Quantum algorithms for attacking hardness assumptions in classical and post-quantum cryptography.
Jean-François BiasseXavier BonnetainElena KirshanovaAndré SchrottenloherFang SongPublished in: IET Inf. Secur. (2023)
Keyphrases
- quantum computation
- times faster
- computational complexity
- quantum mechanics
- machine learning
- data mining algorithms
- benchmark datasets
- computationally efficient
- recently developed
- orders of magnitude
- data structure
- constraint satisfaction problems
- real time
- worst case
- data streams
- information security
- feature selection
- computer vision
- neural network