Journal articles on the topic 'Shorův algoritmus'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Shorův algoritmus.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Ekerå, Martin. "Quantum algorithms for computing general discrete logarithms and orders with tradeoffs." Journal of Mathematical Cryptology 15, no. 1 (2021): 359–407. http://dx.doi.org/10.1515/jmc-2020-0006.
Full textLitinskaia, Evgeniia L., Pavel A. Rudenko, Kirill V. Pozhar, and Nikolai A. Bazaev. "Validation of Short-Term Blood Glucose Prediction Algorithms." International Journal of Pharma Medicine and Biological Sciences 8, no. 2 (2019): 34–39. http://dx.doi.org/10.18178/ijpmbs.8.2.34-39.
Full textDevitt, S. J., A. G. Fowler, and L. C. L. Hollenberg. "Robustness of Shor's algorithm." Quantum Information and Computation 6, no. 7 (2006): 616–29. http://dx.doi.org/10.26421/qic6.7-5.
Full textDr., N. D. Jambhekar. "Quantum Computing Algorithms: Implementation Challenges." International Journal of Advance and Applied Research S6, no. 18 (2025): 319–25. https://doi.org/10.5281/zenodo.15259711.
Full textSouza, Rodrigo de, and Antônio Cesar Galhardi. "Sharing sensitive supply chain information: A study on vulnerabilities in RSA encryption systems from the use of the shor algorithm." @_GIT (Advances in Global Innovation & Technology) 3, no. 2 (2025): e32015. https://doi.org/10.29327/2384439.3.2-3.
Full textLalit Mohan Trivedi, Et al. "Quantum Computing Algorithms for Solving Complex Mathematical Problems." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 10 (2023): 2202–6. http://dx.doi.org/10.17762/ijritcc.v11i10.8913.
Full textJayesh, Pravin Oza. "Quantum Computing & Advanced Algorithms." International Journal of Advance and Applied Research S6, no. 23 (2025): 239–44. https://doi.org/10.5281/zenodo.15195143.
Full textArya, Wicaksana, Anthony, and Wahyu Wicaksono Adjie. "Web-app realization of Shor's quantum factoring algorithm and Grover's quantum search algorithm." TELKOMNIKA Telecommunication, Computing, Electronics and Control 18, no. 3 (2020): 1319–30. https://doi.org/10.12928/TELKOMNIKA.v18i3.14755.
Full textAkbar, Rahmad, Bambang Pramono, and Rizal Adi Saputra. "Implementasi Algoritma Simon Pada Aplikasi Kamus Perubahan Fi’il (Kata Kerja Bahasa Arab) Berbasis Android." Ultimatics : Jurnal Teknik Informatika 13, no. 1 (2021): 12–18. http://dx.doi.org/10.31937/ti.v13i1.1850.
Full textPiastou, Mikita. "Investigating the Impact of Quantum Computing on Algorithmic Complexity." International Journal of Scientific Research and Management (IJSRM) 12, no. 10 (2024): 1467–76. http://dx.doi.org/10.18535/ijsrm/v12i10.ec01.
Full textKendon, V. M., and W. J. Munro. "Entanglement and its role in Shor's algorithm." Quantum Information and Computation 6, no. 7 (2006): 630–40. http://dx.doi.org/10.26421/qic6.7-6.
Full textSingleton Jr, Robert L. "Shor's Factoring Algorithm and Modular Exponentiation Operators." Quanta 12, no. 1 (2023): 41–130. http://dx.doi.org/10.12743/quanta.v12i1.235.
Full textAyub, Afrah, Sharlene Anna Pereira, Mohammed Amaan Thayyil, and Mahi Ayub. "From Bytes to Qubits: The Cybersecurity Implications of Quantum Advancements." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 008 (2024): 1–6. http://dx.doi.org/10.55041/ijsrem37398.
Full textGalhardi, António César, and Rodrigo De Souza. "QUANTUM COMPUTING CHALLENGES: EXPLORING DECOHERENCE THROUGH THE LENS OF SHOR'S ALGORITHM." ARACÊ 6, no. 4 (2024): 18239–48. https://doi.org/10.56238/arev6n4-423.
Full textGAWRON, P., and J. A. MISZCZAK. "NUMERICAL SIMULATIONS OF MIXED STATE QUANTUM COMPUTATION." International Journal of Quantum Information 03, no. 01 (2005): 195–99. http://dx.doi.org/10.1142/s0219749905000748.
Full textBaraka, Mohammed El, and Siham Ezzouak. "Efficient Algorithms for Isogeny Computation on Hyperelliptic Curves: Their Applications in Post-Quantum Cryptography." International journal of Computer Networks & Communications 17, no. 2 (2025): 93–112. https://doi.org/10.5121/ijcnc.2025.17206.
Full textBarbato, Netto Natália. "Efficient Algorithms for Isogeny Computation on Hyperelliptic Curves: Their Applications in Post-Quantum Cryptography." Efficient Algorithms for Isogeny Computation on Hyperelliptic Curves: Their Applications in Post-Quantum Cryptography 17, no. 2 (2025): 978–1. https://doi.org/10.5121/ijcnc.2025.17206.
