All Questions
4 questions
2
votes
1
answer
181
views
Generating Equal Amplitude Superposition States from Another Equal Amplitude Superposition State
Can we prepare a state regarding a transformation in quantum computing that seems to generate another equal amplitude superposition state when applying a Hadamard gate?
Specifically, I observed that ...
2
votes
1
answer
93
views
How is controlled constant addition implemented for binary polynomials?
So, currently I am going through the paper Concrete Quantum Cryptanalysis of Binary Elliptic Curves. The section on point addition mentions that for adding two points $P_1$ and $P_2$, they assume that ...
3
votes
1
answer
1k
views
Why is the combination of NTRU Prime and X25519 ECDH in OpenSSH believed to be secure against quantum attacks?
What do you think about the combination of NTRU Prime and X25519 ECDH in OpenSSH 9.0?
Why is the combination of NTRU Prime and X25519 ECDH in OpenSSH believed to be secure against quantum attacks in ...
3
votes
1
answer
2k
views
Is there a quantum algorithm to find SHA256 collisions?
As I understand, the Bitcoin network can be seen as a supercomputer looking for SHA256 collisions. It hasn't found one yet (March 2022). Also, in the post-quantum cryptography era, you would be ...