Sciweavers

508 search results - page 60 / 102
» Quantum Computers
Sort
View
TCC
2009
Springer
131views Cryptology» more  TCC 2009»
14 years 11 months ago
Secure Computability of Functions in the IT Setting with Dishonest Majority and Applications to Long-Term Security
It is well known that general secure function evaluation (SFE) with information-theoretical (IT) security is infeasible in presence of a corrupted majority in the standard model. ...
Robin Künzler, Jörn Müller-Quade, D...
ISCA
2008
IEEE
113views Hardware» more  ISCA 2008»
14 years 5 months ago
Running a Quantum Circuit at the Speed of Data
We analyze circuits for a number of kernels from popular quantum computing applications, characterizing the hardware resources necessary to take ancilla preparation off the critic...
Nemanja Isailovic, Mark Whitney, Yatish Patel, Joh...
DAC
2009
ACM
15 years 4 days ago
BDD-based synthesis of reversible logic for large functions
Reversible logic is the basis for several emerging technologies such as quantum computing, optical computing, or DNA computing and has further applications in domains like low-pow...
Robert Wille, Rolf Drechsler
ISAAC
2003
Springer
115views Algorithms» more  ISAAC 2003»
14 years 4 months ago
A Faster Lattice Reduction Method Using Quantum Search
We propose a new lattice reduction method. Our algorithm approximates shortest lattice vectors up to a factor ≤ (k/6)n/2k and makes use of Grover’s quantum search algorithm. Th...
Christoph Ludwig
ICS
2010
Tsinghua U.
14 years 8 months ago
On the Power of a Unique Quantum Witness
Rahul Jain, Iordanis Kerenidis, Greg Kuperberg, Mi...