{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T22:57:28Z","timestamp":1774393048510,"version":"3.50.1"},"reference-count":60,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T00:00:00Z","timestamp":1771200000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T00:00:00Z","timestamp":1771200000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"DOI":"10.1007\/s11128-026-05089-1","type":"journal-article","created":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T07:11:30Z","timestamp":1771225890000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A novel hybrid quantum-classical proof-of-work protocol for Blockchain mining"],"prefix":"10.1007","volume":"25","author":[{"given":"Najla","family":"Alharbi","sequence":"first","affiliation":[]},{"given":"Tarek","family":"Moulahi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,16]]},"reference":[{"key":"5089_CR1","doi-asserted-by":"publisher","first-page":"23","DOI":"10.5923\/j.computer.20180802.02","volume":"8","author":"SS Sarmah","year":"2018","unstructured":"Sarmah, S.S.: Understanding Blockchain technology. Comput. Sci. Eng. 8, 23\u201329 (2018). https:\/\/doi.org\/10.5923\/j.computer.20180802.02","journal-title":"Comput. Sci. Eng."},{"key":"5089_CR2","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/MNET.011.1900374","volume":"34","author":"J Yang","year":"2020","unstructured":"Yang, J., Wen, J., Jiang, B., Wang, H.: Blockchain-based sharing and tamper-proof framework of big data networking. IEEE Netw. 34, 62\u201367 (2020). https:\/\/doi.org\/10.1109\/MNET.011.1900374","journal-title":"IEEE Netw."},{"key":"5089_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.tre.2020.102067","volume":"142","author":"P Dutta","year":"2020","unstructured":"Dutta, P., Hoi, T.M., Somani, S., Butala, R.: Blockchain technology in supply chain operations: applications, challenges and research opportunities. Transp. Res. Part E Logistics Transp. Rev. 142, 102067 (2020). https:\/\/doi.org\/10.1016\/j.tre.2020.102067","journal-title":"Transp. Res. Part E Logistics Transp. Rev."},{"key":"5089_CR4","unstructured":"Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System, 2008. Available: https:\/\/bitcoin.org\/bitcoin.pdf"},{"key":"5089_CR5","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1214\/11-STS378","volume":"27","author":"Y Wang","year":"2012","unstructured":"Wang, Y.: Quantum computation and quantum information. Stat. Sci. 27, 373\u2013394 (2012). https:\/\/doi.org\/10.1214\/11-STS378","journal-title":"Stat. Sci."},{"key":"5089_CR6","doi-asserted-by":"publisher","unstructured":"Aggarwal, D., Brennen, G.K., Lee, T., Santha, M., Tomamichel, M.: Quantum attacks on Bitcoin, and how to protect against them, Ledger, (2018). https:\/\/doi.org\/10.5195\/ledger.2018.127","DOI":"10.5195\/ledger.2018.127"},{"key":"5089_CR7","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.IR.8105","author":"L Chen","year":"2016","unstructured":"Chen, L., Jordan, S., Liu, Y.-K., Moody, D., Peralta, R., Perlner, R., Smith-Tone, D.: Report on post-quantum cryptography. Nat. Inst. Standards Technol. (NIST) (2016). https:\/\/doi.org\/10.6028\/NIST.IR.8105","journal-title":"Nat. Inst. Standards Technol. (NIST)"},{"key":"5089_CR8","doi-asserted-by":"publisher","DOI":"10.1140\/epjqt\/s40507-021-00091-1","author":"F Bova","year":"2021","unstructured":"Bova, F., Goldfarb, A., Melko, R.G.: Commercial applications of quantum computing. EPJ Quantum Technol. (2021). https:\/\/doi.org\/10.1140\/epjqt\/s40507-021-00091-1","journal-title":"EPJ Quantum Technol."