Skip Content
You are currently on the new version of our website. Access the old version .

1,101 Results Found

  • Article
  • Open Access
177 Views
33 Pages

2 February 2026

We present a theoretical framework integrating quantum optimization with DNA-based molecular storage for enhanced image compression, validated via classical simulation in IBM Qiskit. The proposed Quantum-DNA Image Compression (Q-DIC) framework formul...

  • Article
  • Open Access
14 Citations
5,576 Views
24 Pages

Efficient Implementation of Discrete-Time Quantum Walks on Quantum Computers

  • Luca Razzoli,
  • Gabriele Cenedese,
  • Maria Bondani and
  • Giuliano Benenti

2 April 2024

Quantum walks have proven to be a universal model for quantum computation and to provide speed-up in certain quantum algorithms. The discrete-time quantum walk (DTQW) model, among others, is one of the most suitable candidates for circuit implementat...

  • Article
  • Open Access
47 Citations
4,813 Views
16 Pages

Efficient Implementation of PRESENT and GIFT on Quantum Computers

  • Kyungbae Jang,
  • Gyeongju Song,
  • Hyunjun Kim,
  • Hyeokdong Kwon,
  • Hyunji Kim and
  • Hwajeong Seo

23 May 2021

Grover search algorithm is the most representative quantum attack method that threatens the security of symmetric key cryptography. If the Grover search algorithm is applied to symmetric key cryptography, the security level of target symmetric key cr...

  • Article
  • Open Access
1 Citations
2,496 Views
17 Pages

29 February 2024

The SAND algorithm is a family of lightweight AND-RX block ciphers released by DCC in 2022. Our research focuses on assessing the security of SAND with a quantum computation model. This paper presents the first quantum implementation of SAND (includi...

  • Article
  • Open Access
1,174 Views
16 Pages

2 April 2025

In this paper, various types of quantum circuits for DES components are proposed to analyze the trade-offs in quantum resources for both DES and TDES block ciphers. Specifically, multiple optimized structures within the DES framework are devised, and...

  • Article
  • Open Access
5 Citations
2,652 Views
15 Pages

Optimized Implementation and Analysis of CHAM in Quantum Computing

  • Yujin Yang,
  • Kyungbae Jang,
  • Anubhab Baksi and
  • Hwajeong Seo

20 April 2023

A quantum computer capable of running the Grover search algorithm, which reduces the complexity of brute-force attacks by a square root, has the potential to undermine the security strength of symmetric-key cryptography and hash functions. Recently,...

  • Article
  • Open Access
4 Citations
7,561 Views
23 Pages

13 December 2012

Observations of quantum systems carried out by finite observers who subsequently communicate their results using classical data structures can be described as “local operations, classical communication” (LOCC) observations. The implementation of LOCC...

  • Article
  • Open Access
2 Citations
1,831 Views
13 Pages

Quantum Implementation of AIM: Aiming for Low-Depth

  • Kyungbae Jang,
  • Yujin Oh,
  • Hyunji Kim and
  • Hwajeong Seo

27 March 2024

Security vulnerabilities in the symmetric-key primitives of a cipher can undermine the overall security claims of the cipher. With the rapid advancement of quantum computing in recent years, there is an increasing effort to evaluate the security of s...

  • Article
  • Open Access
3 Citations
2,669 Views
14 Pages

Design and Implementation of a Quantum-Assisted Digital Signature

  • Marta Irene García-Cid,
  • Rodrigo Martín,
  • David Domingo,
  • Vicente Martín and
  • Laura Ortiz

We propose a new quantum-assisted digital signature (Q-DS) protocol based on the composite of truly random symmetric keys generated by quantum key distribution with secure standardized hash functions, which allows for high parameterization to provide...

  • Article
  • Open Access
1,510 Views
21 Pages

26 September 2025

The emergence of quantum computing poses significant threats to conventional public-key cryptography, driving the urgent need for quantum-resistant cryptographic solutions. While quantum key distribution addresses secure key exchange, its dependency...

  • Article
  • Open Access
14 Citations
6,485 Views
17 Pages

Quantum Circuit Learning with Error Backpropagation Algorithm and Experimental Implementation

  • Masaya Watabe,
  • Kodai Shiba,
  • Chih-Chieh Chen,
  • Masaru Sogabe,
  • Katsuyoshi Sakamoto and
  • Tomah Sogabe

28 May 2021

Quantum computing has the potential to outperform classical computers and is expected to play an active role in various fields. In quantum machine learning, a quantum computer has been found useful for enhanced feature representation and high-dimensi...

