These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
125 related articles for article (PubMed ID: 35546191)
21. Influence of superpositional wave function oscillations on Shor's quantum algorithm. Berman GP; Doolen GD; Tsifrinovich VI Phys Rev Lett; 2000 Feb; 84(7):1615-8. PubMed ID: 11017581 [TBL] [Abstract][Full Text] [Related]
22. Memory attacks on device-independent quantum cryptography. Barrett J; Colbeck R; Kent A Phys Rev Lett; 2013 Jan; 110(1):010503. PubMed ID: 23383767 [TBL] [Abstract][Full Text] [Related]
23. A quantum encryption design featuring confusion, diffusion, and mode of operation. Hu Z; Kais S Sci Rep; 2021 Dec; 11(1):23774. PubMed ID: 34893658 [TBL] [Abstract][Full Text] [Related]
24. Experimental demonstration of a compiled version of Shor's algorithm with quantum entanglement. Lanyon BP; Weinhold TJ; Langford NK; Barbieri M; James DF; Gilchrist A; White AG Phys Rev Lett; 2007 Dec; 99(25):250505. PubMed ID: 18233509 [TBL] [Abstract][Full Text] [Related]
25. Quantum Oblivious Transfer: A Short Review. Santos MB; Mateus P; Pinto AN Entropy (Basel); 2022 Jul; 24(7):. PubMed ID: 35885167 [TBL] [Abstract][Full Text] [Related]
26. Suggested Integral Analysis for Chaos-Based Image Cryptosystems. Murillo-Escobar MA; Meranza-Castillón MO; López-Gutiérrez RM; Cruz-Hernández C Entropy (Basel); 2019 Aug; 21(8):. PubMed ID: 33267528 [TBL] [Abstract][Full Text] [Related]
27. Proof-of-principle demonstration of compiled Shor's algorithm using a quantum dot single-photon source. Duan ZC; Li JP; Qin J; Yu Y; Huo YH; Höfling S; Lu CY; Liu NL; Chen K; Pan JW Opt Express; 2020 Jun; 28(13):18917-18930. PubMed ID: 32672180 [TBL] [Abstract][Full Text] [Related]
28. Cyber-physical defense in the quantum Era. Barbeau M; Garcia-Alfaro J Sci Rep; 2022 Feb; 12(1):1905. PubMed ID: 35115576 [TBL] [Abstract][Full Text] [Related]
30. Learning Perfectly Secure Cryptography to Protect Communications with Adversarial Neural Cryptography. Coutinho M; de Oliveira Albuquerque R; Borges F; García Villalba LJ; Kim TH Sensors (Basel); 2018 Apr; 18(5):. PubMed ID: 29695066 [TBL] [Abstract][Full Text] [Related]
31. The future of Cochrane Neonatal. Soll RF; Ovelman C; McGuire W Early Hum Dev; 2020 Nov; 150():105191. PubMed ID: 33036834 [TBL] [Abstract][Full Text] [Related]
32. Differential Phase Shift Quantum Secret Sharing Using a Twin Field with Asymmetric Source Intensities. Jia ZY; Gu J; Li BH; Yin HL; Chen ZB Entropy (Basel); 2021 Jun; 23(6):. PubMed ID: 34199849 [TBL] [Abstract][Full Text] [Related]
33. Quantum Schur Sampling Circuits can be Strongly Simulated. Havlíček V; Strelchuk S Phys Rev Lett; 2018 Aug; 121(6):060505. PubMed ID: 30141646 [TBL] [Abstract][Full Text] [Related]
35. A Rainbow-Based Authentical Scheme for Securing Smart Connected Health Systems. Yi H; Li J; Lin Q; Wang H; Song H; Ming Z; Nie Z J Med Syst; 2019 Jul; 43(8):276. PubMed ID: 31280402 [TBL] [Abstract][Full Text] [Related]
37. An Approach to Cryptography Based on Continuous-Variable Quantum Neural Network. Shi J; Chen S; Lu Y; Feng Y; Shi R; Yang Y; Li J Sci Rep; 2020 Feb; 10(1):2107. PubMed ID: 32034194 [TBL] [Abstract][Full Text] [Related]
38. Committing to quantum resistance: a slow defence for Bitcoin against a fast quantum computing attack. Stewart I; Ilie D; Zamyatin A; Werner S; Torshizi MF; Knottenbelt WJ R Soc Open Sci; 2018 Jun; 5(6):180410. PubMed ID: 30110420 [TBL] [Abstract][Full Text] [Related]
39. Quantum Attacks on Sum of Even-Mansour Construction with Linear Key Schedules. Zhang P Entropy (Basel); 2022 Jan; 24(2):. PubMed ID: 35205449 [TBL] [Abstract][Full Text] [Related]
40. Towards Green Computing Oriented Security: A Lightweight Postquantum Signature for IoE. Rani R; Kumar S; Kaiwartya O; Khasawneh AM; Lloret J; Al-Khasawneh MA; Mahmoud M; Alarood AA Sensors (Basel); 2021 Mar; 21(5):. PubMed ID: 33800227 [TBL] [Abstract][Full Text] [Related] [Previous] [Next] [New Search]