Quantum singular value transformation and beyond: exponential improvements for quantum matrix arithmetics. arXiv preprint arXiv:1806.01838, 2018. ^Linlin. Lecture Notes on Quantum Algorithms for Scientific Computation. ^abYulong Dong, Xiang Meng, K. Birgitta Whaley, and Lin Lin. Efficient phase- ...
Algorithms for quantum computation: Discrete logarithms and factoring. In Proceedings 35th annual symposium on foundations of computer science (ed. Shor, P. W.) 124–134 (IEEE, 1994). Chapter Google Scholar Grover, L. K. Quantum mechanics helps in searching for a needle in a haystack. Phys...
1935:The German physicistAlbert Einstein, US physicistBoris Podolskyand US-Israeli physicistNathan Rosencast doubt on the quantum mechanical conception of the world in a scientific paper (Can quantum-mechanical description of physical reality be considered complete?). An assumption that was to be refut...
Our contribution is threefold: First, we present novel recursive algorithms for Hierarchical Tucker, Tucker, and Tensor Train networks suitable for quantum annealers, which can also be applied to other types of Boolean and non-Boolean tensor networks. These algorithms complement their iterative counterp...
Unary quantum gates are not sufficient for building a universal quantum computer (that is a computer capable of executing all the possible quantum algorithms). Therefore we need to introduce systems of multiple qubits. In classical computation, since a bit is an element of the set {0,1}, to...
We will present a systematic way to develop quantum simulation algorithms for general differential equations. Our basic framework is dimension lifting, that transfers nonlinear PDEs to linear ones, and linear ones to Schrodinger t...
Shor, P. W. Algorithms for quantum computation: discrete logarithms and factoring. InProc. 35th Annual Symposium on Foundations of Computer Science, 124–134 (IEEE, 1994). Lloyd, S. Universal quantum simulators.Science273, 1073–1078 (1996). ...
factoring makes possible the ability to break many of our public key cryptosystems underlying the security of e-commerce today, including RSA and Elliptic Curve Cryptography. This discovery sparked a huge interest in quantum computing and led to the development of quantum algorithms for many other ...
QKD generates keying material for an encryption algorithm that provides confidentiality. Such keying material could also be used in symmetric key cryptographic algorithms to provide integrity and authentication if one has the cryptographic assurance that the original QKD transmission comes from the desired ...
3. Quantum Computing and Quantum Evolutionary Algorithms Since the origins of quantum genetic algorithms (QGAs) [9] until today, lots of QGAs have been proposed in the scientific literature [37,38,39,40,41]. All kinds of quantum evolutionary algorithms have been successfully applied to optimizat...