[1]
K. R. Brown, Quantum technologies and the National Quantum Initiative, Quantum Engineering, vol. 1, no. 1, p. e7, 2019.
[2]
J. Mlynek, The European quantum technology flagship: Paving the way for the second quantum revolution, Quantum Engineering, vol. 1, no. 1, p. e5, 2019.
[3]
C. Wang and H. G. Zhang, Impact of commercial quantum computer on cryptography, (in Chinese), Information Security and Communications Privacy, no. 2, pp. 31-32&35, 2012.
[4]
A. Perdomo-Ortiz, N. Dickson, M. Drew-Brook, G. Rose, and A. Aspuru-Guzik, Finding low-energy conformations of lattice protein models by quantum annealing, Scientific Reports, vol. 2, p. 571, 2012.
[5]
R. Martonák, G. E. Santoro, and E. Tosatti, Quantum annealing of the traveling-salesman problem, Phys. Rev. E, vol. 70, no. 5, p. 057701, 2004.
[6]
A. Cho, DOE pushes for useful quantum computing, Science, vol. 359, no. 6372, pp. 141-142, 2018.
[7]
J. Brainard, What’s coming up in 2018, Science, vol. 359, no. 6371, pp. 10-12, 2018.
[8]
E. Gibney, Physics: Quantum computer quest, Nature, vol. 516, no. 7529, pp. 24-26, 2014.
[9]
B. N. Wang, F. Hu, H. N. Yao, and C. Wang, Prime factorization algorithm based on parameter optimization of Ising model, Scientific Reports, vol. 10, p. 7106, 2020.
[11]
E. Farhi, J. Goldstone, S. Gutmann, J. Lapan, A. Lundgren, and D. Preda, A quantum adiabatic evolution algorithm applied to random instances of an NP-complete problem, Science, vol. 292, no. 5516, pp. 472-475, 2001.
[12]
B. N. Wang, F. Hu, and C. Wang, Optimization of quantum computing models inspired by D-Wave quantum annealing, Tsinghua Science and Technology, vol. 25, no. 4, pp. 508-515, 2020.
[13]
N. Wang, G. G. Guo, B. N. Wang, and C. Wang, Traffic clustering algorithm of urban data brain based on a hybrid-augmented architecture of quantum annealing and brain-inspired cognitive computing, Tsinghua Science and Technology, vol. 25, no. 6, pp. 813-825, 2020.
[14]
M. W. Johnson, M. H. S. Amin, S. Gildert, T. Lanting, F. Hamze, N. Dickson, R. Harris, A. J. Berkley, J. Johansson, P. Bunyk, et al., Quantum annealing with manufactured spins, Nature, vol. 473, no. 7346, pp. 194-198, 2011.
[15]
O. Titiloye and A. Crispin, Quantum annealing of the graph coloring problem, Discrete Optimization, vol. 8, no. 2, pp. 376-384, 2011.
[16]
F. Neukart, G. Compostella, C. Seidel, D. von Dollen, S. Yarkoni, and B. Parney, Traffic flow optimization using a quantum annealer, Frontiers in ICT, vol. 4, p. 29, 2017.
[17]
W. C. Peng, B. N. Wang, F. Hu, Y. J. Wang, X. J. Fang, X. Y. Chen, and C. Wang, Factoring larger integers with fewer qubits via quantum annealing with optimized parameters, Sci. China Phys. Mech. Astron., vol. 62, no. 6, p. 60311, 2019.
[18]
X. M. Wang, Quest towards “factoring larger integers with commercial D-Wave quantum annealing machines”, Sci. China Phys. Mech. Astron., vol. 62, no. 6, p. 960331, 2019.
[19]
A. D. King, J. Carrasquilla, J. Raymond, I. Ozfidan, E. Andriyash, A. Berkley, M. Reis, T. Lanting, R. Harris, F. Altomare, et al., Observation of topological phenomena in a programmable lattice of 1800 qubits, Nature, vol. 560, no. 7719, pp. 456-460, 2018.
[20]
R. Harris, Y. Sato, A. J. Berkley, M. Reis, F. Altomare, M. H. Amin, K. Boothby, P. Bunyk, C. Deng, C. Enderud, et al., Phase transitions in a programmable quantum spin glass simulator, Science, vol. 361, no. 6398, pp. 162-165, 2018.
[21]
S. X. Jiang, K. A. Britt, A. J. McCaskey, T. S. Humble, and S. Kais, Quantum annealing for prime factorization, Scientific Reports, vol. 8, p. 17667, 2018.
[22]
B. N. Wang, F. Hu, H. G. Zhang, and C. Wang, From evolutionary cryptography to quantum artificial intelligent cryptography, (in Chinese), Journal of Computer Research and Development, vol. 56, no. 10, pp. 2112-2134, 2019.
[23]
M. R. Geller and Z. Y. Zhou, Factoring 51 and 85 with 8 qubits, Scientific Reports, vol. 3, p. 3023, 2013.
[24]
X. H. Peng, Z. Y. Liao, N. Y. Xu, G. Qin, X. Y. Zhou, D. Suter, and J. F. Du, Quantum adiabatic algorithm for factorization and its experimental implementation, Phys. Rev. Lett., vol. 101, no. 22, p. 220405, 2008.
[25]
J. H. Chen, C. H. Tan, and X. Y. Li, Practical cryptanalysis of a public key cryptosystem based on the Morphism of polynomials problem, Tsinghua Science and Technology, vol. 23, no. 6, pp. 671-679, 2018.
[26]
C. Wang, F. Hu, H. G. Zhang, and J. Wu, Evolutionary cryptography theory-based generating method for secure ECs, Tsinghua Science and Technology, vol. 22, no. 5, pp. 499-510, 2017.
[27]
H. Z. Wang, H. G. Zhang, S. W. Mao, W. Q. Wu, and L. Q. Zhang, New public-key cryptosystem based on the morphism of polynomials problem, Tsinghua Science and Technology, vol. 21, no. 3, pp. 302-311, 2016.
[28]
D. Połap and M. Woźniak, Voice recognition by neuro-heuristic method, Tsinghua Science and Technology, vol. 24, no. 1, pp. 9-17, 2019.
[29]
D. J. Bernstein, Introduction to post-quantum cryptography, in Post-Quantum Cryptography, D. J. Bernstein, J. Buchmann, and E. Dahmen, eds. Berlin, Germany: Springer, 2009, pp. 1-14.
[30]
F. Hu, L. Lamata, M. Sanz, X. Chen, X. Y. Chen, C. Wang, and E. Solano, Quantum computing cryptography: Finding cryptographic Boolean functions with quantum annealing by a 2000 qubit D-Wave quantum computer, arXiv preprint arXiv: 1806.08706, 2020.
[31]
F. Hu, L. Lamata, M. Sanz, X. Chen, X. Y. Chen, C. Wang, and E. Solano, Quantum computing cryptography: Finding cryptographic Boolean functions with quantum annealing by a 2000 qubit D-Wave quantum computer, Physics Letters A, vol. 384, p. 126214, 2020.
[32]
A. K. Lenstra, H. W. Lenstra, M. S. Manasse, and J. M. Pollard, The number field sieve, in Proc. 22nd Annu. ACM Symp. Theory of Computing, Baltimore, MD, USA, 1990, pp. 564-572.
[33]
C. Gidney, Factoring with n+2 clean qubits and n-1 dirty qubits, arXiv preprint arXiv: 1706.07884v2, 2018.
[34]
C. Wang, Y. J. Wang, and F. Hu, Shaping the future of commercial quantum computer and the challenge for information security, (in Chinese), Chinese Journal of Network and Information Security, vol. 2, no. 3, pp. 17-27, 2016.
[35]
H. P. Liu, D. Guo, F. C. Sun, W. Q. Yang, S. Furber, and T. C. Sun, Embodied tactile perception and learning, Brain Science Advances, vol. 6, no. 2, pp.132-158, 2020.
[36]
D. Tang, Recent progress in (fast) algebraic immunity of Boolean functions, (in Chinese), Journal of Cryptologic Research, vol. 4, no. 3, pp. 262-272, 2017.
[37]
W. G. Zhang and E. Pasalic, Constructions of resilient S-boxes with strictly almost optimal nonlinearity through disjoint linear codes, IEEE Transactions on Information Theory, vol. 60, no. 3, pp. 1638-1651, 2014.