25th Pan-Hellenic Conference on Informatics 2021
DOI: 10.1145/3503823.3503895
|View full text |Cite
|
Sign up to set email alerts
|

Implementation of Shor's Algorithm and Reliability of Quantum Computing Devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 10 publications
0
4
0
Order By: Relevance
“…Shor’s algorithm, a pivotal factorization solver, finds the prime factors of a large composite number using multiple queries to the quantum oracle. It runs in O((log N)^3) time on a quantum computer, a vast improvement compared to the O(exp((1/3)(log N)^(1/3)(log log N)^(2/3))) time on a classical computer [ 122 , 123 ].…”
Section: Quantum Concepts In Biologymentioning
confidence: 99%
“…Shor’s algorithm, a pivotal factorization solver, finds the prime factors of a large composite number using multiple queries to the quantum oracle. It runs in O((log N)^3) time on a quantum computer, a vast improvement compared to the O(exp((1/3)(log N)^(1/3)(log log N)^(2/3))) time on a classical computer [ 122 , 123 ].…”
Section: Quantum Concepts In Biologymentioning
confidence: 99%
“…In 1994, P. Shor proposed a polynomial time quantum algorithm for solving the integer factorization and discrete logarithm problems. Current quantum computer technology does not yet allow these problems to be solved with large integers [29]. The quantum routine adopted in Shor's algorithm, which uses periodicity, does not seem to be suitable for lattice problems.…”
Section: Quantum Computers and Latticesmentioning
confidence: 99%
“…BB84 is the most studied, analyzed, and implemented QKD protocol; since then, various QKD protocols have been proposed. B92 and SARG04, which are known as variants of BB84 and E91 that exploit the phenomenon of quantum entanglement, are a few of the widely known quantum key distribution protocols [1]. All these QKD protocol are in theory well designed and structured and are proved to be secure, but in practice, there are imperfections in their implementation.…”
Section: Quantum Key Distributionmentioning
confidence: 99%
“…Quantum computing constitutes a critical issue as the impact of its advent and development will be present in every cell of our technology and therefore, our life. Quantum computational systems use the qubit (QUantum BIT) instead of the typical bit, which has a unique property; it can be in basic states |0 , |1 but it can also be in a state that is a linear combination of these two states, such that a|0 + b|1 , a, b ∈ C, ∧a 2 + b 2 = 1 [1]. This is an algebraic-mathematical expression of quantum superposition which claims that two quantum states can be added and their sum can also be a valid quantum state [2].…”
Section: Introductionmentioning
confidence: 99%