⚛️

Quantum Computing: 1st July 2025

Newsletters sent once a week, unsubscribe anytime.

Published 1st July 2025

📚 Academic Research

From Worst-Case Hardness of $\mathsf{NP}$ to Quantum Cryptography via Quantum Indistinguishability Obfuscation (arxiv:cs). Explores quantum indistinguishability obfuscation's cryptographic implications, including pseudorandom unitaries and quantum encryption, assuming quantum NP hardness

PhasePoly: An Optimization Framework forPhase Polynomials in Quantum Circuits (arxiv:cs). Phase polynomial optimization framework enhances quantum circuit efficiency, reducing gate counts and optimizing for hardware, vital for quantum algorithms like Shor's and QAOA

Stochastic Quantum Spiking Neural Networks with Quantum Memory and Local Learning (arxiv:cs). Proposes stochastic quantum spiking neurons with quantum memory for efficient event-driven learning, merging neuromorphic computing and quantum capabilities for scalable networks

Adversarial Threats in Quantum Machine Learning: A Survey of Attacks and Defenses (arxiv:cs). Quantum Machine Learning faces unique adversarial threats; model stealing, data poisoning, backdoor attacks, and defenses utilizing quantum properties are critical areas of concern

Unifying communication paradigms in delegated quantum computing (arxiv:cs). Delegated quantum computing framework integrates prepare-and-send and receive-and-measure settings, exploring cryptographic implications and enabling dual protocol implementation

Iterative Quantum Feature Maps (arxiv:cs). Iterative Quantum Feature Maps improve quantum machine learning by combining shallow QFMs with classical weights, enhancing performance in noisy data environments

Practical insights on the effect of different encodings, ansätze and measurements in quantum and hybrid convolutional neural networks (arxiv:cs). Analysis of data encoding, variational ansatze, and measurement in PQCs for satellite image classification using EuroSAT dataset in quantum and hybrid CNNs

Quantum Framework for Simulating Linear PDEs with Robin Boundary Conditions (arxiv:math). Quantum framework for simulating linear PDEs with Robin boundary conditions, leveraging Schrodingerisation, efficient block-encoding, and polynomial complexity scaling

Quantum-Resistant Domain Name System: A Comprehensive System-Level Study (arxiv:cs). Post-Quantum DNS security study covering DNSSEC, DoT, DoH; implementing OQS libraries, evaluating lattice/hash primitives, and addressing potential vulnerabilities

GuiderNet: A Meta-Learning Framework for Optimizing Quantum Circuit Geometry and Mitigating Barren Plateaus (arxiv:cs). GuiderNet meta-learns PQC parameter optimization, reducing barren plateaus and enhancing quantum machine learning performance with improved accuracy and reduced training loss

🔐 Quantum Computing & Cryptography

Raymond Laflamme (1960-2025) (scottaaronson​.blog). Tribute to Raymond Laflamme, pioneer in quantum computing and information, highlighting his groundbreaking contributions and the impact on the scientific community

20. "Harvest Now, Decrypt Later" isn't Real (infosec​.press). Critique of 'Harvest Now, Decrypt Later' theory, emphasizing risks of quantum computing vs. real-world cryptographic threats and security priorities

New Hybrid Quantum–Classical Computing Approach Used to Study Chemical Systems (caltech​.edu). Hybrid quantum-classical computing approach leverages IBM's quantum device and RIKEN supercomputer to solve complex quantum chemistry problems related to electron movements

Post-Quantum Cryptography Implementation Enterprise-Readiness Analysis (darknet​.org​.uk). Enterprises adopt post-quantum cryptography with hybrid TLS, OpenSSL 3.5, and the Kyber algorithm, addressing quantum risks and integrating regulatory standards

UK Ambassador to the US visits Cambridge to discuss opportunities for deepening UK-US tech collaboration (cam​.ac​.uk). UK Ambassador Lord Mandelson visits Cambridge to strengthen US-UK tech partnerships in quantum, life sciences, and AI innovation

Common Circom Pitfalls and How to Dodge Them — Part 1 (blog​.zksecurity​.xyz). Explore common Circom pitfalls, including assertion misuse, hints, and aliasing issues that can jeopardize circuit integrity and security

💻 Computational Performance & Programming

Calculus Phobic’s Introduction to Differentiable Programming (andersource​.dev). Introduction to differentiable programming using JAX, focusing on optimization techniques, gradient descent, and automatic differentiation principles for solving computational problems

Trying out the ice4pi from Lightside Instruments (mikecoats​.com). Hands-on with Lightside Instruments' ice4pi, programming Raspberry Pi with FPGA, setup guidance, GPIO control, and R-2R DAC applications

Thread Value Layouts in CuTe (veitner​.bearblog​.dev). Explore Thread Value Layouts in CuTeDSL kernels for optimized memory management and indexing techniques using visual aids and practical examples

Pipelining AI/ML Training Workloads with CUDA Streams (towardsdatascience​.com). Explore CUDA streams for pipelining AI/ML training workloads, enhancing performance in PyTorch models through concurrent GPU operations and data augmentation techniques

​​Accelerating Cloud Cryptography: Optimizing AWS-LC with Intel’s AVX-512 (infosecwriteups​.com). Optimizing AWS-LC with Intel's AVX-512 enhances cryptography performance, improving AES-GCM and AES-XTS encryption for efficient cloud data security

🧮 Theoretical Physics & Mathematics

Super-Fun! (asymptotia​.com). Clifford details advancements in Supersymmetric Virasoro Minimal Strings, connecting random matrix models, SCFT, and potential 3D chiral supergravity dualities

Why do quasicrystals exist? (rootprivileges​.net). Exploration of quasicrystals and their formation through enthalpy and entropy stabilization, utilizing density functional theory and innovative computational methods

Nobel laureate conversation: Prof. J. Michael Kosterlitz (elight​.springeropen​.com). Prof. J. Michael Kosterlitz discusses the Kosterlitz-Thouless transition, the use of topology in physics, and the importance of pursuing passion in research

Thermodynamics and emergence (condensedconcepts​.blogspot​.com). Exploration of temperature and entropy as emergent properties in thermodynamics, discussing perspectives from Kadanoff, Primas, Deutsch, Lieb, Yngvason, and Weinberg

New Proof Dramatically Compresses Space Needed for Computation (cosmicmeta​.io). Ryan Williams' proof revolutionizes algorithm memory efficiency, compressing space needed for computation and redefining the time-space trade-off in computer science

👋 Before you go

I've got a big favor to ask - keeping Blaze running isn't expensive, but it does all add up, so I'm asking readers like you to help, if you can.
That's why I'm launching a Patreon page!. Nothing flashy, just a way for folks who find value in these newsletters to chip in a little each month. In return, you'll get:

  • Real say in how Blaze evolves — vote on new topics, features, topic curation ideas
  • First dibs on merch (details still cooking)
  • That warm fuzzy feeling knowing you're supporting something that saves you time and keeps you plugged into great tech writing

If you are getting value from blaze, checking this out would mean the world. And if you can't contribute, no worries—the newsletters keep coming either way, and you can follow along on patreon for free.
Thanks for reading and being part of this nerdy corner of the internet. All the best - Alastair.

You may also like

About Quantum Computing

Our Quantum Computing newsletter covers the latest developments, research papers, and insights in quantum computing technologies. Each week, we curate the most important content so you don't have to spend hours searching.

Whether you're a quantum researcher, developer, or enthusiast, our newsletter provides valuable information to keep you informed and ahead of the curve in this rapidly evolving field.

Subscribe now to join thousands of professionals who receive our weekly updates!