},{"key":"5089_CR9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2962155","author":"OH Montiel Ross","year":"2020","unstructured":"Montiel Ross, O.H.: A review of quantum-inspired metaheuristics: going from classical computers to real quantum computers. IEEE Access (2020). https:\/\/doi.org\/10.1109\/ACCESS.2019.2962155","journal-title":"IEEE Access"},{"key":"5089_CR10","doi-asserted-by":"publisher","unstructured":"Dev, J.A.: Bitcoin mining acceleration and performance quantification. In: Canadian Conference on Electrical and Computer Engineering (CCECE) (2014). https:\/\/doi.org\/10.1109\/CCECE.2014.6900989","DOI":"10.1109\/CCECE.2014.6900989"},{"key":"5089_CR11","doi-asserted-by":"publisher","unstructured":"Kuznetsov, A., Shekhanin, K., Kolhatin, A., Kovalchuk, D., Babenko, V., Perevozova, I.: Performance of Hash Algorithms on GPUs for Use in Blockchain, In: 2019 IEEE International Conference on Advanced Trends in Information Theory (ATIT), (2019). https:\/\/doi.org\/10.1109\/ATIT49449.2019.9030442","DOI":"10.1109\/ATIT49449.2019.9030442"},{"key":"5089_CR12","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-012-0037-z","author":"S Gueron","year":"2012","unstructured":"Gueron, S., Krasnov, V.: Parallelizing message schedules to accelerate the computations of hash functions. J. Cryptogr. Eng. (2012). https:\/\/doi.org\/10.1007\/s13389-012-0037-z","journal-title":"J. Cryptogr. Eng."},{"key":"5089_CR13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44893-9_12","author":"NT Courtois","year":"2014","unstructured":"Courtois, N.T., Grajek, M., Naik, R.: Optimizing SHA256 in bitcoin mining. Commun. Comput. Inf. Sci. (2014). https:\/\/doi.org\/10.1007\/978-3-662-44893-9_12","journal-title":"Commun. Comput. Inf. Sci."},{"key":"5089_CR14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38980-1_8","author":"JP Aumasson","year":"2013","unstructured":"Aumasson, J.P., Neves, S., Wilcox-O\u2019Hearn, Z., Winnerlein, C.: BLAKE2: Simpler, smaller, fast as MD5. Lect. Notes Comput. Sci. (2013). https:\/\/doi.org\/10.1007\/978-3-642-38980-1_8","journal-title":"Lect. Notes Comput. Sci."},{"key":"5089_CR15","unstructured":"Shalaginov, M.Y., Dubrovsky, M.: Quantum Proof of Work with Parametrized Quantum Circuits, (2022) Preprint at http:\/\/arxiv.org\/abs\/2204.10643"},{"key":"5089_CR16","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1049\/ise2.12074","volume":"17","author":"J Lee","year":"2023","unstructured":"Lee, J., Lee, S., Lee, Y., Choi, D.: T-depth reduction method for efficient SHA-256 quantum circuit construction. IET Inf. Secur. 17, 46\u201365 (2023). https:\/\/doi.org\/10.1049\/ise2.12074","journal-title":"IET Inf. Secur."},{"key":"5089_CR17","doi-asserted-by":"publisher","unstructured":"Chen, F., Liu, Z., Long, Y., Liu, Z., Ding, N.: Secure scheme against compromised hash in proof-of-work Blockchain, In: Lecture Notes in Computer Science, (2018), pp.\u00a01\u201315. https:\/\/doi.org\/10.1007\/978-3-030-02744-5_1","DOI":"10.1007\/978-3-030-02744-5_1"},{"key":"5089_CR18","doi-asserted-by":"publisher","first-page":"323","DOI":"10.3390\/e24030323","volume":"24","author":"R Benkoczi","year":"2022","unstructured":"Benkoczi, R., Gaur, D., Nagy, N., Nagy, M., Hossain, S.: Quantum Bitcoin mining. Entropy 24, 323 (2022). https:\/\/doi.org\/10.3390\/e24030323","journal-title":"Entropy"},{"key":"5089_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.bcra.2023.100141","author":"RR Nerem","year":"2023","unstructured":"Nerem, R.R., Gaur, D.R.: Conditions for advantageous quantum Bitcoin mining. Blockchain Res. Appl. (2023). https:\/\/doi.org\/10.1016\/j.bcra.2023.100141","journal-title":"Blockchain Res. Appl."},{"key":"5089_CR20","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/s10207-020-00493-9","volume":"19","author":"O Sattath","year":"2020","unstructured":"Sattath, O.: On the insecurity of quantum Bitcoin mining. Int. J. Inf. Secur. 