1 minute read

International Journal for Research in Applied Science & Engineering Technology (IJRASET)

ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538

Volume 11 Issue III Mar 2023- Available at www.ijraset.com

Advertisement

[8] S. Bone and M. Castro, “A Brief History of Quantum Computing,” Surveys and Presentations in Information Systems Engineering (SURPRISE), vol. 4, no. 3, pp. 20–45, 1997, http://www.doc.ic.ac.uk/ nd/ surprise 97/journal/vol4/spb3/.

[9] J. Muhonen and T. Dehollain, “Storing Quantum Information For 30 Seconds In a Nanoelectronic Device,” Nature Nanotechnology, vol. 9, pp. 986–991, 2014.

[10] D-Wave, “Quantum Computing: How D-Wave Systems Work,” http: //www.dwavesys.com/our-company/meet-d-wave.

[10] J. Buchmann, E. Dahmen, and A. Hulsing, “XMSS-a Practical Forward ¨ Secure Signature Scheme Based on Minimal Security Assumptions,” Post-Quantum Cryptography, pp. 117–129, 2011.

[11] R. Overbeck and N. Sendrier, “Code-based Cryptography,” in PostQuantum Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009, pp. 95–145.

This article is from: