Trustworthy and reliable computing using untrusted and unreliable quantum hardware

Today's article comes from Frontiers in Computer Science. The authors are Upadhyay et al., from Pennsylvania State University. In this paper they break down a new attack vector and mitigation technique in the field of quantum computing. Let's take a look at what their research revealed.

DOI: 10.3389/fcomp.2024.1431788

Book
Book

Members Only

You must be an active Journal Club member to access this content. If you're already a member, click the blue button to login. If you're not a member yet, click the sign-up button to get started.

Login to My Account Sign Up