Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Second order accuracy finite difference methods for space-fractional partial differential equations., , and . J. Comput. Appl. Math., (2017)Sumcheck-Based Delegation of Quantum Computing to Rational Server., , and . TAMC, volume 12337 of Lecture Notes in Computer Science, page 69-81. Springer, (2020)Ancilla-driven instantaneous quantum polynomial time circuit for quantum supremacy., and . CoRR, (2016)Rewindable Quantum Computation and Its Equivalence to Cloning and Adaptive Postselection., , , and . TQC, volume 266 of LIPIcs, page 9:1-9:23. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2023)A Consideration of Parameters for a Nonlinear Filter Generator and its Linear Complexity Profile., , , , , and . ICCE-Taiwan, page 345-346. IEEE, (2023)A Controller Augmentation Method to Improve Transition Fault Coverage for RTL Data-Paths., , , and . IOLTS, page 293-298. IEEE, (2019)Interactive Proofs with Polynomial-Time Quantum Prover for Computing the Order of Solvable Groups., , , and . MFCS, volume 117 of LIPIcs, page 26:1-26:13. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2018)Effects of a Sprinkler on Evacuation Dynamics in Fire., , and . Comput., 3 (2): 274-284 (2015)Classically Simulating Quantum Circuits with Local Depolarizing Noise., , and . MFCS, volume 170 of LIPIcs, page 83:1-83:13. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2020)Information-theoretic security proof of differential-phase-shift quantum key distribution protocol based on complementarity, , , , and . (2017)cite arxiv:1705.00171Comment: 15 pages, 5 figures.