusion protocol for an arbitrary area based on phase-encoded quantum private query, Theoretically extensible quantum digital signature with starlike cluster states, Exact simulation of coined quantum walks with the continuous-time model, Classification of patterns representing apples and oranges in three-qubit system, Generalized quantum counting algorithm for non-uniform amplitude distribution, An improved arbitrated quantum signature protocol based on the key-controlled chained CNOT encryption, Quantum attacks on some Feistel block ciphers, Approximate span programs, Cryptanalysis of a multi-party quantum key agreement protocol with single particles, Entanglement in phase estimation algorithm and quantum counting algorithm, The three-party quantum key agreement protocol with quantum Fourier transform, Quantum walks for the determination of commutativity of finite dimensional algebras, A macroscopic device for quantum computation, Quantum neural network with improved quantum learning algorithm, Quantum secure multi-party private set intersection cardinality, A novel neural network based on quantum computing, A signature scheme on \(p^2\)-dimensional quantum system, On the hitting times of quantum versus random walks, Signal and image compression using quantum discrete cosine transform, Improving the security of arbitrated quantum signature against the forgery attack, NEQR: a novel enhanced quantum representation of digital images, Improvements on ``multiparty quantum key agreement with single particles, Histogram-based segmentation of quantum images, Evolutionary algorithms for quantum computers, A quantum physical design flow using ILP and graph drawing, Solving SAT (and MaxSAT) with a quantum annealer: foundations, encodings, and preliminary results, Quantum vision representations and multi-dimensional quantum transforms, Quantum multi-level wavelet transforms, The Python's lunch: geometric obstructions to decoding Hawking radiation, Considering nearest neighbor constraints of quantum circuits at the reversible circuit level, Quantum circuit physical design methodology with emphasis on physical synthesis, Efficient protocol of \(N\)-bit discrete quantum Fourier transform via transmon qubits coupled to a resonator, Quantum key agreement with EPR pairs and single-particle measurements, A quantum genetic algorithm with quantum crossover and mutation operations, Quantum decision tree classifier, Multi-dimensional color image storage and retrieval for a normal arbitrary quantum superposition state, The sensitivity of a quantum PageRank, Automata theory based on quantum logic: reversibilities and pushdown automata, Proof rules for the correctness of quantum programs, The spectra of the unitary matrix of an \(n\)-tessellable staggered quantum walk on a graph, Secure two-party computation in a quantum world, Non-local quantum functions and the distributed Deutsch-Jozsa algorithm, An automated deductive verification framework for circuit-building quantum programs, Quantum attacks on sum of Even-Mansour pseudorandom functions, Quantum algorithm for K-nearest neighbors classification based on the categorical tensor network states, A new quantum payment protocol based on a set of local indistinguishable orthogonal product states, The cost reduction of distributed quantum factorization circuits, A novel quantum voting scheme based on BB84-state, A secure quantum voting scheme based on orthogonal product states, Quantum algorithms for the resiliency of vectorial Boolean functions, Quantum matrix multiplier, Quantum image scaling based on bilinear interpolation with decimals scaling ratio, Quantum search algorithm for exceptional vertexes in regular graphs and its circuit implementation, A quantum algorithm for a FULL adder operation based on registers of the CPU in a quantum-gated computer, Pauli half spinning and elliptic curve based information confidentiality mechanism, Reproducible families of codes and cryptographic applications, Verifiable quantum key exchange with authentication, Quantum online streaming algorithms with logarithmic memory, A little bit of classical magic to achieve (super-)quantum speedup, Quantum one go computation and the physical computation level of biological information processing, Quantum algorithms know in advance 50\% of the Solution they will find in the future, Coined quantum walks lift the cospectrality of graphs and trees, Hierarchy and equivalence of multi-letter quantum finite automata, Trajectory optimization using quantum computing, Quantum multi-valued Byzantine agreement based on d-dimensional entangled states, Strong privacy-preserving two-party scalar product quantum protocol, Quantum private set intersection cardinality and its application to anonymous authentication, A relational