Full textMOSCA, MICHELE, and CHRISTOF ZALKA. "EXACT QUANTUM FOURIER TRANSFORMS AND DISCRETE LOGARITHM ALGORITHMS." International Journal of Quantum Information 02, no. 01 (2004): 91–100. http://dx.doi.org/10.1142/s0219749904000109.
Full textDr. Nadia Ahmed. "Quantum Computing Algorithms for Integer Factorization: A Comparative Analysis." Modern Dynamics: Mathematical Progressions 1, no. 1 (2024): 6–9. http://dx.doi.org/10.36676/mdmp.v1.i1.02.
Full textS, Vijay, Priya S, C. N. Harshavardhana, and Kemparaju R. "QUANTUM-RESISTANT CRYPTOGRAPHIC ALGORITHMS FOR SECURE COMMUNICATION." ICTACT Journal on Communication Technology 15, no. 3 (2024): 3276–81. http://dx.doi.org/10.21917/ijct.2024.0487.
Full textKawachi, Akinori, and Takeshi Koshiba. "Progress in Quantum Computational Cryptography." JUCS - Journal of Universal Computer Science 12, no. (6) (2006): 691–709. https://doi.org/10.3217/jucs-012-06-0691.
Full textJia, Shuangcheng. "Comparison of Performances for Quantum and Conventional Algorithms: Shor’s algorithm and Boson Sampling." Highlights in Science, Engineering and Technology 38 (March 16, 2023): 493–501. http://dx.doi.org/10.54097/hset.v38i.5873.
Full textTunçel, Kaya. "Exploration and Development of Quantum Computing Algorithms for Optimization, Cryptography, and Machine Learning Applications." Human Computer Interaction 8, no. 1 (2024): 1. http://dx.doi.org/10.62802/1dwq2w96.
Full textRanjita and Gautam Kumar Rajput Dr. "Cryptanalysis of pre-quantum and post-quantum cryptography." International Journal of Advance Research in Multidisciplinary 1, no. 1 (2023): 650–54. https://doi.org/10.5281/zenodo.13643131.
Full textDr., Angajala Srinivasa Rao, and Vemula Rajiv Jetson Dr. "Quantum Cloud Computing Integration: Unleashing the Power of Quantum Algorithms in the Cloud." Quantum Cloud Computing Integration: Unleashing the Power of Quantum Algorithms in the Cloud 8, no. 12 (2023): 4. https://doi.org/10.5281/zenodo.10427571.
Full textAIRCC. "QUANTUM COMPUTING AND THE IMPLICATIONS ON ONLINE SECURITY." International Journal of Artificial Intelligence & Applications (IJAIA) 15, no. 5 (2024): 83–92. https://doi.org/10.5121/ijaia.2024.15506.
Full textCRAUSER, A., P. FERRAGINA, K. MEHLHORN, U. MEYER, and E. A. RAMOS. "RANDOMIZED EXTERNAL-MEMORY ALGORITHMS FOR LINE SEGMENT INTERSECTION AND OTHER GEOMETRIC PROBLEMS." International Journal of Computational Geometry & Applications 11, no. 03 (2001): 305–37. http://dx.doi.org/10.1142/s0218195901000523.
Full textGidney, Craig, and Austin G. Fowler. "Efficient magic state factories with a catalyzed|CCZ⟩to2|T⟩transformation." Quantum 3 (April 30, 2019): 135. http://dx.doi.org/10.22331/q-2019-04-30-135.
Full textGadde, Nishant, Avaneesh Mohapatra, Navnit Vijay, Siddhardh Manukonda, and Daiwik Shashikanth. "Quantum Computing and the Implications on Online Security." International Journal of Artificial Intelligence & Applications 15, no. 5 (2024): 83–92. http://dx.doi.org/10.5121/ijaia.2024.15506.
Full textPieprzyk, Josef. "Integer Factorization – Cryptology Meets Number Theory." Scientific Journal of Gdynia Maritime University, no. 109 (March 30, 2019): 7–20. http://dx.doi.org/10.26408/109.01.
Full textFernando, Prageeth. "Post-Quantum Cryptography: Current Developments, Challenges, and Future Directions." Path of Science 11, no. 6 (2025): 4001. https://doi.org/10.22178/pos.119-4.
Full textVan den Nest, Maarten. "Simulating quantum computers with probabilistic methods." Quantum Information and Computation 11, no. 9&10 (2011): 784–812. http://dx.doi.org/10.26421/qic11.9-10-5.
Full textGalhardi, Antonio Cesar, and Rodrigo de Souza. "Supply chain security: evaluating RSA vulnerabilities in the era of Shor's algorithm." Revista de Gestão e Secretariado 15, no. 12 (2024): e4554. https://doi.org/10.7769/gesec.v15i12.4554.
Full textBub, J. "Quantum computaton from a quantum logical perspective." Quantum Information and Computation 7, no. 4 (2007): 281–96. http://dx.doi.org/10.26421/qic7.4-1.
