Zobrazeno 1 - 10
of 16
pro vyhledávání: '"Koppula, Venkata"'
Publikováno v:
49th International Symposium on Mathematical Foundations of Computer Science (MFCS 2024)
The Polynomial-Time Hierarchy ($\mathsf{PH}$) is a staple of classical complexity theory, with applications spanning randomized computation to circuit lower bounds to ''quantum advantage'' analyses for near-term quantum computers. Quantumly, however,
Externí odkaz:
http://arxiv.org/abs/2401.01633
A proof of quantumness is a method for provably demonstrating (to a classical verifier) that a quantum device can perform computational tasks that a classical device with comparable resources cannot. Providing a proof of quantumness is the first step
Externí odkaz:
http://arxiv.org/abs/2005.04826
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Koppula, Venkata, Waters, Brent
Publikováno v:
Advances in Cryptology - CRYPTO 2016: 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part II; 2016, p681-700, 20p
Publikováno v:
Applied Cryptography & Network Security (9783319395548); 2016, p304-323, 20p
Publikováno v:
Advances in Cryptology - EUROCRYPT 2016: 35th Annual International Conference on the Theory & Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II; 2016, p124-153, 30p
Publikováno v:
Theory of Cryptography: 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part II; 2016, p361-388, 28p
Publikováno v:
Advances in Cryptology - ASIACRYPT 2015: 21st International Conference on the Theory & Application of Cryptology & Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part I; 2015, p79-102, 24p
Publikováno v:
Advances in Cryptology - EUROCRYPT 2015: 34th Annual International Conference on the Theory & Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II; 2015, p3-34, 32p
Publikováno v:
Theory of Cryptography 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part II; 2015, p378-400, 23p