  • Feature Paper
  • Review
  • Open Access
11 Citations
5,820 Views
15 Pages

The physical implementation of quantum information processing (QIP) is an emerging field that requires finding a suitable candidate as a quantum bit (qubit), the basic unit for quantum information, which can be organised in a scalable manner to imple...

  • Article
  • Open Access
4 Citations
3,499 Views
34 Pages

A Practical Implementation of Post-Quantum Cryptography for Secure Wireless Communication

  • Babatunde Ojetunde,
  • Takuya Kurihara,
  • Kazuto Yano,
  • Toshikazu Sakano and
  • Hiroyuki Yokoyama

10 June 2025

Recent advances in quantum computing have prompted urgent consideration of the migration of classical cryptographic systems to post-quantum alternatives. However, it is impossible to fully understand the impact that migrating to current Post-Quantum...

  • Article
  • Open Access
2 Citations
1,483 Views
12 Pages

29 June 2023

Unconditionally secure quantum bit commitment (QBC) was widely believed to be impossible for more than two decades, but recently, based on an anomalous behavior found in quantum steering, we proposed a QBC protocol which can be unconditionally secure...

  • Article
  • Open Access
10 Citations
3,713 Views
21 Pages

A System-on-a-Chip Implementation of a Post-Quantum Cryptography Scheme for Smart Meter Data Communications

  • Vinícius Lagrota Rodrigues da Costa,
  • Julio López and
  • Moisés Vidal Ribeiro

23 September 2022

The security of Smart Meter (SM) systems will be a challenge in the era of quantum computing because a quantum computer might exploit characteristics of well-established cryptographic schemes to reach a successful security breach. From a practical pe...

  • Article
  • Open Access
12 Citations
3,460 Views
36 Pages

30 December 2022

The application of Quantum Computing (QC) to fluid dynamics simulation has developed into a dynamic research topic in recent years. With many flow problems of scientific and engineering interest requiring large computational resources, the potential...

  • Article
  • Open Access
4 Citations
4,672 Views
19 Pages

4 November 2023

We provide a practical implementation of a free space optical quantum key distribution (FSO-QKD) system within a vehicle-to-infrastructure (V2I) application developed under the Innovate UK AirQKD project. The FSO-QKD system provides the quantum secur...

  • Article
  • Open Access
6 Citations
7,389 Views
34 Pages

19 November 2024

With the rapid growth of connected vehicles and the vulnerability of embedded systems against cyber attacks in an era where quantum computers are becoming a reality, post-quantum cryptography (PQC) is a crucial solution. Yet, by nature, automotive se...

  • Feature Paper
  • Article
  • Open Access
2 Citations
3,717 Views
9 Pages

Implementation of Quantum Algorithms via Fast Three-Rydberg-Atom CCZ Gates

  • Shiqing Tang,
  • Chong Yang,
  • Dongxiao Li and
  • Xiaoqiang Shao

27 September 2022

Multiqubit CCZ gates form one of the building blocks of quantum algorithms and have been involved in achieving many theoretical and experimental triumphs. Designing a simple and efficient multiqubit gate for quantum algorithms is still by no means tr...

  • Review
  • Open Access
303 Views
37 Pages

The imminent threat of large-scale quantum computers to modern public-key cryptographic devices has led to extensive research into post-quantum cryptography (PQC). Lattice-based schemes have proven to be the top candidate among existing PQC schemes d...

  • Article
  • Open Access
4 Citations
1,398 Views
26 Pages

10 October 2024

We present a protocol for the hierarchical controlled joint remote implementation of the partially unknown operations of m qudits belonging to some restricted sets by using m multiparticle high-dimensional entangled states as the quantum channel. All...

  • Article
  • Open Access
2 Citations
2,904 Views
13 Pages

Optimized Quantum Circuit for Quantum Security Strength Analysis of Argon2

  • Gyeongju Song,
  • Siwoo Eum,
  • Hyeokdong Kwon,
  • Minjoo Sim,
  • Minwoo Lee and
  • Hwajeong Seo

31 October 2023

This paper explores the optimization of quantum circuits for Argon2, a memory-hard function used in password hashing applications. With the rise of quantum computers, the security of classical cryptographic systems is at risk. This paper emphasizes t...

  • Article
  • Open Access
4 Citations
2,845 Views
13 Pages

31 December 2022

We propose a multidimensional reconciliation encoding algorithm based on a field-programmable gate array (FPGA) with variable data throughput that enables quantum key distribution (QKD) systems to be adapted to different throughput requirements. Usin...