time-symmetric framework for analyzing the quantum computational speedup, Extended learning graphs for triangle finding, Discrete-time quantum walk with memory on the Cayley graph of the dihedral group, A secret information preservation scheme based on four-qubit entangled state, Quantum voting scheme based on locally indistinguishable orthogonal product states, Security analysis of particular quantum proxy blind signature against the forgery attack, Design of threshold segmentation method for quantum image, A generalized floating-point representation and manipulation of quantum signals based on IEEE-754, Modular lattice signatures, revisited, A quantum adiabatic algorithm for multiobjective combinatorial optimization, The cryptanalysis and improvement of a particular quantum voting model, An evolutionary approach to optimizing teleportation cost in distributed quantum computation, Quantum algorithm for shortest path search in directed acyclic graph, A novel quantum group proxy blind signature scheme based on five-qubit entangled state, Improved quantum image median filtering in the spatial domain, Quantum watermarking based on neighbor mean interpolation and LSB steganography algorithms, QCF: quantum collaborative filtering recommendation algorithm, Quantum image edge detection algorithm, Quantum image edge extraction based on improved Sobel operator, An efficient quantum private query protocol based on oracle and Grover iteration, Quantum binary search algorithm, Quantum algorithm for the root-finding problem, Quantum branch-and-bound algorithm and its application to the travelling salesman problem, Cryptanalysis of a quantum proxy weak blind signature scheme, A different Deutsch-Jozsa, Novel quantum proxy signature without entanglement, Nondeterministic finite automata based on quantum logic: language equivalence relation and robustness, Optimizing quantum models of classical channels: the reverse Holevo problem, WOTS-S: a quantum secure compact signature scheme for distributed ledger, Realization of Grover search algorithm on the optical cavities, Quantum image encryption algorithm based on Arnold scrambling and wavelet transforms, Supervised learning with a quantum classifier using multi-level systems, A quantum model of feed-forward neural networks with unitary learning algorithms, Quantum and classical query complexities for generalized Deutsch-Jozsa problems, A comment on: ``Quantum image processing?, Quantum algorithms for typical hard problems: a perspective of cryptanalysis, Emulation of high-performance correlation-based quantum clustering algorithm for two-dimensional data on FPGA, An investigation on support vector clustering for big data in quantum paradigm, Supersymmetry for chiral symmetric quantum walks, Quantum circuit design for several morphological image processing methods, The Witten index for 1D supersymmetric quantum walks with anisotropic coins, A weak limit theorem for a class of long-range-type quantum walks in 1d, A generic quantum protocol for one-sided secure two-party classical computations, Implementation of quantum secret sharing and quantum binary voting protocol in the IBM quantum computer, Amplitude estimation without phase estimation, A general protocol for distributed quantum gates, Complete analysis of Simon's quantum algorithm with additional collisions, Order-encoded quantum image model and parallel histogram specification, On the continuity of quantum correlation quantifiers, Image encryption using quantum 3-D Baker map and generalized gray code coupled with fractional Chen's chaotic system, Fault-tolerant quantum error correction code preparation in UBQC, Quantum image mid-point filter, A quantum related-key attack based on the Bernstein-Vazirani algorithm, Quantum abstract detecting systems, Improved quantum algorithm for MMSE-based massive MIMO uplink detection, A low failure rate quantum algorithm for searching maximum or minimum, Quantum algorithms for learning the algebraic normal form of quadratic Boolean functions, Quantum circuit for the fast Fourier transform, Quantum locally linear embedding for nonlinear dimensionality reduction, Advanced exact synthesis of Clifford+T circuits, Search on vertex-transitive graphs by lackadaisical quantum walk, Grover on \(SIMON\), Asymmetric scaling scheme over the two dimensions of a quantum image, Quantum kernel logistic regression based Newton method, Optimized reversible quantum circuits for \(\mathbb{F}_{2^8}\) multiplication, From the sum-of-squares representation of a Boolean function to an optimal exact quantum query algorithm, Total functions in QMA, A generalized floating-point quantum representation of 2-D data and their applications, Experimental pairwise entanglement estimation for an \(N\)-qubit system. A machine learning