Quantum Computing: 1st July 2025
Published 1st July 2025
📚 Academic Research
From Worst-Case Hardness of $\mathsf{NP}$ to Quantum Cryptography via Quantum Indistinguishability Obfuscation (arxiv:cs). Explores quantum indistinguishability obfuscation's cryptographic implications, including pseudorandom unitaries and quantum encryption, assuming quantum NP hardness
PhasePoly: An Optimization Framework forPhase Polynomials in Quantum Circuits (arxiv:cs). Phase polynomial optimization framework enhances quantum circuit efficiency, reducing gate counts and optimizing for hardware, vital for quantum algorithms like Shor's and QAOA
Stochastic Quantum Spiking Neural Networks with Quantum Memory and Local Learning (arxiv:cs). Proposes stochastic quantum spiking neurons with quantum memory for efficient event-driven learning, merging neuromorphic computing and quantum capabilities for scalable networks
Adversarial Threats in Quantum Machine Learning: A Survey of Attacks and Defenses (arxiv:cs). Quantum Machine Learning faces unique adversarial threats; model stealing, data poisoning, backdoor attacks, and defenses utilizing quantum properties are critical areas of concern
Unifying communication paradigms in delegated quantum computing (arxiv:cs). Delegated quantum computing framework integrates prepare-and-send and receive-and-measure settings, exploring cryptographic implications and enabling dual protocol implementation
Iterative Quantum Feature Maps (arxiv:cs). Iterative Quantum Feature Maps improve quantum machine learning by combining shallow QFMs with classical weights, enhancing performance in noisy data environments
Practical insights on the effect of different encodings, ansätze and measurements in quantum and hybrid convolutional neural networks (arxiv:cs). Analysis of data encoding, variational ansatze, and measurement in PQCs for satellite image classification using EuroSAT dataset in quantum and hybrid CNNs
Quantum Framework for Simulating Linear PDEs with Robin Boundary Conditions (arxiv:math). Quantum framework for simulating linear PDEs with Robin boundary conditions, leveraging Schrodingerisation, efficient block-encoding, and polynomial complexity scaling
Quantum-Resistant Domain Name System: A Comprehensive System-Level Study (arxiv:cs). Post-Quantum DNS security study covering DNSSEC, DoT, DoH; implementing OQS libraries, evaluating lattice/hash primitives, and addressing potential vulnerabilities
GuiderNet: A Meta-Learning Framework for Optimizing Quantum Circuit Geometry and Mitigating Barren Plateaus (arxiv:cs). GuiderNet meta-learns PQC parameter optimization, reducing barren plateaus and enhancing quantum machine learning performance with improved accuracy and reduced training loss
🔐 Quantum Computing & Cryptography
Raymond Laflamme (1960-2025) (scottaaronson.blog). Tribute to Raymond Laflamme, pioneer in quantum computing and information, highlighting his groundbreaking contributions and the impact on the scientific community
20. "Harvest Now, Decrypt Later" isn't Real (infosec.press). Critique of 'Harvest Now, Decrypt Later' theory, emphasizing risks of quantum computing vs. real-world cryptographic threats and security priorities
New Hybrid Quantum–Classical Computing Approach Used to Study Chemical Systems (caltech.edu). Hybrid quantum-classical computing approach leverages IBM's quantum device and RIKEN supercomputer to solve complex quantum chemistry problems related to electron movements
Post-Quantum Cryptography Implementation Enterprise-Readiness Analysis (darknet.org.uk). Enterprises adopt post-quantum cryptography with hybrid TLS, OpenSSL 3.5, and the Kyber algorithm, addressing quantum risks and integrating regulatory standards
UK Ambassador to the US visits Cambridge to discuss opportunities for deepening UK-US tech collaboration (cam.ac.uk). UK Ambassador Lord Mandelson visits Cambridge to strengthen US-UK tech partnerships in quantum, life sciences, and AI innovation
Common Circom Pitfalls and How to Dodge Them — Part 1 (blog.zksecurity.xyz). Explore common Circom pitfalls, including assertion misuse, hints, and aliasing issues that can jeopardize circuit integrity and security
💻 Computational Performance & Programming
Calculus Phobic’s Introduction to Differentiable Programming (andersource.dev). Introduction to differentiable programming using JAX, focusing on optimization techniques, gradient descent, and automatic differentiation principles for solving computational problems
Trying out the ice4pi from Lightside Instruments (mikecoats.com). Hands-on with Lightside Instruments' ice4pi, programming Raspberry Pi with FPGA, setup guidance, GPIO control, and R-2R DAC applications
Thread Value Layouts in CuTe (veitner.bearblog.dev). Explore Thread Value Layouts in CuTeDSL kernels for optimized memory management and indexing techniques using visual aids and practical examples
Pipelining AI/ML Training Workloads with CUDA Streams (towardsdatascience.com). Explore CUDA streams for pipelining AI/ML training workloads, enhancing performance in PyTorch models through concurrent GPU operations and data augmentation techniques
Accelerating Cloud Cryptography: Optimizing AWS-LC with Intel’s AVX-512 (infosecwriteups.com). Optimizing AWS-LC with Intel's AVX-512 enhances cryptography performance, improving AES-GCM and AES-XTS encryption for efficient cloud data security
🧮 Theoretical Physics & Mathematics
Super-Fun! (asymptotia.com). Clifford details advancements in Supersymmetric Virasoro Minimal Strings, connecting random matrix models, SCFT, and potential 3D chiral supergravity dualities
Why do quasicrystals exist? (rootprivileges.net). Exploration of quasicrystals and their formation through enthalpy and entropy stabilization, utilizing density functional theory and innovative computational methods
Nobel laureate conversation: Prof. J. Michael Kosterlitz (elight.springeropen.com). Prof. J. Michael Kosterlitz discusses the Kosterlitz-Thouless transition, the use of topology in physics, and the importance of pursuing passion in research
Thermodynamics and emergence (condensedconcepts.blogspot.com). Exploration of temperature and entropy as emergent properties in thermodynamics, discussing perspectives from Kadanoff, Primas, Deutsch, Lieb, Yngvason, and Weinberg
New Proof Dramatically Compresses Space Needed for Computation (cosmicmeta.io). Ryan Williams' proof revolutionizes algorithm memory efficiency, compressing space needed for computation and redefining the time-space trade-off in computer science
👋 Before you go
I've got a big favor to ask - keeping Blaze running isn't expensive, but it does all add up, so I'm asking readers like you to help, if you can.
That's why I'm launching a Patreon page!. Nothing flashy, just a way for folks who find value in these newsletters to chip in a little each month. In return, you'll get:
- Real say in how Blaze evolves — vote on new topics, features, topic curation ideas
- First dibs on merch (details still cooking)
- That warm fuzzy feeling knowing you're supporting something that saves you time and keeps you plugged into great tech writing
If you are getting value from blaze, checking this out would mean the world. And if you can't contribute, no worries—the newsletters keep coming either way, and you can follow along on patreon for free.
Thanks for reading and being part of this nerdy corner of the internet. All the best - Alastair.
You may also like
About Quantum Computing
Our Quantum Computing newsletter covers the latest developments, research papers, and insights in quantum computing technologies. Each week, we curate the most important content so you don't have to spend hours searching.
Whether you're a quantum researcher, developer, or enthusiast, our newsletter provides valuable information to keep you informed and ahead of the curve in this rapidly evolving field.
Subscribe now to join thousands of professionals who receive our weekly updates!