{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T05:22:49Z","timestamp":1761110569498},"reference-count":8,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,1,8]]},"DOI":"10.1109\/csp51677.2021.9357505","type":"proceedings-article","created":{"date-parts":[[2021,2,25]],"date-time":"2021-02-25T21:27:22Z","timestamp":1614288442000},"source":"Crossref","is-referenced-by-count":12,"title":["Quantum Algorithms: Overviews, Foundations, and Speedups"],"prefix":"10.1109","author":[{"given":"Shuangbao Paul","family":"Wang","sequence":"first","affiliation":[]},{"given":"Eric","family":"Sakk","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3377644.3377671"},{"key":"ref3","author":"wang","year":"2020","journal-title":"Quantum crypto and algorithms"},{"key":"ref6","author":"nielsen","year":"2000","journal-title":"Quantum Computation and Quantum Information"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-004-3878-2"},{"key":"ref8","first-page":"1","article-title":"Fast versions of shor's quantum factoring algorithm","author":"zalka","year":"1998","journal-title":"Quantum Physics"},{"key":"ref7","first-page":"303","article-title":"Modified neumann architecture with micro-os for security","author":"wang","year":"0","journal-title":"CIICT"},{"key":"ref2","first-page":"1","article-title":"Photonic quantum computing: Shor's algorithm and the road to fault-tolerance","author":"lanyon","year":"0","journal-title":"2008 Conference on Lasers and Electro-Optics and 2008 Conference on Quantum Electronics and Laser Science CLEO"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539795293172"}],"event":{"name":"2021 IEEE 5th International Conference on Cryptography, Security and Privacy (CSP)","location":"Zhuhai, China","start":{"date-parts":[[2021,1,8]]},"end":{"date-parts":[[2021,1,10]]}},"container-title":["2021 IEEE 5th International Conference on Cryptography, Security and Privacy (CSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9357511\/9357565\/09357505.pdf?arnumber=9357505","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T01:38:57Z","timestamp":1636767537000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9357505\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,8]]},"references-count":8,"URL":"https:\/\/doi.org\/10.1109\/csp51677.2021.9357505","relation":{},"subject":[],"published":{"date-parts":[[2021,1,8]]}}}