approach for programming quantum hardware, Quantum algorithms for the Goldreich-Levin learning problem, A quantum distinguisher for 7/8-round SMS4 block cipher, Overview: recent development and applications of reduction and lackadaisicalness techniques for spatial search quantum walk in the near term, Qubits' mapping and routing for NISQ on variability of quantum gates, An index theorem for one-dimensional gapless non-unitary quantum walks, On the optimal schedule of adiabatic quantum computing, Quantum secure multi-party summation based on entanglement swapping, A novel quantum anonymous ranking protocol, Quantum security of grain-128/grain-128a stream cipher against HHL algorithm, Entanglement universality of TGX states in qubit-qutrit systems, Quantum attacks against BBB secure PRFs or MACs built from public random permutations, An improved efficient identity-based quantum signature scheme, Measurement-device-independent quantum protocol for E-payment based on blockchain, Quantum reversible circuits for \(\mathrm{GF}(2^8)\) multiplication based on composite field arithmetic operations, Equivalence of single-server and multiple-server blind quantum computation protocols, A quantum key distribution routing scheme for hybrid-trusted QKD network system, Quantum algorithm for matrix logarithm by integral formula, Quantum algorithm for the advection-diffusion equation simulated with the lattice Boltzmann method, Mermin polynomials for non-locality and entanglement detection in Grover's algorithm and quantum Fourier transform, The linear cyclic translation and two-point swapping transformations for quantum images, A quantum voting protocol using single-particle states, Configurable sublinear circuits for quantum state preparation, Quantum reinforcement learning. Comparing quantum annealing and gate-based quantum computing with classical deep reinforcement learning, Quantum advantage in deciding NP-complete problems, Quantum search for scaled hash function preimages, Quantum search of matching on signed graphs, A novel quantum E-payment protocol based on blockchain, Quantum \(k\)-means algorithm based on trusted server in quantum cloud computing, Probabilistic nonunitary gate in imaginary time evolution, Optimal quantum state transformations based on machine learning, On a poset of quantum exact promise problems, Connectivity matrix model of quantum circuits and its application to distributed quantum circuit optimization, New results on \(\mathsf{Gimli}\): full-permutation distinguishers and improved collisions, Cryptographic group actions and applications, B-SIDH: supersingular isogeny Diffie-Hellman using twisted torsion, Improved classical and quantum algorithms for subset-sum, Quantum circuit implementations of AES with fewer qubits, Quantum collision attacks on AES-like hashing with low quantum random access memories, Probabilistic bisimulations for quantum processes, Quantum certificate complexity, Lower bounds for predecessor searching in the cell probe model, Quantum and classical complexity classes: Separations, collapses, and closure properties, Polynomial degree vs. quantum query complexity, Some formal tools for analyzing quantum automata., Hybrid genetic algorithm based on quantum computing for numerical optimization and parameter estimation, On the complexity of searching for a maximum of a function on a quantum computer, Zeno machines and hypercomputation, Determination of equivalence between quantum sequential machines, QSobel: a novel quantum image edge extraction algorithm, A quantum algorithm for Viterbi decoding of classical convolutional codes, A novel quantum group signature scheme without using entangled states, Determining the equivalence for one-way quantum finite automata, Discrete quantum walks hit exponentially faster, A theory of computation based on quantum logic. I, Quantum and classical tradeoffs, Universal test for quantum one-way permutations, Quantum algorithm for the computation of the reactant conversion rate in homogeneous turbulence, The Supersingular Isogeny Problem in Genus 2 and Beyond, The Power of Few Qubits and Collisions – Subset Sum Below Grover’s Bound, On Quantum Distinguishers for Type-3 Generalized Feistel Network Based on Separability, Localization of space-inhomogeneous three-state quantum walks, LESS is More: Code-Based Signatures Without Syndromes, Relativistic Effects Can Be Used to Achieve a Universal Square-Root (Or Even Faster) Computation Speedup, Query Complexity in Expectation, On the Size of One-way Quantum Finite Automata with Periodic Behaviors, Grover search with lackadaisical quantum walks, Ternary logic design in topological quantum computing, Span-Program-Based Quantum Algorithm for Evaluating Unbalanced Formulas, Multi-query Quantum Sums, Time-Space Complexity