This paper analyzes and optimizes quantum circuits for computing discrete logarithms on binary elliptic curves, including reversible circuits for fixed-base-point scalar multiplication and the full stack of relevant subroutines. The main optimization target is the size of the quantum computer, i.e., the number of logical qubits required, as this appears to be the main obstacle to implementing Shor’s polynomial-time discrete-logarithm algorithm. The secondary optimization target is the number of logical Toffoli gates. For an elliptic curve over a field of 2n elements, this paper reduces the number of qubits to 7n + ⌊log2(n)⌋ + 9. At the same time this paper reduces the number of Toffoli gates to 48n3 + 8nlog2(3)+1 + 352n2 log2(n) + 512n2 + O...
Abstract-- This survey paper reviews latest existing encryption techniques and their security issues...
Efficient implementation of elliptic curve cryptography can be targeted at 2 levels, specifically on...
Abstract. The Double-Base Number System (DBNS) uses two bases, 2 and 3, in order to represent any in...
This paper analyzes and optimizes quantum circuits for computing discrete logarithms on binary ellip...
We give precise quantum resource estimates for Shor\u27s algorithm to compute discrete logarithms on...
Shor's quantum algorithm for discrete logarithms applied to elliptic curve groups forms the basis of...
We show in some detail how to implement Shor's efficient quantum algorithm for discrete logarithms f...
This article gives an introduction to Elliptic Curve Cryptography and Quantum Computing. It includes...
International audienceCat qubits provide appealing building blocks for quantum computing. They exhib...
The security of public-key cryptography depends on the computational intractability of some hard pro...
Abstract: Contemporary cryptographic algorithms are resistant to the strongest threats to cybersecur...
Shor's algorithms for the integer factorization and the discrete logarithm problems can be regarded ...
abstract: In the modern world with the ever growing importance of technology, the challenge of infor...
Although elliptic curves have been studied for hundreds of years, the inception of elliptic curve cr...
The Double-Base Number System (DBNS) uses two bases, 2 and 3, in order to represent any integer n. A...
Abstract-- This survey paper reviews latest existing encryption techniques and their security issues...
Efficient implementation of elliptic curve cryptography can be targeted at 2 levels, specifically on...
Abstract. The Double-Base Number System (DBNS) uses two bases, 2 and 3, in order to represent any in...
This paper analyzes and optimizes quantum circuits for computing discrete logarithms on binary ellip...
We give precise quantum resource estimates for Shor\u27s algorithm to compute discrete logarithms on...
Shor's quantum algorithm for discrete logarithms applied to elliptic curve groups forms the basis of...
We show in some detail how to implement Shor's efficient quantum algorithm for discrete logarithms f...
This article gives an introduction to Elliptic Curve Cryptography and Quantum Computing. It includes...
International audienceCat qubits provide appealing building blocks for quantum computing. They exhib...
The security of public-key cryptography depends on the computational intractability of some hard pro...
Abstract: Contemporary cryptographic algorithms are resistant to the strongest threats to cybersecur...
Shor's algorithms for the integer factorization and the discrete logarithm problems can be regarded ...
abstract: In the modern world with the ever growing importance of technology, the challenge of infor...
Although elliptic curves have been studied for hundreds of years, the inception of elliptic curve cr...
The Double-Base Number System (DBNS) uses two bases, 2 and 3, in order to represent any integer n. A...
Abstract-- This survey paper reviews latest existing encryption techniques and their security issues...
Efficient implementation of elliptic curve cryptography can be targeted at 2 levels, specifically on...
Abstract. The Double-Base Number System (DBNS) uses two bases, 2 and 3, in order to represent any in...