A Period-Finding Method for Shor's Algorithm

Shor's algorithm is a significant quantum algorithm for factoring a number N. The key technique of the Shor's algo- rithm is turning the factoring problem into the problem of finding the period of a function. Based on the key technique and the monotony of the mode function, an approach how to determine the period of a function is introduced. Mean- while an important parameter selection for period-finding is optimized. Several experiments discussed imply that the approach and the parameter selection are both rigorous.

[1]  Dong Seong Kim,et al.  Toward Lightweight Detection and Visualization for Denial of Service Attacks , 2006, MICAI.

[2]  Ma Zhi,et al.  Quantum Secure Direct Communication Using Quantum Calderbank-Shor-Steane Error Correcting Codes , 2006 .

[3]  Xuelong Li,et al.  Supervised Tensor Learning , 2005, ICDM.

[4]  Huang Jian Quantum Computing and Its Applications in Signal and Information Processing , 2003 .

[5]  Peter W. Shor,et al.  Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..

[6]  Qiang Yang,et al.  Objective-oriented utility-based association mining , 2002, 2002 IEEE International Conference on Data Mining, 2002. Proceedings..

[7]  Dong Seong Kim,et al.  Toward Modeling Lightweight Intrusion Detection System Through Correlation-Based Hybrid Feature Selection , 2005, CISC.

[8]  Dong Seong Kim,et al.  Fusions of GA and SVM for Anomaly Detection in Intrusion Detection System , 2005, ISNN.

[9]  David G. Stork,et al.  Pattern Classification , 1973 .

[10]  Y. Manin,et al.  Introduction to Modern Number Theory , 2008 .

[11]  Christophe Rigotti,et al.  A condensed representation to find frequent patterns , 2001, PODS '01.

[12]  Lai-Wan Chan,et al.  The Minimum Error Minimax Probability Machine , 2004, J. Mach. Learn. Res..

[13]  Qiang Yang,et al.  Mining high utility itemsets , 2003, Third IEEE International Conference on Data Mining.

[14]  Christopher Krügel,et al.  Stateful intrusion detection for high-speed network's , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.