Advantages for Quantum Computing, Fast Discretized Gaussian Sampling and Post-quantum TLS Ciphersuite, Quantum circuits of $ \newcommand{\cZ}{c-\mathtt{Z}} \cZ$ and $ \newcommand{\Swap}{\mathtt{SWAP}} \Swap$ gates: optimization and entanglement, Quantum lattice algorithms: similarities and connections to some classic finite difference algorithms, Using $$\pi $$ DDs for Nearest Neighbor Optimization of Quantum Circuits, Checking Reversibility of Boolean Functions, Breaking the Minsky--Papert Barrier for Constant-Depth Circuits, Grover’s search with local and total depolarizing channel errors: Complexity analysis, Quantum machine learning: a classical perspective, Security analysis of the W-OTS$^+$ signature scheme: Updating security bounds, Near-Optimal Bounds on the Bounded-Round Quantum Communication Complexity of Disjointness, The trace formula with respect to the Grover matrix of a graph, Solving Lyapunov equation by quantum algorithm, On the Isogeny Problem with Torsion Point Information, History dependent quantum random walks as quantum lattice gas automata, Quantum Complexity of Boolean Matrix Multiplication and Related Problems, Ultrametric Algorithms and Automata, Localization for a one-dimensional split-step quantum walk with bound states robust against perturbations, From 5-Pass $$\mathcal {MQ}$$-Based Identification to $$\mathcal {MQ}$$-Based Signatures, Quantum Walk Based Search Algorithms, Stronger Methods of Making Quantum Interactive Proofs Perfectly Complete, Lackadaisical quantum walk for spatial search, Unnamed Item, Quantum Algorithm for Systems of Linear Equations with Exponentially Improved Dependence on Precision, Quantum key distribution without the wavefunction, Quantum image sharpness estimation based on the Laplacian operator, Probability distributions for Markov chain based quantum walks, Quantum image scrambling algorithm based on discrete Baker map, Quantum greedy algorithms for multi-armed bandits, Quantum classifiers for domain adaptation, Quantum all-subkeys-recovery attacks on 6-round Feistel-\(2^\ast\) structure based on multi-equations quantum claw finding, Multipartite entanglement detection for hypergraph states, Quantum key-length extension, Quantum circuits synthesis using Householder transformations, An efficient controlled quantum secure direct communication and authentication by using four particle cluster states, A QUBO formulation for the tree containment problem, Quantum meets fine-grained complexity: sublinear time quantum algorithms for string problems, Unnamed Item, QUBO formulation for the contact map overlap problem, Merkle Tree Traversal Revisited, The quantum walk search algorithm: factors affecting efficiency, A Quantum Implementation Model for Artificial Neural Networks, Quantum Query Algorithms are Completely Bounded Forms., A classical limit of Grover’s algorithm induced by dephasing: Coherence versus entanglement, Committing to Quantum Resistance, Better: A Speed-and-Risk-Configurable Defence for Bitcoin Against a Fast Quantum Computing Attack, Quantum Resistant Public Key Encryption Scheme polarRLCE, Entanglement and the Temperley-Lieb category, The Road to Quantum Computational Supremacy, Quantum Query Algorithms Are Completely Bounded Forms, A Quantum Jensen-Shannon Graph Kernel Using Discrete-Time Quantum Walks, An introduction to quantum annealing, On the Security of the Winternitz One-Time Signature Scheme, Techniques for Formal Modelling and Analysis of Quantum Systems, Unnamed Item, Unnamed Item, Unnamed Item, Unnamed Item, Unnamed Item, Unnamed Item, Unnamed Item, Span-program-based quantum algorithm for evaluating formulas, Post-Quantum Cryptography: State of the Art, Superlinear Advantage for Exact Quantum Algorithms, Unnamed Item, Optimization of $S$-boxes GOST R 34.12-2015 «Magma» quantum circuits without ancilla qubits, Quantum computation techniques for gauging reliability of interval and fuzzy data, Square root of ‘not’: a major difference between fuzzy and quantum logics, Universality, Invariance, and the Foundations of Computational Complexity in the Light of the Quantum Computer, Quantum-enhanced deliberation of learning agents using trapped ions, Unnamed Item, Synthesis of Quantum Circuits for Dedicated Physical Machine Descriptions, The Arrow Calculus as a Quantum Programming Language, Unnamed Item, Scalar System F for Linear-Algebraic λ-Calculus: Towards a Quantum Physical Logic, Fine-Grained Reductions and Quantum Speedups for Dynamic Programming., Algorithms and lower bounds for de morgan formulas of low-communication leaf gates, Breaking Symmetric Cryptosystems Using Quantum Period Finding, Semantic Security and Indistinguishability in the Quantum World, An improved E-payment protocol based on quantum blind signature without