{"id":"https://openalex.org/W4389396814","doi":"https://doi.org/10.1186/s42400-023-00181-w","title":"Minimizing CNOT-count in quantum circuit of the extended Shor\u2019s algorithm for ECDLP","display_name":"Minimizing CNOT-count in quantum circuit of the extended Shor\u2019s algorithm for ECDLP","publication_year":2023,"publication_date":"2023-12-06","ids":{"openalex":"https://openalex.org/W4389396814","doi":"https://doi.org/10.1186/s42400-023-00181-w"},"language":"en","primary_location":{"id":"doi:10.1186/s42400-023-00181-w","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-023-00181-w","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-023-00181-w","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-023-00181-w","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5002452182","display_name":"Xia Liu","orcid":"https://orcid.org/0000-0003-4279-5449"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xia Liu","raw_affiliation_strings":["School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013427655","display_name":"Huan Yang","orcid":"https://orcid.org/0009-0009-2551-436X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Huan Yang","raw_affiliation_strings":["Beijing Youzhuju Network Technology Co., Ltd., Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Youzhuju Network Technology Co., Ltd., Beijing, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100321661","display_name":"Li Yang","orcid":"https://orcid.org/0000-0003-2091-0506"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Li Yang","raw_affiliation_strings":["State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5002452182"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210156404","https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":0.8579,"has_fulltext":true,"cited_by_count":5,"citation_normalized_percentile":{"value":0.79588231,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":98},"biblio":{"volume":"6","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10682","display_name":"Quantum Computing Algorithms and Architecture","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10682","display_name":"Quantum Computing Algorithms and Architecture","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9934999942779541,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/controlled-not-gate","display_name":"Controlled NOT gate","score":0.7582283616065979},{"id":"https://openalex.org/keywords/quantum-computer","display_name":"Quantum computer","score":0.5592195391654968},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.5368239283561707},{"id":"https://openalex.org/keywords/modular-arithmetic","display_name":"Modular arithmetic","score":0.5228041410446167},{"id":"https://openalex.org/keywords/quantum-algorithm","display_name":"Quantum algorithm","score":0.5186254382133484},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.45075011253356934},{"id":"https://openalex.org/keywords/quantum-circuit","display_name":"Quantum circuit","score":0.4500645697116852},{"id":"https://openalex.org/keywords/discrete-logarithm","display_name":"Discrete logarithm","score":0.4148930609226227},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.39093464612960815},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.384858638048172},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3231718838214874},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.29613080620765686},{"id":"https://openalex.org/keywords/quantum-gate","display_name":"Quantum gate","score":0.2775125503540039},{"id":"https://openalex.org/keywords/quantum","display_name":"Quantum","score":0.23704242706298828},{"id":"https://openalex.org/keywords/quantum-error-correction","display_name":"Quantum error correction","score":0.23440870642662048},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.21347755193710327},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.14856070280075073},{"id":"https://openalex.org/keywords/quantum-mechanics","display_name":"Quantum mechanics","score":0.10974335670471191}],"concepts":[{"id":"https://openalex.org/C182953411","wikidata":"https://www.wikidata.org/wiki/Q917713","display_name":"Controlled NOT gate","level":5,"score":0.7582283616065979},{"id":"https://openalex.org/C58053490","wikidata":"https://www.wikidata.org/wiki/Q176555","display_name":"Quantum computer","level":3,"score":0.5592195391654968},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5368239283561707},{"id":"https://openalex.org/C32049820","wikidata":"https://www.wikidata.org/wiki/Q319400","display_name":"Modular arithmetic","level":3,"score":0.5228041410446167},{"id":"https://openalex.org/C137019171","wikidata":"https://www.wikidata.org/wiki/Q2623817","display_name":"Quantum algorithm","level":3,"score":0.5186254382133484},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.45075011253356934},{"id":"https://openalex.org/C124148022","wikidata":"https://www.wikidata.org/wiki/Q2122210","display_name":"Quantum circuit","level":5,"score":0.4500645697116852},{"id":"https://openalex.org/C173259116","wikidata":"https://www.wikidata.org/wiki/Q864003","display_name":"Discrete logarithm","level":4,"score":0.4148930609226227},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.39093464612960815},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.384858638048172},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3231718838214874},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.29613080620765686},{"id":"https://openalex.org/C58849907","wikidata":"https://www.wikidata.org/wiki/Q2118982","display_name":"Quantum gate","level":4,"score":0.2775125503540039},{"id":"https://openalex.org/C84114770","wikidata":"https://www.wikidata.org/wiki/Q46344","display_name":"Quantum","level":2,"score":0.23704242706298828},{"id":"https://openalex.org/C51003876","wikidata":"https://www.wikidata.org/wiki/Q1536431","display_name":"Quantum error