{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,5]],"date-time":"2026-05-05T06:59:32Z","timestamp":1777964372425,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540655145","type":"print"},{"value":"9783540492085","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999]]},"DOI":"10.1007\/3-540-49208-9_15","type":"book-chapter","created":{"date-parts":[[2007,8,16]],"date-time":"2007-08-16T13:07:37Z","timestamp":1187269657000},"page":"174-188","source":"Crossref","is-referenced-by-count":54,"title":["The Hidden Subgroup Problem and Eigenvalue Estimation on a Quantum Computer"],"prefix":"10.1007","author":[{"given":"Michele","family":"Mosca","sequence":"first","affiliation":[]},{"given":"Artur","family":"Ekert","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[1999,5,21]]},"reference":[{"key":"15_CR1","doi-asserted-by":"publisher","first-page":"3457","DOI":"10.1103\/PhysRevA.52.3457","volume":"52","author":"A. Barenco","year":"1995","unstructured":"Barenco, A., Bennett, C.H., Cleve, R, DiVincenzo, D.P., Margolus, N., Shor, P., Sleater, T., Smolin, J., Weinfurter, H.: Phys. Rev. A\n                           52, (1995) 3457.","journal-title":"Phys. Rev. A"},{"key":"15_CR2","doi-asserted-by":"publisher","first-page":"424","DOI":"10.1007\/3-540-44750-4_34","volume":"963","author":"D. Boneh","year":"1995","unstructured":"Boneh, D., and Lipton, R.J.: Quantum cryptanalysis of hidden linear functions (Extended abstract). Lecture Notes on Computer Science 963 (1995) 424\u2013437","journal-title":"Lecture Notes on Computer Science"},{"key":"15_CR3","doi-asserted-by":"crossref","first-page":"339","DOI":"10.1098\/rspa.1998.0164","volume":"454","author":"R. Cleve","year":"1998","unstructured":"Cleve, R., Ekert, E., Macchiavello, C., and Mosca, M.: Quantum Algorithms Revisited, Proc. Roy. Soc. Lond. A, 454, (1998) 339\u2013354.","journal-title":"Proc. Roy. Soc. Lond. A"},{"key":"15_CR4","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1098\/rspa.1985.0070","volume":"400","author":"D. Deutsch","year":"1985","unstructured":"Deutsch, D.: Quantum Theory, the Church-Turing principle and the universal quantum computer. Proc. Roy. Soc. Lond. A, 400, (1985) 97\u2013117.","journal-title":"Proc. Roy. Soc. Lond. A"},{"key":"15_CR5","unstructured":"Ekert, A., Mosca, M.: (note in preparation, 1998)."},{"key":"15_CR6","doi-asserted-by":"publisher","first-page":"3228","DOI":"10.1103\/PhysRevLett.76.3228","volume":"76","author":"R.B. Griffiths","year":"1996","unstructured":"Griffiths, R.B. and Niu, C.-S.: Semi-classical Fourier Transform for Quantum Computation, Phys. Rev. Lett. 76 (1996) 3228\u20133231.","journal-title":"Phys. Rev. Lett."},{"key":"15_CR7","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1016\/S0304-3975(96)00188-0","volume":"180","author":"D. Y. Grigoriev","year":"1997","unstructured":"Grigoriev, D. Y.: Testing the shift-equivalence of polynomials by deterministic, probabilistic and quantum machines. Theoretical Computer Science, 180 (1997) 217\u2013228.","journal-title":"Theoretical Computer Science"},{"key":"15_CR8","unstructured":"H\u00d8yer, P.: Conjugated Operators in Quantum Algorithms. preprint, (1997)."},{"key":"15_CR9","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1098\/rspa.1998.0163","volume":"454","author":"J. R","year":"1998","unstructured":"Jozsa, R.: Quantum Algorithms and the Fourier Transform, Proc. Roy. Soc. Lond. A, 454, (1998) 323\u2013337.","journal-title":"Proc. Roy. Soc. Lond. A"},{"key":"15_CR10","unstructured":"Kitaev, A. Y.: Quantum measurements and the Abelian stabiliser problem. eprint quant-ph\/9511026 (1995)"},{"issue":"2","key":"15_CR11","first-page":"483","volume":"5","author":"H. W. Lenstra Jr.","year":"1992","unstructured":"Lenstra, H. W. Jr., and Pomerance, C.: A Rigorous Time Bound For Factoring Integers, Journal of the AMS, Volume 5, Number 2, (1992) 483\u2013516.","journal-title":"Journal of the AMS"},{"key":"15_CR12","unstructured":"Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography, C.R.C. Press, 1997."},{"key":"15_CR13","unstructured":"Shor, P.: Algorithms for quantum computation: Discrete logarithms and factoring. Proc. 35th Ann. Symp. on Foundations of Comp. Sci. (1994) 124\u2013134"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"Simon, D.: On the Power of Quantum Computation. Proc. 35th Ann. Symp. on Foundations of Comp. Sci. (1994) 116\u2013123","DOI":"10.1109\/SFCS.1994.365701"},{"key":"15_CR15","doi-asserted-by":"publisher","first-page":"3108","DOI":"10.1103\/PhysRevLett.76.3108","volume":"76","author":"Q.A. Turchette","year":"1996","unstructured":"Turchette, Q.A., Hood C.J., Lange W., Mabuchi H., and Kimble H.J.: Measurement of conditional phase shifts for quantum logic. Phys. Rev. Lett., 76, 3108 (1996).","journal-title":"Phys. Rev. Lett."}],"container-title":["Lecture Notes in Computer Science","Quantum Computing and Quantum Communications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-49208-9_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,22]],"date-time":"2019-02-22T00:10:21Z","timestamp":1550794221000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-49208-9_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999]]},"ISBN":["9783540655145","9783540492085"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/3-540-49208-9_15","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[1999]]}}}