entanglement, Unnamed Item, Boolean satisfiability in quantum compilation, The Complexity of Satisfiability of Small Depth Circuits, The complexity of quantum disjointness, Entropy generation in a model of reversible computation, An upper bound on the rate of information transfer by Grover's oracle, Quantum Data and Control Made Easier, Testing Boolean Functions Properties, Quantum Speedup for Graph Sparsification, Cut Approximation, and Laplacian Solving, Tensors in computations, Classical and Quantum Random-Walk Centrality Measures in Multilayer Networks, An Optimal Separation of Randomized and Quantum Query Complexity, Quantum Walks, Natural Quantum Operational Semantics with Predicates, Unnamed Item, Quantum discriminative canonical correlation analysis, Quantum security analysis of Rocca, New results on quantum boomerang attacks, Software science view on quantum circuit algorithms, A New Variant of Unbalanced Oil and Vinegar Using Quotient Ring: QR-UOV, Entangled rendezvous: a possible application of Bell non-locality for mobile agents on networks, A quantum search algorithm of two-dimensional convex hull, Hypercube quantum search: exact computation of the probability of success in polynomial time, Quantum algorithm for dynamic programming approach for DAGs and applications, The improvement of decision tree construction algorithm based on quantum heuristic algorithms, Quantum amplitude amplification algorithm simulation for prediction of a binary classification problem, Cryptographic properties of the quantum hashing based on expander graphs, Lattice Sieving via Quantum Random Walks, Conditional quantum circuit Born machine based on a hybrid quantum-classical framework, Efficient implementation of LIMDDs for quantum circuit simulation, Breaking symmetric cryptosystems using the offline distributed Grover-Meets-Simon algorithm, EQIRHSI: enhanced quantum image representation using entanglement state encoding in the HSI color model, Quantum key recovery attacks on tweakable Even-Mansour ciphers, Solving some cryptanalytic problems for lattice-based cryptosystems with quantum annealing method, An introduction to variational quantum algorithms for combinatorial optimization problems, Dynamical Controls for Improving Quantum Search Algorithm Through Flux Qubits System, Memetic algorithm based on extension step and statistical filtering for large-scale capacitated arc routing problems, Improved attacks against reduced-round Whirlwind, A practitioner’s guide to quantum algorithms for optimisation problems, Implementing evolutionary optimization on actual quantum processors, Correlation inequalities for the uniform eight-vertex model and the toric code model, Following forrelation -- quantum algorithms in exploring Boolean functions' spectra, Quantum attacks on generalized Feistel networks based on the strong-weak separability, Quantum algorithm for estimating largest eigenvalues, Quantum circuit implementation and resource analysis of LBlock and LiCi, Optimized quantum implementation of AES, A family of unitaries for the quantum period finding algorithm, Quantum Simulation of Tunable Neuron Activation, Dequantizing the Quantum singular value transformation: hardness and applications to Quantum chemistry and the Quantum PCP conjecture, Finding many collisions via reusable quantum walks. Application to lattice sieving, M-SIDH and MD-SIDH: countering SIDH attacks by masking information, Semi-quantum key distribution using qudit systems and security proof, MPMCT gate decomposition method reducing T-depth quickly in proportion to the number of work qubits, A design method for efficient variational quantum models based on specific Pauli axis, A user-centric quantum benchmarking test suite and evaluation framework, Universal Classical Optical Computing Inspired by Quantum Information Process, Identifying quantum correlations using explicit SO(3) to SU(2) maps, Optimization of quantum Hamiltonian evolution: From two projection operators to local Hamiltonians, A formulation of a matrix sparsity approach for the quantum ordered search algorithm, An Introduction to Quantum Computing, without the Physics, Nonlinear quantum search using the Gross–Pitaevskii equation, Quantum lower bounds by quantum arguments, Bitcoin Crypto–Bounties for Quantum Capable Adversaries, The Discrete-time Quaternionic Quantum Walk and the Second Weighted Zeta Function on a Graph, Periodicity of the Discrete-time Quantum Walk on a Finite Graph, Quantum and classical query complexities of local search are polynomially related, Noise effects in the quantum search algorithm from the viewpoint of computational complexity, Subset Sum Quantumly in 1.17 n ., A class of time-energy uncertainty relations for time-dependent Hamiltonians, Variational Quantum Eigensolver and Its