Skip to main content

All Questions

2 votes
1 answer
181 views

Generating Equal Amplitude Superposition States from Another Equal Amplitude Superposition State

Can we prepare a state regarding a transformation in quantum computing that seems to generate another equal amplitude superposition state when applying a Hadamard gate? Specifically, I observed that ...
Aman's user avatar
  • 473
2 votes
1 answer
93 views

How is controlled constant addition implemented for binary polynomials?

So, currently I am going through the paper Concrete Quantum Cryptanalysis of Binary Elliptic Curves. The section on point addition mentions that for adding two points $P_1$ and $P_2$, they assume that ...
Ash Ketchum's user avatar
3 votes
1 answer
1k views

Why is the combination of NTRU Prime and X25519 ECDH in OpenSSH believed to be secure against quantum attacks?

What do you think about the combination of NTRU Prime and X25519 ECDH in OpenSSH 9.0? Why is the combination of NTRU Prime and X25519 ECDH in OpenSSH believed to be secure against quantum attacks in ...
ReflectYourCharacter's user avatar
3 votes
1 answer
2k views

Is there a quantum algorithm to find SHA256 collisions?

As I understand, the Bitcoin network can be seen as a supercomputer looking for SHA256 collisions. It hasn't found one yet (March 2022). Also, in the post-quantum cryptography era, you would be ...
Jocer's user avatar
  • 153