  • Article
  • Open Access
11 Citations
3,551 Views
14 Pages

10 March 2023

To build a secure cryptography system in the post-quantum era, one must find the minimum security parameters against quantum attacks by estimating the quantum resources of a fault-tolerant quantum computer. In a fault-tolerant quantum computer, error...

  • Article
  • Open Access
2 Citations
1,906 Views
14 Pages

HAETAE on ARMv8

  • Minjoo Sim,
  • Minwoo Lee and
  • Hwajeong Seo

29 September 2024

In this work, we present the highly optimized implementation of the HAETAE algorithm, submitted to the second round of the Korean Post-Quantum Cryptography (KpqC) competition and to the first round of NIST’s additional post-quantum standardizat...

  • Article
  • Open Access
803 Views
12 Pages

5 September 2025

To address the demand for low-cost deployment in quantum key distribution (QKD) networks, this study explores the implementation of unidimensional (UD) modulation continuous-variable quantum key distribution (CV-QKD) protocols within downstream acces...

  • Article
  • Open Access
8 Citations
3,849 Views
16 Pages

11 August 2022

Quantum error correction (QEC) is an effective way to overcome quantum noise and de-coherence, meanwhile the fault tolerance of the encoding circuit, syndrome measurement circuit, and logical gate realization circuit must be ensured so as to achieve...

  • Review
  • Open Access
26 Citations
8,323 Views
22 Pages

On Advances of Lattice-Based Cryptographic Schemes and Their Implementations

  • Harshana Bandara,
  • Yasitha Herath,
  • Thushara Weerasundara and
  • Janaka Alawatugoda

Lattice-based cryptography is centered around the hardness of problems on lattices. A lattice is a grid of points that stretches to infinity. With the development of quantum computers, existing cryptographic schemes are at risk because the underlying...

  • Article
  • Open Access
6 Citations
10,590 Views
20 Pages

Modeling, Simulation, and Performance Analysis of Decoy State Enabled Quantum Key Distribution Systems

  • Logan O. Mailloux,
  • Michael R. Grimaila,
  • Douglas D. Hodson,
  • Ryan Engle,
  • Colin McLaughlin and
  • Gerald Baumgartner

22 February 2017

Quantum Key Distribution (QKD) systems exploit the laws of quantum mechanics to generate secure keying material for cryptographic purposes. To date, several commercially viable decoy state enabled QKD systems have been successfully demonstrated and s...

  • Article
  • Open Access
22 Citations
4,063 Views
14 Pages

18 September 2021

One of the emerging technologies at the nanoscale level is the Quantum-Dot Cellular Automata (QCA) technology, which is a potential alternative to conventional CMOS technology due to its high speed, low power consumption, low latency, and possible im...

  • Article
  • Open Access
1 Citations
1,828 Views
10 Pages

An Efficient and Low-Cost Design of Modular Reduction for CRYSTALS-Kyber

  • Zhengwu Huang,
  • Sizhe Chen,
  • Pengyue Sun,
  • Ding Deng and
  • Guangfu Sun

After being selected as a standard for Post-Quantum Cryptography Key Encapsulation Mechanisms by NIST, CRYSTALS-Kyber has driven the transformation of the information security field toward new standards. In CRYSTALS-Kyber, modular reduction is crucia...

  • Article
  • Open Access
3 Citations
2,797 Views
26 Pages

18 January 2023

Quantum key distribution (QKD) protocols aim at allowing two parties to generate a secret shared key. While many QKD protocols have been proven unconditionally secure in theory, practical security analyses of experimental QKD implementations typicall...

  • Article
  • Open Access
3 Citations
3,528 Views
11 Pages

Quantum Power Electronics: From Theory to Implementation

  • Meysam Gheisarnejad and
  • Mohammad-Hassan Khooban

While impressive progress has been already achieved in wide-bandgap (WBG) semiconductors such as 4H-SiC and GaN technologies, the lack of intelligent methodologies to control the gate drivers has prevented exploitation of the maximum potential of sem...

  • Article
  • Open Access
5 Citations
1,452 Views
17 Pages

23 April 2025

Quantum walks are a powerful framework for simulating complex quantum systems and designing quantum algorithms, particularly for spatial search on graphs, where the goal is to find a marked vertex efficiently. In this work, we present efficient quant...

  • Article
  • Open Access
2 Citations
2,072 Views
17 Pages

Optimizing HAWK Signature Scheme Performance on ARMv8

  • Siwoo Eum,
  • Minwoo Lee and
  • Hwajeong Seo

25 September 2024

This study proposes an optimized implementation of the HAWK Signature algorithm, one of the candidates in the first evaluation round for additional digital signature schemes in the NIST Post-Quantum Cryptography competition. The core motivation of th...

