The cr.yp.to blog| blog.cr.yp.to
Lecture locations, by country:| cr.yp.to
nistp224: share secret keys using the NIST P-224 elliptic curveD. J. Bernstein| cr.yp.to
Quantum error correction provides a path to reach practical quantum computing by combining multiple physical qubits into a logical qubit, where the logical error rate is suppressed exponentially as more qubits are added. However, this exponential suppression only occurs if the physical error rate is below a critical threshold. In this work, we present two surface code memories operating below this threshold: a distance-7 code and a distance-5 code integrated with a real-time decoder. The logi...| arXiv.org
The proposed strategy relies on manipulating with high precision an unimaginably huge number of variables| IEEE Spectrum
The cr.yp.to blog| blog.cr.yp.to
The cr.yp.to blog| blog.cr.yp.to
D. J. BernsteinIndex of formal scientific papers| cr.yp.to
(a) Whoever knowingly and willfully communicates, furnishes, transmits, or otherwise makes available to an unauthorized person, or publishes, or uses in any manner prejudicial to the safety or interest of the United States or for the benefit of any foreign government to the detriment of the United States any classified information—| LII / Legal Information Institute
[Cross posted on lesswrong; see here for my prior writings ; update: 8/25/23: added a paragraph on secrecy] [it appears almost certain that in the immediate future, it would be] pos…| Windows On Theory