mastodontech.de ist einer von vielen unabhängigen Mastodon-Servern, mit dem du dich im Fediverse beteiligen kannst.
Offen für alle (über 16) und bereitgestellt von Markus'Blog

Serverstatistik:

1,5 Tsd.
aktive Profile

#quantumcomputing

13 Beiträge13 Beteiligte1 Beitrag heute

Japan unveils first fully homegrown quantum computer

Japan recently launched its superconducting quantum computer built with homegrown components and software. The computer was launched at the University of Osaka’s Center for Quantum Information and Quantum Biology (QIQB). This achievement signifi…
#Japan #JP #JapanNews #JapanTopics #news #quantum #quantumcomputation #quantumcomputer #quantumcomputing #Qubits
alojapan.com/1342194/japan-unv

alojapan.com/1342194/japan-unv Japan unveils first fully homegrown quantum computer #Japan #JapanNews #JapanTopics #news #quantum #QuantumComputation #QuantumComputer #QuantumComputing #Qubits Japan recently launched its superconducting quantum computer built with homegrown components and software. The computer was launched at the University of Osaka’s Center for Quantum Information and Quantum Biology (QIQB). This achievement signifies Japan’s technological prowess in qua

"Welcome to the website for the Applied Cryptography course at the American University of Beirut! This page serves as a unified and self-sufficient source of truth on everything concerning your course.
(...)
Course Description: Applied Cryptography explores the core theory of modern cryptography and how to apply these fundamental principles to build and analyze real-world secure systems. We start with foundational concepts—such as Kerckhoff's Principle, computational hardness, and provable security—before moving on to key cryptographic primitives like pseudorandom generators, block ciphers, and hash functions. Building on this solid groundwork, we will survey how these technologies power critical real-world deployments such as TLS, secure messaging protocols (e.g., Signal), and post-quantum cryptography. We will also delve into specialized topics like high-assurance cryptographic implementations, elliptic-curve-based systems, and zero-knowledge proofs to give you a complete understanding of contemporary cryptography's scope and impact. By the end of the semester, you will have gained both a rigorous theoretical perspective and practical hands-on experience, enabling you to evaluate, design, and implement cryptographic solutions."

appliedcryptography.page

appliedcryptography.pageApplied Cryptography — American University of BeirutLearn modern cryptography principles and applications in this comprehensive course covering cryptographic theory, practical implementations, and real-world security systems at the American University of Beirut.

🚀 From Star Trek to CERN, antimatter has gone from sci-fi to cutting-edge science.

Has CERN taken a giant leap in antimatter research? What does this mean for quantum computing and our understanding of the universe? 🧪⚛️

🔗 Read more: authormulhall.com/antimatter-q

Author Mulhall 📚 · Antimatter Qubits: CERN's Leap Into Quantum FutureCan CERN’s antimatter qubit redefine quantum tech? A quantum leap in physics reveals new paths for exporation and quantum computing.

Replication of Quantum Factorisation Records with an 8-bit Home Computer, an Abacus, and a Dog

eprint.iacr.org/2025/1237.pdf

> This paper presents implementations that match and, where possible, exceed current quantum factorisation records using a VIC-20 8-bit home computer from 1981, an abacus, and a dog. We hope that this work will inspire future efforts to match any further quantum factorisation records, should they arise.

PDF includes such gems as « We use the UK form “factorise” here in place of the US variants “factorize” or “factor” in order to avoid the 40% tariff on the US term" » and « This process wasn’t as simple as it first appeared because Scribble is very well behaved and almost never barks. »

If you're even mildly interested in maths, this is a fun and accessible read. 😄

The NCSC has just put out a paper on Quantum networking technologies.

"We believe there is an ideal opportunity for industry and academic groups in the quantum communications and cyber security sectors to work in partnership to the benefit of the UK, with a focus on envisioning secure network architectures, defining the components that may be needed, and thinking about the assurance of these components and the wider system."

#cybersecurity #quantumcomputing

ncsc.gov.uk/whitepaper/quantum

www.ncsc.gov.ukQuantum networking technologiesA white paper outlining the NCSC’s approach to quantum security technologies.

LOL

"In this paper we showed how to replicate current quantum factorisation records using first a VIC-20 8-bit home computer from 1981, then an abacus, and finally a dog....[W]e rank a VIC-20 above an abacus, an abacus above a dog, and a dog above a quantum factorisation physics experiment. Finally, we provided standard evaluation criteria for future claimed quantum factorisations."

#physics #vic20 #factorization #quantumbullshit #quantumcomputing #funny #dogs #abacus

eprint.iacr.org/2025/1237.pdf

Cheating on Quantum Computing Benchmarks

Peter Gutmann and Stephan Neuhaus have a new paper—I think it’s new, even though it has a March 2025 date—that makes the argument that we shouldn’t trust any of the quantu... schneier.com/blog/archives/202

Schneier on Security · Cheating on Quantum Computing Benchmarks - Schneier on SecurityPeter Gutmann and Stephan Neuhaus have a new paper—I think it’s new, even though it has a March 2025 date—that makes the argument that we shouldn’t trust any of the quantum factorization benchmarks, because everyone has been cooking the books: Similarly, quantum factorisation is performed using sleight-of-hand numbers that have been selected to make them very easy to factorise using a physics experiment and, by extension, a VIC-20, an abacus, and a dog. A standard technique is to ensure that the factors differ by only a few bits that can then be found using a simple search-based approach that has nothing to do with factorisation…. Note that such a value would never be encountered in the real world since the RSA key generation process typically requires that |p-q| > 100 or more bits [9]. As one analysis puts it, “Instead of waiting for the hardware to improve by yet further orders of magnitude, researchers began inventing better and better tricks for factoring numbers by exploiting their hidden structure” [10]...

Kyoto scientists advance quantum tech with single-photon emission discovery

image: ©sankai | iStock Quantum computing can solve problems that are too complicated for standard machines, but understanding when and how this “quantum advantage” will be realised has remained a significant question Now, researchers from K…
#Japan #JP #Kyoto #kyotonews #news #Physics #quantumcomputing #京都 #京都府
alojapan.com/1334474/kyoto-sci

alojapan.com/1334474/kyoto-sci Kyoto scientists advance quantum tech with single-photon emission discovery #Kyoto #KyotoNews #news #Physics #QuantumComputing #京都 #京都府 image: ©sankai | iStock Quantum computing can solve problems that are too complicated for standard machines, but understanding when and how this “quantum advantage” will be realised has remained a significant question Now, researchers from Kyoto University have found a link between this advantage and the prin