  • Article
  • Open Access
12 Citations
4,218 Views
15 Pages

20 December 2021

The miniaturization of electronic devices and the inefficiency of CMOS technology due to the development of integrated circuits and its lack of responsiveness at the nanoscale have led to the acquisition of nanoscale technologies. Among these technol...

  • Article
  • Open Access
2 Citations
2,889 Views
15 Pages

Hardware Design and Implementation of a Lightweight Saber Algorithm Based on DRC Method

  • Weifang Zheng,
  • Huihong Zhang,
  • Yuejun Zhang,
  • Yongzhong Wen,
  • Jie Lv,
  • Lei Ni and
  • Zhiyi Li

With the development of quantum computers, the security of classical cryptosystems is seriously threatened, and the Saber algorithm has become one of the potential candidates for post-quantum cryptosystems (PQCs). To address the problems of long dela...

  • Article
  • Open Access
1 Citations
3,282 Views
16 Pages

The Number Theoretic Transform (NTT) is a cornerstone for efficient polynomial multiplication, which is fundamental to lattice-based cryptographic algorithms such as CRYSTALS-Kyber—a leading candidate in post-quantum cryptography (PQC). However...

  • Feature Paper
  • Article
  • Open Access
1,018 Views
18 Pages

Implementing Quantum Secret Sharing on Current Hardware

  • Jay Graves,
  • Mike Nelson and
  • Eric Chitambar

23 September 2025

Quantum secret sharing is a cryptographic scheme that enables the secure storage and reconstruction of quantum information. While the theory of secret sharing is mature in its development, relatively few studies have explored the performance of quant...

  • Article
  • Open Access
22 Citations
9,052 Views
17 Pages

Advances in quantum computers may pose a significant threat to existing public-key encryption methods, which are crucial to the current infrastructure of cyber security. Both RSA and ECDSA, the two most widely used security algorithms today, may be (...

  • Article
  • Open Access
8 Citations
4,256 Views
15 Pages

20 October 2023

The Poisson equation is a fundamental equation of mathematical physics that describes the potential distribution in static fields. Solving the Poisson equation on a grid is computationally intensive and can be challenging for large grids. In recent y...

  • Review
  • Open Access
298 Citations
16,506 Views
21 Pages

31 August 2015

The ability to distribute secret keys between two parties with information-theoretic security, that is regardless of the capacities of a malevolent eavesdropper, is one of the most celebrated results in the field of quantum information processing and...

  • Article
  • Open Access
6 Citations
2,773 Views
13 Pages

27 October 2022

Grover’s search algorithm accelerates the key search on the symmetric key cipher and the pre-image attack on the hash function. To conduct Grover’s search algorithm, the target cipher algorithm should be efficiently implemented in a quant...

  • Article
  • Open Access
6 Citations
2,381 Views
31 Pages

29 December 2024

In this paper, we use a simplified quantum counter to implement Grover’s algorithm-based quantum circuits to tackle the NP-hard exact cover problem (ECP). The ECP seeks a subcollection of sets such that every element is covered by exactly one s...

  • Article
  • Open Access
5 Citations
5,253 Views
16 Pages

28 November 2024

In this work, we studied the use of Quantum Machine Learning (QML) algorithms for binary classification and compared their performance with classical Machine Learning (ML) methods. QML merges principles of Quantum Computing (QC) and ML, offering impr...

  • Article
  • Open Access
1 Citations
1,074 Views
31 Pages

This article presents a novel approach to the decomposition of unitary operations for 3-qubit systems by 28 controlled rotations and no permutations. The QR decomposition is described, which is based on the concept of the discrete signal-induced heap...

  • Article
  • Open Access
1 Citations
797 Views
23 Pages

Implementation and Performance Evaluation of Quantum-Inspired Clustering Scheme for Energy-Efficient WSNs

  • Chindiyababy Uthayakumar,
  • Ramkumar Jayaraman,
  • Hadi A. Raja and
  • Kamran Daniel

19 September 2025

Advancements in communication technologies and the proliferation of smart devices have significantly increased the demand for wireless sensor networks (WSNs). These networks play an important role in the IoT environment. The wireless sensor network h...

  • Article
  • Open Access
5 Citations
2,756 Views
18 Pages

21 June 2022

Multipartite quantum key distribution (QKD) is a promising area of quantum networks that provides unconditional secret keys among multiple parties, enabling only legitimate users to decrypt the encrypted message. However, security proofs of existing...

of 23