correction","level":4,"score":0.23440870642662048},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.21347755193710327},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.14856070280075073},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.10974335670471191},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s42400-023-00181-w","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-023-00181-w","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-023-00181-w","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:95e13729b237487fa7399b1280c091e2","is_oa":true,"landing_page_url":"https://doaj.org/article/95e13729b237487fa7399b1280c091e2","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cybersecurity, Vol 6, Iss 1, Pp 1-27 (2023)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s42400-023-00181-w","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-023-00181-w","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-023-00181-w","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1023919524","display_name":null,"funder_award_id":", Grant","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1121271761","display_name":null,"funder_award_id":"Program","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2398241526","display_name":null,"funder_award_id":"61672517","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3085993365","display_name":null,"funder_award_id":"(Grant No.","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G37568934","display_name":null,"funder_award_id":"Grant","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5797141846","display_name":null,"funder_award_id":"61732021","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7726157001","display_name":null,"funder_award_id":"Grant No.","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4389396814.pdf"},"referenced_works_count":24,"referenced_works":["https://openalex.org/W1523314225","https://openalex.org/W1587133324","https://openalex.org/W1631356911","https://openalex.org/W1968493380","https://openalex.org/W2003736153","https://openalex.org/W2035112473","https://openalex.org/W2036378739","https://openalex.org/W2079064528","https://openalex.org/W2135205181","https://openalex.org/W2137147061","https://openalex.org/W2157672296","https://openalex.org/W2168676717","https://openalex.org/W2934743019","https://openalex.org/W2951189305","https://openalex.org/W2951773754","https://openalex.org/W3022840541","https://openalex.org/W3096061848","https://openalex.org/W3101571824","https://openalex.org/W3204166663","https://openalex.org/W4200140055","https://openalex.org/W4234748298","https://openalex.org/W4238324702","https://openalex.org/W6601215536","https://openalex.org/W6602670149"],"related_works":["https://openalex.org/W4320854618","https://openalex.org/W4385261786","https://openalex.org/W4387917696","https://openalex.org/W2065516801","https://openalex.org/W4389217357","https://openalex.org/W3132276317","https://openalex.org/W1986555820","https://openalex.org/W2037426566","https://openalex.org/W4375959436","https://openalex.org/W4389168354"],"abstract_inverted_index":{"Abstract":[0],"The":[1],"elliptic":[2,108],"curve":[3],"discrete":[4,105],"logarithm":[5],"problem":[6],"(ECDLP)":[7],"is":[8,31,49,233],"a":[9,56],"popular":[10],"choice":[11],"for":[12,89,99,201],"cryptosystems":[13],"due":[14],"to":[15,103,134,214,224],"its":[16],"high":[17],"level":[18],"of":[19,25,64,68,76,147,152,161,173,188,266],"security.":[20],"However,":[21],"with":[22,85,192,198,220],"the":[23,26,40,62,65,69,74,90,132,136,145,150,153,159,165,170,174,193,216,221,230,261,267],"advent":[24],"extended":[27,91,100,217,268],"Shor\u2019s":[28,92,101,218,269],"algorithm,":[29,70],"there":[30],"concern":[32],"that":[33],"ECDLP":[34,78],"may":[35],"soon":[36],"be":[37],"vulnerable.":[38],"While":[39],"algorithm":[41,102,175,219,270],"does":[42],"offer":[43],"hope":[44],"in":[45,59,131,164],"solving":[46],"ECDLP,":[47],"it":[48,53],"still":[50],"uncertain":[51],"whether":[52],"can":[54],"pose":[55],"real":[57],"threat":[58],"practice.":[60],"From":[61],"perspective":[63],"quantum":[66,83,87,97,180,275],"circuits":[67,88,98,133,223],"this":[71],"paper":[72],"analyzes":[73],"feasibility":[75,265],"cracking":[77],"using":[79],"an":[80,177,226,272],"ion":[81,178,273],"trap":[82,179,274],"computer":[84],"improved":[86,199,222],"algorithm.":[93],"We":[94],"give":[95],"precise":[96],"calculate":[104],"logarithms":[106],"on":[107,143,157,176,271],"curves":[109],"over":[110],"prime":[111],"fields,":[112],"including":[113],"modular":[114,118,121,202],"subtraction,":[115],"three":[116],"different":[117],"multiplication,":[119],"and":[120,126,206,264],"inverse.":[122],"Additionally,":[123],"we":[124,155,183,210,259],"incorporate":[125],"improve":[127],"upon":[128],"windowed":[129,207],"arithmetic":[130,190],"reduce":[135],"CNOT-counts.":[137],"Whereas":[138],"previous":[139],"studies":[140],"mostly":[141],"focused":[142],"minimizing":[144,158],"number":[146,160],"qubits":[148],"or":[149],"depth":[151],"circuit,":[154,166],"focus":[156],"CNOT":[162],"gates":[163],"which":[167],"greatly":[168],"affects":[169],"running":[171,262],"time":[172,263],"computer.":[181,276],"Specifically,":[182],"begin":[184],"by":[185],"presenting":[186],"implementations":[187],"basic":[189],"operations":[191],"lowest":[194],"known":[195],"CNOT-counts,":[196],"along":[197],"constructions":[200],"inverse,":[203],"point":[204],"addition,":[205],"arithmetic.":[208],"Next,":[209],"precisely":[211],"estimate":[212],"that,":[213],"execute":[215],"factor":[225],"n":[227],"-bit":[228],"integer,":[229],"CNOT-count":[231],"required":[232],"$$1237n^3/\\log":[234],"n+2n^2+n$$":[235],"<mml:math":[236],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\">":[237],"<mml:mrow>":[238],"<mml:mn>1237</mml:mn>":[239],"<mml:msup>":[240,249],"<mml:mi>n</mml:mi>":[241,246,250,254],"<mml:mn>3</mml:mn>":[242],"</mml:msup>":[243,252],"<mml:mo>/</mml:mo>":[244],"<mml:mo>log</mml:mo>":[245],"<mml:mo>+</mml:mo>":[247,253],"<mml:mn>2</mml:mn>":[248,251],"</mml:mrow>":[255],"</mml:math>":[256],".":[257],"Finally,":[258],"analyze":[260]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":4}],"updated_date":"2026-04-18T07:56:08.524223","created_date":"2025-10-10T00:00:00"}
