Chapter Seven - Security and Privacy of Blockchain and Quantum Computation
暂无分享,去创建一个
[1] E. O. Kiktenko,et al. Quantum-secured blockchain , 2017, Quantum Science and Technology.
[2] Victor S. Miller,et al. Use of Elliptic Curves in Cryptography , 1985, CRYPTO.
[3] H. Nishimori,et al. Quantum annealing in the transverse Ising model , 1998, cond-mat/9804280.
[4] Keisuke Fujii,et al. Blind topological measurement-based quantum computation , 2011, Nature Communications.
[5] Emin Gün Sirer,et al. Majority Is Not Enough: Bitcoin Mining Is Vulnerable , 2013, Financial Cryptography.
[6] Kazuki Ikeda. Quantum Hall Effect and Langlands Program , 2017, Annals of Physics.
[7] Alexei Kitaev,et al. Topological phases and quantum computation , 2008, 0904.2771.
[8] I. Chuang,et al. Quantum Computation and Quantum Information: Introduction to the Tenth Anniversary Edition , 2010 .
[9] I. Chuang,et al. Experimental realization of Shor's quantum factoring algorithm using nuclear magnetic resonance , 2001, Nature.
[10] Kazuki Ikeda,et al. qBitcoin: A Peer-to-Peer Quantum Cash System , 2017, Advances in Intelligent Systems and Computing.
[11] M. Benedetti,et al. Estimation of effective temperatures in quantum annealers for sampling applications: A case study with possible applications in deep learning , 2015, 1510.07611.
[12] H. J. Kimble,et al. The quantum internet , 2008, Nature.
[13] Yael Tauman Kalai,et al. How to Leak a Secret: Theory and Applications of Ring Signatures , 2001, Essays in Memory of Shimon Even.
[14] Peter W. Shor,et al. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..
[15] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[16] Albert Einstein,et al. Can Quantum-Mechanical Description of Physical Reality Be Considered Complete? , 1935 .
[17] Troy Lee,et al. Quantum Attacks on Bitcoin, and How to Protect Against Them , 2017, Ledger.
[18] H. Weinfurter,et al. Experimental quantum teleportation , 1997, Nature.
[19] Shuntaro Takeda,et al. Deterministic quantum teleportation of photonic quantum bits by a hybrid technique , 2013, Nature.
[20] Lectures on the Langlands program and conformal field theory , 2005, hep-th/0512172.
[21] David Von Dollen,et al. Traffic Flow Optimization Using a Quantum Annealer , 2017, Front. ICT.
[22] Charles H. Bennett,et al. Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels. , 1993, Physical review letters.
[23] Lov K. Grover. A fast quantum mechanical algorithm for database search , 1996, STOC '96.
[24] R Raussendorf,et al. A one-way quantum computer. , 2001, Physical review letters.
[25] Gilles Brassard,et al. Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..
[26] J. Dynes,et al. Gigahertz decoy quantum key distribution with 1 Mbit/s secure key rate. , 2008, Optics express.
[27] Steven H. Adachi,et al. Application of Quantum Annealing to Training of Deep Neural Networks , 2015, ArXiv.
[28] Kimble,et al. Unconditional quantum teleportation , 1998, Science.