Hamiltonian simulation is one of the most important problems in the fiel...
We introduce a new paradigm for analysing and finding bugs in quantum
ci...
We initiate the study of online routing problems with predictions, inspi...
This work revisits the security of classical signatures and ring signatu...
From the minimal assumption of post-quantum semi-honest oblivious transf...
Group signatures are an important cryptographic primitive providing both...
We investigate the existence of constant-round post-quantum black-box
ze...
In a recent breakthrough, Mahadev constructed a classical verification o...
In a recent seminal work, Bitansky and Shmueli (STOC '20) gave the first...
We revisit the so-called compressed oracle technique, introduced by Zhan...
We investigate whether there are inherent limits of parallelization in t...
In function inversion, we are given a function f: [N] ↦ [N], and want
to...
In this paper, we extend the protocol of classical verification of quant...
Function inversion is that given a random function f: [M] → [N], we want...
Near-term quantum computers are likely to have small depths due to short...
We generalize the PAC (probably approximately correct) learning model to...
Spiking Neural Networks (SNN) are mathematical models in neuroscience to...
The famous Shannon impossibility result says that any encryption scheme ...