19, 291\u2013302 (2020). https:\/\/doi.org\/10.1007\/s10207-020-00493-9","journal-title":"Int. J. Inf. Secur."},{"key":"5089_CR21","doi-asserted-by":"publisher","DOI":"10.1088\/2058-9565\/aabc6b","author":"EO Kiktenko","year":"2018","unstructured":"Kiktenko, E.O., Pozhar, N.O., Anufriev, M.N., Trushechkin, A.S., Yunusov, R.R., Kurochkin, Y.V., Lvovsky, A.I., Fedorov, A.K.: Quantum-secured Blockchain. Quantum Sci. Technol. (2018). https:\/\/doi.org\/10.1088\/2058-9565\/aabc6b","journal-title":"Quantum Sci. Technol."},{"key":"5089_CR22","doi-asserted-by":"publisher","DOI":"10.3390\/quantum1010002","author":"D Rajan","year":"2019","unstructured":"Rajan, D., Visser, M.: Quantum Blockchain using entanglement in time. Quantum Rep. (2019). https:\/\/doi.org\/10.3390\/quantum1010002","journal-title":"Quantum Rep."},{"key":"5089_CR23","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3203316","author":"Q Li","year":"2022","unstructured":"Li, Q., Wu, J., Quan, J., Shi, J., Zhang, S.: Efficient Quantum Blockchain With a consensus mechanism QDPoS. IEEE Trans. Inf. Forensics Secur. (2022). https:\/\/doi.org\/10.1109\/TIFS.2022.3203316","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"5089_CR24","doi-asserted-by":"publisher","DOI":"10.1109\/TQE.2022.3207111","author":"Z Yang","year":"2022","unstructured":"Yang, Z., Salman, T., Jain, R., Di Pietro, R.: Decentralization using quantum Blockchain: a theoretical analysis. IEEE Trans. Quantum Eng. (2022). https:\/\/doi.org\/10.1109\/TQE.2022.3207111","journal-title":"IEEE Trans. Quantum Eng."},{"key":"5089_CR25","doi-asserted-by":"publisher","DOI":"10.1002\/qute.201900070","author":"S Sim","year":"2019","unstructured":"Sim, S., Johnson, P.D., Aspuru-Guzik, A.: Expressibility and entangling capability of parameterized quantum circuits for hybrid quantum-classical algorithms. Adv. Quantum Technol. (2019). https:\/\/doi.org\/10.1002\/qute.201900070","journal-title":"Adv. Quantum Technol."},{"key":"5089_CR26","doi-asserted-by":"crossref","unstructured":"H\u00e4ner, T., Roetteler, M., Svore, K. M.: Factoring using 2n + 2 qubits with Toffoli based modular multiplication. Quantum Inf. Comput. (2017). https:\/\/doi.org\/10.26421\/qic17.7-8-7","DOI":"10.26421\/QIC17.7-8-7"},{"key":"5089_CR27","doi-asserted-by":"publisher","unstructured":"Amy, M., Di Matteo, O., Gheorghiu, V., Mosca, M., Parent, A., Schanck, J.: Estimating the Cost of Generic Quantum Pre-image Attacks on SHA-2 and SHA-3. In: Lecture Notes in Computer Science, (2017) https:\/\/doi.org\/10.1007\/978-3-319-69453-5_18","DOI":"10.1007\/978-3-319-69453-5_18"},{"key":"5089_CR28","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-018-2107-3","author":"P Kim","year":"2018","unstructured":"Kim, P., Han, D., Jeong, K.C.: Time-space complexity of quantum search algorithms in symmetric cryptanalysis: applying to AES and SHA-2. Quantum Inf. Process. (2018). https:\/\/doi.org\/10.1007\/s11128-018-2107-3","journal-title":"Quantum Inf. Process."},{"key":"5089_CR29","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2020.100254","author":"R Martino","year":"2020","unstructured":"Martino, R., Cilardo, A.: Designing a SHA-256 processor for Blockchain-based IoT applications. Internet of Things (2020). https:\/\/doi.org\/10.1016\/j.iot.2020.100254","journal-title":"Internet of Things"},{"key":"5089_CR30","doi-asserted-by":"publisher","DOI":"10.1016\/j.tbench.2022.100073","author":"M Javaid","year":"2022","unstructured":"Javaid, M., Haleem, A., Singh, R.P., Suman, R., Khan, S.: A review of Blockchain technology applications for financial services. BenchCouncil Trans. Benchmarks, Standards Eval. (2022). https:\/\/doi.org\/10.1016\/j.tbench.2022.100073","journal-title":"BenchCouncil Trans. Benchmarks, Standards Eval."