Voir la notice de l'article provenant de la source Math-Net.Ru
[1] Shor P.W., “Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer”, SIAM J. Comput., 26:5 (1997), 1484–1509 | DOI | MR | Zbl
[2] Grover L.K., “A fast quantum mechanical algorithm for database search”, Proc. 28th Annu. ACM Symp. Theory of Computing (STOC), 1996, 212–219 | MR | Zbl
[3] Simon D.R., “On the power of quantum computation”, SIAM J. Comput., 26:5 (1997), 1474–1483 | DOI | MR | Zbl
[4] Gainutdinova A.F., Comparative complexity of quantum and classical models of calculations., Thesis for the degree of Candidate of Phys.-Math. Sci., 2004
[5] Quantum Computing Report, https://quantumcomputingreport.com
[6] Quantum Computing: Progress and Prospects, Nat. Acad. Sci., Engin., and Medicine, The Nat. Acad. Press, Washington, DC, 2018, 202 pp.
[7] Denisenko D.V., “Quantum circuits for substitution implementation without ancilla qubits”, Zh. Exper. Teor. Fis., 155:6 (2019), 999–1008 (in Russian) | DOI
[8] Nielsen M.A., Chuang I.L., Quantum computation and quantum information, Cambridge Univ. Press, 2010, xxxii+676 pp. | MR | Zbl
[9] Kim P., Han D., Jeong K.C., “Time-space complexity of quantum search algorithms in symmetric cryptanalysis: applying to AES and SHA-2”, Quantum Inf. Process., 17:339 (2018) | MR
[10] Grassl M., Langenberg B., Roetteler M., Steinwandt R., Applying Grover's algorithm to AES: quantum resourse estimation, Cryptology ePrint Archive, Report 2019/103, 2015 | MR
[11] Younes A., Miller J., Automated method for building CNOT based quantum circuits for Boolean functions, 2003, arXiv: quant-ph/0304099v1
[12] Jaques S., Schanck J. M., Quantum cryptanalysis in the RAM model: Claw-finding attacks on SIKE, Cryptology ePrint Archive, Report 2019/103, 2019
[13] Submission requirements and evaluation criteria for the post-quantum cryptography standardization process, National Institute of Standards and Technology, 2017
[14] The Quipper Language, http://www.mathstat.dal.ca/s̃elinger/quipper/