Full textHeurtel, Nicolas, Andreas Fyrillas, Grégoire de Gliniasty, et al. "Perceval: A Software Platform for Discrete Variable Photonic Quantum Computing." Quantum 7 (February 21, 2023): 931. http://dx.doi.org/10.22331/q-2023-02-21-931.
Full textNorkin, Vladimir, and Anton Kozyriev. "On Shor's r-Algorithm for Problems with Constraints." Cybernetics and Computer Technologies, no. 3 (September 29, 2023): 16–22. http://dx.doi.org/10.34229/2707-451x.23.3.2.
Full textYamashita, Shigeru, and Igor L. Markov. "Fast equivalence -- checking for quantum circuits." Quantum Information and Computation 10, no. 9&10 (2010): 721–34. http://dx.doi.org/10.26421/qic10.9-10-1.
Full textNjoki, Wanjiku Amani. "Statistical Challenges and Opportunities in Quantum Computing: A Review." IDOSR JOURNAL OF COMPUTER AND APPLIED SCIENCES 9, no. 1 (2024): 33–37. http://dx.doi.org/10.59298/jcas/2024/91.153337001.
Full textKotukh, Y., G. Khalimov, and I. Dzhura. "The problem of finding periodicity in quantum cryptanalysis of group cryptography algorithms." Radiotekhnika, no. 218 (September 26, 2024): 103–9. https://doi.org/10.30837/rt.2024.3.218.08.
Full textCaraballo Cortés, Kamila, Osvaldo Zagordi, Tomasz Laskus, et al. "Ultradeep Pyrosequencing of Hepatitis C Virus Hypervariable Region 1 in Quasispecies Analysis." BioMed Research International 2013 (2013): 1–10. http://dx.doi.org/10.1155/2013/626083.
Full textMahfudh, Adzhal Arwani, and Hery Mustofa. "Klasifikasi Pemahaman Santri Dalam Pembelajaran Kitab Kuning Menggunakan Algoritma Naive Bayes Berbasis Forward Selection." Walisongo Journal of Information Technology 1, no. 2 (2019): 101. http://dx.doi.org/10.21580/wjit.2019.1.2.4529.
Full textNadia Mustaqim Ansari, Talha Tariq, Rizwan Iqbal, Azhar Abbas, Haider Abbas, and Muhammad Mohsan Zohaib. "QUANTUM CRYPTOGRAPHY: SECURING DATA IN THE POST-QUANTUM COMPUTING ERA – A COMPREHENSIVE EXPLORATION OF THE FUTURE OF CYBERSECURITY." Kashf Journal of Multidisciplinary Research 2, no. 02 (2025): 28–43. https://doi.org/10.71146/kjmr259.
Full textResearcher. "THE IMPACT OF QUANTUM COMPUTING ON CRYPTOGRAPHIC SECURITY: CHALLENGES AND MITIGATION STRATEGIES." International Journal of Computer Engineering and Technology (IJCET) 15, no. 4 (2024): 764–72. https://doi.org/10.5281/zenodo.13383192.
Full textPROF., P.N. KALAVADEKAR. "SMS CLASSIFICATION BASED ON NAIVE BAYES CLASSIFIER AND SEMI-SUPERVISED LEARNING." IJIERT - International Journal of Innovations in Engineering Research and Technology 3, no. 7 (2016): 16–25. https://doi.org/10.5281/zenodo.1462689.
Full textVan den Nest, Maarten. "Efficient classical simulations of quantum Fourier transforms and Normalizer circuits over Abelian groups." Quantum Information and Computation 13, no. 11&12 (2013): 1007–37. http://dx.doi.org/10.26421/qic13.11-12-7.
Full textOjha, Dharma Raj. "Quantum Computing: Potential Impacts on Cryptography and Data Security." Journal of Durgalaxmi 3 (December 31, 2024): 87–106. https://doi.org/10.3126/jdl.v3i1.73848.
Full textTamrakar, Abha, and Rishabh Sharma. "Quantum Computing: A Comprehensive Review." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 10, no. 3 (2019): 1634–42. http://dx.doi.org/10.61841/turcomat.v10i3.14623.
Full textVishnuvardhana Reddy Veeraballi. "Quantum Computing Encryption: Emerging Trends in Cybersecurity." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 1 (2025): 2678–86. https://doi.org/10.32628/cseit251112288.
Full textSwati Dixit. "The Impact of Quantum Computing on Cryptographic Security Protocols." Advances in Nonlinear Variational Inequalities 27, no. 3 (2024): 558–70. http://dx.doi.org/10.52783/anvi.v27.1419.
Full textHudawi, Ahmad, Nur Octavia, Andik Elfandiono, et al. "Klasifikasi Pemahaman Santri dalam Pembelajaran Kitab Kuning Menggunakan Algoritma c4.5. Pohon keputusan (Decision Tree) di Pondok Pesantren Nurul Jadid." TRILOGI: Jurnal Ilmu Teknologi, Kesehatan, dan Humaniora 2, no. 3 (2021): 266–69. http://dx.doi.org/10.33650/trilogi.v2i3.2840.
Full text