-
# Abstract
When performing variational quantum computations on noisy quantum processors, the measured expectation values ‘drift’ as the amount of noise increases. By making use of increasingly noisy …
-
### Description
In this project, we aim to use extend and run a new class of variational algorithms in IBM quantum hardware.
### Deliverables
benchmarking the algorithm for different data and stud…
-
If any post-quantum crypto key exchange algorithms are supported by tempel, I'd love to see some examples how to use them.
-
Quantum computers have the potential to break many of the cryptographic algorithms that are currently used to secure communications and protect data. This is because quantum computers can perform cert…
-
[Hayden] The I-D mandates the use of Ed25519 due to the signature size and efficiency in computation of the signature. Roughtime server operators may have other requirements on key usage however, an…
-
The goal of this issue is to standardize the HHL notebook to follow a specific structure, to improve its visibility and usability.
There is a general initiative to standardize the `algorithms` dire…
-
It would be great if this library is expanded to support NIST PQC KEM and SIgnature algorithms: Kyber, Dilithium, Falcon, SPHINCS+.
-
### Required prerequisites
- [X] Search the [issue tracker](https://github.com/NVIDIA/cuda-quantum/issues) to check if your feature has already been mentioned or rejected in other issues.
### Descri…
-
There is a lot of talk about Post-Quantum / Quantum-Resistant Cryptography, and leadership at a company I am talking with has asked about a proof-of-concept for a PKI that uses Post Quantum algorithms…
-
Claro, aquí te proporciono una guía básica sobre seguridad web:
Utilizar HTTPS: Es esencial asegurarse de que tu sitio web esté protegido con HTTPS, lo que significa que se utiliza el protocolo SSL/T…