},{"key":"5089_CR31","doi-asserted-by":"crossref","unstructured":"Darwish, T. et al.: A comparative analysis of blockchain consensus algorithms from shariah perspective, J. Contemporary Islamic Studi. (2020). https:\/\/doi.org\/10.24191\/jcis.v6i1.1","DOI":"10.24191\/jcis.v6i1.1"},{"key":"5089_CR32","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1109\/MPOT.2022.3208395","volume":"41","author":"R Ramadoss","year":"2022","unstructured":"Ramadoss, R.: Blockchain technology: an overview. IEEE Potentials 41, 6\u201312 (2022). https:\/\/doi.org\/10.1109\/MPOT.2022.3208395","journal-title":"IEEE Potentials"},{"key":"5089_CR33","doi-asserted-by":"publisher","DOI":"10.1016\/j.accinf.2022.100598","author":"H Han","year":"2023","unstructured":"Han, H., Shiwakoti, R.K., Jarvis, R., Mordi, C., Botchie, D.: Accounting and auditing with Blockchain technology and artificial Intelligence: a literature review. Int. J. Account. Inf. Syst. (2023). https:\/\/doi.org\/10.1016\/j.accinf.2022.100598","journal-title":"Int. J. Account. Inf. Syst."},{"key":"5089_CR34","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2022.122155","volume":"187","author":"F Dal Mas","year":"2023","unstructured":"Dal Mas, F., Massaro, M., Ndou, V., Raguseo, E.: Blockchain technologies for sustainability in the agrifood sector: a literature review of academic research and business perspectives. Technol. Forecast. Soc. Chang. 187, 122155 (2023). https:\/\/doi.org\/10.1016\/j.techfore.2022.122155","journal-title":"Technol. Forecast. Soc. Chang."},{"key":"5089_CR35","doi-asserted-by":"publisher","DOI":"10.3390\/joitmc6040197","author":"A Mikhaylov","year":"2020","unstructured":"Mikhaylov, A.: Cryptocurrency market analysis from the open innovation perspective. Journal of Open Innovation Technology Market and Complexity (2020). https:\/\/doi.org\/10.3390\/joitmc6040197","journal-title":"Journal of Open Innovation Technology Market and Complexity"},{"key":"5089_CR36","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3004273","author":"E Zaghloul","year":"2020","unstructured":"Zaghloul, E., Li, T., Mutka, M.W., Ren, J.: Bitcoin and Blockchain: security and Privacy. IEEE Internet Things J. (2020). https:\/\/doi.org\/10.1109\/JIOT.2020.3004273","journal-title":"IEEE Internet Things J."},{"key":"5089_CR37","doi-asserted-by":"publisher","DOI":"10.3390\/su14148708","author":"M Shuaib","year":"2022","unstructured":"Shuaib, M., et al.: A novel optimization for GPU mining using overclocking and undervolting. Sustainability (2022). https:\/\/doi.org\/10.3390\/su14148708","journal-title":"Sustainability"},{"key":"5089_CR38","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2021.103035","author":"MS Ferdous","year":"2021","unstructured":"Ferdous, M.S., Chowdhury, M.J.M., Hoque, M.A.: A survey of consensus algorithms in public Blockchain systems for crypto-currencies. J. Netw. Comput. Appl. (2021). https:\/\/doi.org\/10.1016\/j.jnca.2021.103035","journal-title":"J. Netw. Comput. Appl."},{"key":"5089_CR39","doi-asserted-by":"publisher","DOI":"10.1002\/joom.1202","author":"G Shang","year":"2023","unstructured":"Shang, G., Ilk, N., Fan, S.: Need for speed, but how much does it cost? Unpacking the fee-speed relationship in Bitcoin transactions. J. Oper. Manag. (2023). https:\/\/doi.org\/10.1002\/joom.1202","journal-title":"J. Oper. Manag."