|
Journal
|
2025 |
Partial blind quantum computation: a framework for selective circuit protection
Youngkyung Lee Quantum Information Processing, v.24, no.8, pp.1-25 |
0 |
원문
|
|
Journal
|
2025 |
Resource-compact time-optimal quantum computation
Kim Taewan Quantum Information Processing, v.24, no.7, pp.1-11 |
0 |
원문
|
|
Journal
|
2025 |
Quantum Implementation of S-Boxes Based on Polynomial Evaluation
Chung Do Young Electronics Letters, v.61, no.1, pp.1-7 |
0 |
원문
|
|
Conference
|
2025 |
Entanglement of up to 6 photons on a silicon photonic quantum circuit
Lee Jong-Moo Optical Fiber Communication Conference (OFC) 2025, pp.1-3 |
|
|
|
Conference
|
2025 |
A Novel Approach for Quantum Simulation Software Framework
Jin Ki Sung International Conference on Consumer Electronics (ICCE) 2025, pp.1-4 |
0 |
원문
|
|
Conference
|
2024 |
Physical Qubits Estimation for Quantum S-box
Lee You Seok International Conference on Information and Communication Technology Convergence (ICTC) 2024, pp.1369-1370 |
1 |
원문
|
|
Journal
|
2024 |
Optimal execution of logical Hadamard with low-space overhead in rotated surface code
Sang Min Lee ETRI Journal, v.46, no.5, pp.759-773 |
1 |
원문
|
|
Journal
|
2024 |
Toffoli-depth reduction method preserving in-place quantum circuits and its application to SHA3-256
Lee Jongheon Quantum Information Processing, v.23, pp.1-43 |
5 |
원문
|
|
Conference
|
2023 |
Lattice surgery-based logical operations in a fault-tolerant quantum software framework
Youngchul Kim International Conference on Information and Communication Technology Convergence (ICTC) 2023, pp.173-176 |
0 |
원문
|
|
Journal
|
2023 |
A multilayered Pauli tracking architecture for lattice surgery‐based logical qubits
On Jin Ho ETRI Journal, v.45, no.3, pp.462-478 |
6 |
원문
|
|
Journal
|
2023 |
T‐depth reduction method for efficient SHA‐256 quantum circuit construction
Jong-Heon Lee IET Information Security, v.17, no.1, pp.46-65 |
6 |
원문
|
|
Conference
|
2021 |
T-depth Reduction Method for Efficient SHA-256 Quantum Circuit Construction
Jong-Heon Lee International Conference on Information Security and Cryptology (ICISC) 2021 (LNCS 13218), pp.368-391 |
0 |
원문
|