Applications, Efficient Construction of Functional Representations for Quantum Algorithms, Microstate distinguishability, quantum complexity, and the eigenstate thermalization hypothesis, Quantum complexity of integration, Counting by quantum eigenvalue estimation, Quantum simulations of classical random walks and undirected graph connectivity, Quantum associative memory with distributed queries, Basing Weak Public-Key Cryptography on Strong One-Way Functions, Quantum Random Walks – New Method for Designing Quantum Algorithms, Quantum Walks with Multiple or Moving Marked Locations, Algorithms on ensemble quantum computers, Trace monoids with idempotent generators and measure-only quantum automata, A hybrid quantum-classical paradigm to mitigate embedding costs in quantum annealing, Quantum circuits for calculating the squared sum of the inner product of quantum states and its application, Grover’s Search with Faults on Some Marked Elements, How does adiabatic quantum computation fit into quantum automata theory?, The addition and subtraction of quantum matrix based on GNEQR, Quantum search on Hanoi network, On the power of two-way multihead quantum finite automata, Multiobjective Optimization Grover Adaptive Search, Sized Types for Low-Level Quantum Metaprogramming, Evaluating the Flexibility of A* for Mapping Quantum Circuits, Implementing NChooseK on IBM Q Quantum Computer Systems, Unnamed Item, Generation of elementary gates and Bell’s states using controlled adiabatic evolutions, A novel quantum steganography scheme based on ASCII, Communication Lower Bounds Using Directional Derivatives, Classical and Quantum Algorithms for Exponential Congruences, Quantum Algorithms for Evaluating Min-Max Trees, A Post-quantum Digital Signature Scheme Based on Supersingular Isogenies, Exponentially more precise quantum simulation of fermions in second quantization, Faster than classical quantum algorithm for dense formulas of exact satisfiability and occupation problems, Optimal quantum networks and one-shot entropies, A SCHEMATIC DEFINITION OF QUANTUM POLYNOMIAL TIME COMPUTABILITY, Unnamed Item, Exponential-time quantum algorithms for graph coloring problems, Quantum simulation of quantum relativistic diffusion via quantum walks, First-order quantum phase transitions as condensations in the space of states, Algorithm for initializing a generalized fermionic Gaussian state on a quantum computer, Quantum Monte Carlo for economics: stress testing and macroeconomic deep learning, Classical and quantum algorithms for constructing text from dictionary problem, Coherence and entanglement in Grover and Harrow-Hassidim-Lloyd algorithm, Quantum alternating operator ansatz for solving the minimum exact cover problem, Grover search inspired alternating operator ansatz of quantum approximate optimization algorithm for search problems, Allocating rotational cryptanalysis-based preimage attack on 4-round \textsc{Keccak}-224 for quantum setting, A comprehensive review on blockchains for Internet of Vehicles: challenges and directions, Quantity study on a novel quantum neural network with alternately controlled gates for binary image classification, A novel quantum representation of fuzzy image and simulation on IBMQ, Solving the learning parity with noise problem using quantum algorithms, Research on key technologies of controlled bidirectional quantum teleportation, On the impossibility of key agreements from quantum random oracles, Quantum traveler's dilemma and the role of non-maximal entanglement, Phase shift and multi-controlled \(Z\)-type gates, Quantum speedup for solving the minimum vertex cover problem based on Grover search algorithm, Implementing Grover oracle for lightweight block ciphers under depth constraints, An injectivity analysis of Crystals-Kyber and implications on quantum security, Quantum-resistant password-based threshold single-sign-on authentication with updatable server private key, Post-quantum security on the Lai-Massey scheme, Quantum time complexity and algorithms for pattern matching on labeled graphs, Implicit rejection in Fujisaki-Okamoto: framework and a novel realization, Application of quantum approximate optimization algorithm to job shop scheduling problem, Quantum cryptanalysis of Farfalle and (generalised) key-alternating Feistel networks, Quantum impossible differential attacks: applications to AES and SKINNY, Introducing nega-forrelation: quantum algorithms in analyzing nega-Hadamard and nega-crosscorrelation spectra, Optimizing the depth of quantum implementations of linear layers, IND-CCA security of Kyber in the quantum random oracle model, revisited, Nostradamus goes quantum, Synthesizing quantum circuits of AES with lower \(T\)-depth and less qubits, Exploring SAT for cryptanalysis: (quantum) collision