},{"key":"5089_CR40","doi-asserted-by":"publisher","DOI":"10.1109\/MRA.2022.3165745","author":"O Gurcan","year":"2022","unstructured":"Gurcan, O.: Proof of work is a stigmergic consensus algorithm: unlocking its potential. IEEE Robot. Autom. Magazine (2022). https:\/\/doi.org\/10.1109\/MRA.2022.3165745","journal-title":"IEEE Robot. Autom. Magazine"},{"key":"5089_CR41","doi-asserted-by":"publisher","unstructured":"Kaushal, P.K., Bagga, A., Sobti, R.: Evolution of bitcoin and security risk in bitcoin wallets. In: 2017 International Conference on Computer, Communications and Electronics (COMPTELIX), (2017). https:\/\/doi.org\/10.1109\/COMPTELIX.2017.8003959","DOI":"10.1109\/COMPTELIX.2017.8003959"},{"key":"5089_CR42","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-6534-5_4","author":"V Dhillon","year":"2021","unstructured":"Dhillon, V., Metcalf, D., Hooper, M.: Unpacking Ethereum, in Blockchain Enabled Applications. Springer (2021). https:\/\/doi.org\/10.1007\/978-1-4842-6534-5_4","journal-title":"Springer"},{"key":"5089_CR43","doi-asserted-by":"publisher","unstructured":"Tikhomirov, S.: Ethereum: state of knowledge and research perspectives. In: Lecture Notes in Computer Science, (2018). https:\/\/doi.org\/10.1007\/978-3-319-75650-9_14","DOI":"10.1007\/978-3-319-75650-9_14"},{"key":"5089_CR44","doi-asserted-by":"publisher","unstructured":"Kim, S.K., Mason, J., Ma, Z., Miller, A., Murali, S., Bailey, M.: Measuring Ethereum network peers. In: Proceedings of the ACM SIGCOMM Internet Measurement Conference (IMC), (2018). https:\/\/doi.org\/10.1145\/3278532.3278542","DOI":"10.1145\/3278532.3278542"},{"key":"5089_CR45","doi-asserted-by":"crossref","unstructured":"Lin, S.: Proof of Work vs. Proof of Stake in Cryptocurrency. Highlights Sci. Eng. Technol. (2023). https:\/\/doi.org\/10.54097\/hset.v39i.6683","DOI":"10.54097\/hset.v39i.6683"},{"key":"5089_CR46","doi-asserted-by":"publisher","unstructured":"Liu, J.: Digital signature and hash algorithms used in Bitcoin and Ethereum. In: Third International Conference on Machine Learning and Computer Application (ICMLCA 2022), (2023) SPIE. https:\/\/doi.org\/10.1117\/12.2675431","DOI":"10.1117\/12.2675431"},{"key":"5089_CR47","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2020.102471","author":"G Estevam","year":"2021","unstructured":"Estevam, G., Palma, L.M., Silva, L.R., Martina, J.E., Vigil, M.: Accurate and decentralized timestamping using smart contracts on the Ethereum Blockchain. Inf. Process. Manag. (2021). https:\/\/doi.org\/10.1016\/j.ipm.2020.102471","journal-title":"Inf. Process. Manag."},{"key":"5089_CR48","unstructured":"Grassi, L., Khovratovich, D., Rechberger, C., Roy, A., Schofnegger, M.: POSEIDON: a new hash function for zero-knowledge proof systems. In: Proceedings of the 30th USENIX Security Symposium, (2021)"},{"key":"5089_CR49","doi-asserted-by":"publisher","unstructured":"Liu, Y., Pass, R.: On One-Way Functions from NP-Complete Problems. In: Leibniz International Proceedings in Informatics (LIPIcs), (2022). https:\/\/doi.org\/10.4230\/LIPIcs.CCC.2022.36","DOI":"10.4230\/LIPIcs.CCC.2022.36"},{"key":"5089_CR50","doi-asserted-by":"publisher","unstructured":"Rankhambe, B.P., Khanuja, H.K.: A comparative analysis of Blockchain platforms\u2014Bitcoin and Ethereum. In: 2019 5th International Conference on Computing, Communication Control and Automation (ICCUBEA), (2019). https:\/\/doi.org\/10.1109\/ICCUBEA47591.2019.9129332","DOI":"10.1109\/ICCUBEA47591.2019.9129332"},{"key":"5089_CR51","doi-asserted-by":"crossref","unstructured":"Grumbling E., Horowitz, M.: Quantum Computing: Progress and Prospects. National Academies Press, (2018)","DOI":"10.17226\/25196"},{"key":"5089_CR52","doi-asserted-by":"publisher","first-page":"11847","DOI":"10.1073\/pnas.191373698","volume":"98","author":"S-S Li","year":"2001","unstructured":"Li, S.-S., Long, G.-L., Bai, F.-S., Feng, S.-L., Zheng, H.-Z.: Quantum computing. Proc. Natl. Acad. Sci. 98, 11847\u201311848 (2001). https:\/\/doi.org\/10.1073\/pnas.191373698","journal-title":"Proc. Natl. Acad. Sci."