{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,14]],"date-time":"2025-06-14T04:08:09Z","timestamp":1749874089959,"version":"3.41.0"},"publisher-location":"Singapore","reference-count":16,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819655656","type":"print"},{"value":"9789819655663","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-5566-3_8","type":"book-chapter","created":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T20:22:50Z","timestamp":1749846170000},"page":"138-154","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Experimental Analysis of\u00a0the\u00a0Optimization-Based Factorization Algorithm"],"prefix":"10.1007","author":[{"given":"Junpei","family":"Yamaguchi","sequence":"first","affiliation":[]},{"given":"Tetsuya","family":"Izu","sequence":"additional","affiliation":[]},{"given":"Noboru","family":"Kunihiro","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,14]]},"reference":[{"key":"8_CR1","unstructured":"Atom computing: Quantum computer with 1180\u2013qubits. https:\/\/atom-computing.com\/quantum-startup-atom-computing-first-to-exceed-1000-qubits\/"},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Babai, L.: On lov\u00e1sz\u2019lattice reduction and the nearest lattice point problem: shortened version. In: STACS 85: 2nd Annual Symposium on Theoretical Aspects of Computer Science Saarbr\u00fccken, 3\u20135 January 1985, pp. 13\u201320. Springer (1985)","DOI":"10.1007\/BFb0023990"},{"key":"8_CR3","unstructured":"Farhi, E., Goldstone, J., Gutmann, S.: A quantum approximate optimization algorithm. arXiv preprint arXiv:1411.4028 (2014)"},{"key":"8_CR4","unstructured":"Fujitsu: Digital annealer. https:\/\/www.fujitsu.com\/global\/services\/business-services\/digital-annealer\/"},{"key":"8_CR5","doi-asserted-by":"publisher","first-page":"433","DOI":"10.22331\/q-2021-04-15-433","volume":"5","author":"C Gidney","year":"2021","unstructured":"Gidney, C., Eker\u00e5, M.: How to factor 2048 bit RSA integers in 8 hours using 20 million noisy qubits. Quantum 5, 433 (2021)","journal-title":"Quantum"},{"issue":"14","key":"8_CR6","doi-asserted-by":"publisher","first-page":"140503","DOI":"10.1103\/PhysRevLett.127.140503","volume":"127","author":"\u00c9 Gouzien","year":"2021","unstructured":"Gouzien, \u00c9., Sangouard, N.: Factoring 2048-bit RSA integers in 177 days with 13 436 qubits and a multimode memory. Phys. Rev. Lett. 127(14), 140503 (2021)","journal-title":"Phys. Rev. Lett."},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Grebnev, S., et al.: Pitfalls of the sublinear QAOA-based factorization algorithm. arXiv preprint arXiv:2303.04656 (2023)","DOI":"10.1109\/ACCESS.2023.3336989"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Hegade, N.N., Solano, E.: Digitized-counterdiabatic quantum factorization. arXiv preprint arXiv:2301.11005 (2023)","DOI":"10.1103\/PhysRevResearch.4.L042030"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Lenstra, A.K., Lenstra, H.W., Lov\u00e1sz, L.: Factoring polynomials with rational coefficients. Math. Annalen 261(ARTICLE), 515\u2013534 (1982)","DOI":"10.1007\/BF01457454"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Schnorr, C.P.: Factoring integers by CVP algorithms. In: Number Theory and Cryptography: Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday, pp. 73\u201393 (2013)","DOI":"10.1007\/978-3-642-42001-6_6"},{"key":"8_CR11","unstructured":"Schnorr, C.P.: Fast factoring integers by SVP algorithms, corrected. Cryptology ePrint Archive (2021)"},{"issue":"1\u20133","key":"8_CR12","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/BF01581144","volume":"66","author":"CP Schnorr","year":"1994","unstructured":"Schnorr, C.P., Euchner, M.: Lattice basis reduction: improved practical algorithms and solving subset sum problems. Math. Program. 66(1\u20133), 181\u2013199 (1994)","journal-title":"Math. Program."},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: Proceedings 35th Annual Symposium on Foundations of Computer Science, pp. 124\u2013134. IEEE (1994)","DOI":"10.1109\/SFCS.1994.365700"},{"issue":"2","key":"8_CR14","first-page":"184","volume":"6","author":"Y Takahashi","year":"2006","unstructured":"Takahashi, Y., Kunihiro, N.: A quantum circuit for Shor\u2019s factoring algorithm using 2n+ 2 qubits. Quantum Inf. Comput. 6(2), 184\u2013192 (2006)","journal-title":"Quantum Inf. Comput."},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"Yamaguchi, J., Yamazaki, M., Tabuchi, A., Honda, T., Izu, T., Kunihiro, N.: Experiments and resource analysis of Shor\u2019s factorization using a quantum simulator. In: Proceedings of the 26th International Conference on Information Security and Cryptology (ICISC 2023), pp. 119\u2013139 (2023)","DOI":"10.1007\/978-981-97-1235-9_7"},{"key":"8_CR16","unstructured":"Yan, B., et\u00a0al.: Factoring integers with sublinear resources on a superconducting quantum processor. arXiv preprint arXiv:2212.12372 (2022)"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology \u2013 ICISC 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-5566-3_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T20:22:53Z","timestamp":1749846173000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-5566-3_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819655656","9789819655663"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-5566-3_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"14 June 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICISC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security and Cryptology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Seoul","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 November 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icisc2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icisc.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}