attacks against 6-round SHA-3, A non-heuristic approach to time-space tradeoffs and optimizations for BKW, Some remarks on super-Gram operators for general bipartite quantum states, A novel quantum private set intersection scheme with a semi-honest third party, Twin-field quantum encryption protocol for E-payment based on blockchain, Uncovering instabilities in variational-quantum deep Q-networks, Non-uniformity and quantum advice in the quantum random oracle model, Comments on ``Efficient classical simulation of the Deutsch-Jozsa and Simon's algorithms, Decoy-state quantum private query protocol with two-way communication, Lifting query complexity to time-space complexity for two-way finite automata, QuanPath: achieving one-step communication for distributed quantum circuit simulation, Chiral‐Quantum‐Optics‐Based Supervised Learning, Variational quantum computation integer factorization algorithm, Quantum time/memory/data tradeoff attacks, Quantum string matching unfolded and extended, Optimizing quantum space using spooky pebble games, Uncomputation in the Qrisp high-level quantum programming framework, Improved cost-metric for nearest neighbor mapping of quantum circuits to 2-dimensional hexagonal architecture, Efficient algorithm for full-state quantum circuit simulation with DD compression while maintaining accuracy, A review of developments in superconducting quantum processors, Quantum algorithm for lexicographically minimal string rotation, Quantum ant colony optimization algorithm for AGVs path planning based on Bloch coordinates of pheromones, Algebraic representation of Three Qubit Quantum Circuit Problems, Automatic classical and quantum rebound attacks on AES-like hashing by exploiting related-key differentials, Quantum linearization attacks, FAST: secure and high performance format-preserving encryption and tokenization, Quantum resource estimation for FSR based symmetric ciphers and related Grover's attacks, DeCSIDH: delegating isogeny computations in the CSIDH setting, Basic circuit compilation techniques for an ion-trap quantum machine, A verifiable \((k,n)\)-threshold quantum secure multiparty summation protocol, Simplified MITM modeling for permutations: new (quantum) attacks, Simon's algorithm and symmetric crypto: generalizations and automatized applications, Quantum walk search on a two-dimensional grid with extra edges, Quantum attacks on Lai-Massey structure, Sponge-based authenticated encryption: security against quantum attackers, Quantum algorithm for unsupervised anomaly detection, Discrete-time semiclassical Szegedy quantum walks, A feasible semi-quantum private comparison based on entanglement swapping of Bell states, Quantum attacks on beyond-birthday-bound MACs, The Witten index for one-dimensional split-step quantum walks under the non-Fredholm condition, The parallel reversible pebbling game: analyzing the post-quantum security of iMHFs, Improved quantum analysis of SPECK and LowMC, Quantum attacks on PRFs based on public random permutations, On security notions for encryption in a quantum world, Two remarks on the vectorization problem, Quantum complexity for vector domination problem, Universal reductions: reductions relative to stateful oracles, Security loophole and improvement of quantum private query protocol based on W state, Performance analysis of the hardware-efficient quantum search algorithm, Decoherence mitigation by embedding a logical qubit in a qudit, A universal quantum algorithm for weighted maximum cut and Ising problems, Quantum circuit implementations of SM4 block cipher based on different gate sets, \textsf{symQV}: automated symbolic verification of quantum programs, Near-optimal quantum algorithms for string problems, Discrete-time quantum walks on one-dimensional lattices, High-speed train timetable optimization based on space-time network model and quantum simulator, Two-round quantum homomorphic encryption scheme based on matrix decomposition, Non-Boolean quantum amplitude amplification and quantum mean estimation, A Quantum Parallel Markov Chain Monte Carlo, A polynomial system for bit-based division property solving by quantum algorithm, Further insights on constructing quantum circuits for Camellia block cipher, A side-channel attack against \textit{Classic McEliece} when loading the Goppa polynomial, Quantum clustering with \(k\)-means: a hybrid approach, Quantum linear key-recovery attacks using the QFT, Distributed Grover's algorithm, Twice upon a time: timelike-separated quantum extremal surfaces, Quantum algorithms for learning hidden strings with applications to matroid problems, An approach to the classification of finite semifields by quantum computing, The Ihara expression of a generalization of the weighted zeta function on a finite digraph