},{"key":"5089_CR53","doi-asserted-by":"publisher","unstructured":"Chailloux, A., Naya-Plasencia, M., Schrottenloher, A.: An efficient quantum collision search algorithm and implications on symmetric cryptography. In: Lecture Notes in Computer Science, (2017). https:\/\/doi.org\/10.1007\/978-3-319-70697-9_8","DOI":"10.1007\/978-3-319-70697-9_8"},{"key":"5089_CR54","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/11860.001.0001","volume-title":"Quantum Computing for Everyone","author":"C Bernhardt","year":"2019","unstructured":"Bernhardt, C.: Quantum Computing for Everyone. The MIT Press (2019)"},{"key":"5089_CR55","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevApplied.20.014024","author":"P Chandarana","year":"2023","unstructured":"Chandarana, P., Hegade, N.N., Montalban, I., Solano, E., Chen, X.: Digitized counterdiabatic quantum algorithm for protein folding. Phys. Rev. Appl. (2023). https:\/\/doi.org\/10.1103\/PhysRevApplied.20.014024","journal-title":"Phys. Rev. Appl."},{"key":"5089_CR56","doi-asserted-by":"publisher","DOI":"10.1103\/PRXQuantum.2.040309","author":"T Haug","year":"2021","unstructured":"Haug, T., Bharti, K., Kim, M.S.: Capacity and quantum geometry of parametrized quantum circuits. PRX Quantum (2021). https:\/\/doi.org\/10.1103\/PRXQuantum.2.040309","journal-title":"PRX Quantum"},{"key":"5089_CR57","doi-asserted-by":"publisher","first-page":"944","DOI":"10.1021\/acs.jctc.9b00963","volume":"16","author":"Y Matsuzawa","year":"2020","unstructured":"Matsuzawa, Y., Kurashige, Y.: Jastrow-type decomposition in quantum chemistry for low-depth quantum circuits. J. Chem. Theory Comput. 16, 944\u2013952 (2020). https:\/\/doi.org\/10.1021\/acs.jctc.9b00963","journal-title":"J. Chem. Theory Comput."},{"key":"5089_CR58","doi-asserted-by":"publisher","DOI":"10.1088\/1361-6633\/ab0c6b","author":"N Korolkova","year":"2019","unstructured":"Korolkova, N., Leuchs, G.: Quantum correlations in separable multi-mode states and in classically entangled light. Rep. Prog. Phys. (2019). https:\/\/doi.org\/10.1088\/1361-6633\/ab0c6b","journal-title":"Rep. Prog. Phys."},{"key":"5089_CR59","doi-asserted-by":"publisher","DOI":"10.3366\/drt.2010.0206","author":"K Barad","year":"2010","unstructured":"Barad, K.: Quantum entanglements and hauntological relations of inheritance: dis\/continuities, spacetime enfoldings, and justice-to-come. Derrida Today (2010). https:\/\/doi.org\/10.3366\/drt.2010.0206","journal-title":"Derrida Today"},{"key":"5089_CR60","doi-asserted-by":"publisher","DOI":"10.1088\/1751-8113\/42\/50\/504002","author":"JI Latorre","year":"2009","unstructured":"Latorre, J.I., Riera, A.: A short review on entanglement in quantum spin systems. J. Phys. A: Math. Theor. (2009). https:\/\/doi.org\/10.1088\/1751-8113\/42\/50\/504002","journal-title":"J. Phys. A: Math. Theor."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-026-05089-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11128-026-05089-1","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-026-05089-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T22:01:29Z","timestamp":1774389689000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11128-026-05089-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,16]]},"references-count":60,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2026,3]]}},"alternative-id":["5089"],"URL":"https:\/\/doi.org\/10.1007\/s11128-026-05089-1","relation":{},"ISSN":["1573-1332"],"issn-type":[{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,16]]},"assertion":[{"value":"14 September 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 January 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 February 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"73"}}