Publications

2017
A. W. Harrow, Lin, C. Yen- Yu, and Montanaro, A., Sequential measurements, disturbance and property testing, Proceedings of ​the 28th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA). pp. 1598-1611, 2017.
V. Dunjko, Taylor, J. M., and Briegel, H. J., Advances in Quantum Reinforcement Learning, IEEE SMC, Banff, AB, pp. 282-287, 2017.
D. Maslov, Basic circuit compilation techniques for an ion-trap quantum machine, New Journal of Physics, vol. 19, no. 2, p. 023035, 2017.
G. Alagic and Lo, C., 3-manifold diagrams and NP vs P, Quantum Information & Computation , vol. 17, no. (1{\&}2), pp. 125-141 , 2017.
J. Cotler, Hayden, P., Penington, G., Salton, G., Swingle, B., and Walter, M., Entanglement Wedge Reconstruction via Universal Recovery Channels, 2017.
V. Dunjko, Liu, Y. - K., Wu, X., and Taylor, J. M., Exponential improvements for quantum-accessible reinforcement learning, 2017.
M. C. Tran, Garrison, J. R., Gong, Z. - X., and Gorshkov, A. V., Lieb-Robinson bounds on n-partite connected correlation functions, Phys. Rev. A 96, 052334, 2017.
G. Alagic and Majenz, C., Quantum Non-malleability and Authentication, In: Katz J., Shacham H. (eds) Advances in Cryptology – CRYPTO 2017. Lecture Notes in Computer Science. Springer, Cham, vol. 10402, 2017.
G. Alagic and Russell, A., Quantum-Secure Symmetric-Key Cryptography Based on Hidden Shifts, In: Coron JS., Nielsen J. (eds) Advances in Cryptology – EUROCRYPT 2017. Lecture Notes in Computer Science, Springer, Cham, vol. 10212, 2017.
2016
M. Amy, Chen, J., and Ross, N. J., A finite presentation of CNOT-dihedral operators, 2016.
X. Xu, Kim, S., Bahl, G., and Taylor, J. M., A quasi-mode theory of chiral phonons, 2016.
F. Jendrzejewski, Eckel, S., Tiecke, T. G., Juzeliūnas, G., Campbell, G. K., Jiang, L., and Gorshkov, A. V., Subwavelength-width optical tunnel junctions for ultracold atoms, Physical Review A, vol. 94, no. 6, p. 063422, 2016.
M. Foss-Feig, Gong, Z. - X., Gorshkov, A. V., and Clark, C. W., Entanglement and spin-squeezing without infinite-range interactions, 2016.
Z. Eldredge, Solano, P., Chang, D., and Gorshkov, A. V., Self-organization of atoms coupled to a chiral reservoir, Physical Review A, vol. 94, no. 5, p. 053855, 2016.
A. Anshu, Touchette, D., Yao, P., and Yu, N., Exponential Separation of Quantum Communication and Classical Information, in 20th Annual Conference on Quantum Information Processing (QIP), 2016.
C. Yen- Yu Lin and Lin, H. - H., Upper bounds on quantum query complexity inspired by the Elitzur-Vaidman bomb tester, Theory of Computing, vol. 12, no. 18, pp. 1-35, 2016.
H. Pichler, Zhu, G., Seif, A., Zoller, P., and Hafezi, M., Measurement Protocol for the Entanglement Spectrum of Cold Atoms, Phys. Rev. X , vol. 6(4), no. 041033, 2016.
N. M. Linke, Gutierrez, M., Landsman, K. A., Figgatt, C., Debnath, S., Brown, K. R., and Monroe, C., Experimental demonstration of quantum fault tolerance, 2016.
C. Shen, Heeres, R. W., Reinhold, P., Jiang, L., Liu, Y. - K., Schoelkopf, R. J., and Jiang, L., Optimized tomography of continuous variable systems using excitation counting, Physical Review A, vol. 94, p. 052327, 2016.
V. Srinivasa, Taylor, J. M., and Tahan, C., Entangling distant resonant exchange qubits via circuit quantum electrodynamics, Physical Review B, vol. 94, no. 20, p. 205421, 2016.
S. Ragole and Taylor, J. M., Interacting atomic interferometry for rotation sensing approaching the Heisenberg Limit, Physical Review Letters, vol. 117, no. 20, p. 203002, 2016.
G. Alagic, Broadbent, A., Fefferman, B., Gagliardoni, T., Schaffner, C., and Jules, M. St., Computational Security of Quantum Encryption, in Computational Security of Quantum Encryption. In: Nascimento A., Barreto P. (eds) Information Theoretic Security. , 2016.
J. Stehlik, Liu, Y. - Y., Eichler, C., Hartke, T. R., Mi, X., Gullans, M., Taylor, J. M., and Petta, J. R., Double Quantum Dot Floquet Gain Medium, Physical Review X, vol. 6, p. 041027, 2016.
Z. - X. Gong, Xu, M., Foss-Feig, M., Thompson, J. K., Rey, A. Maria, Holland, M., and Gorshkov, A. V., Steady-state superradiance with Rydberg polaritons, arXiv:1611.00797, 2016.
C. Miller and Shi, Y., Robust Protocols for Securely Expanding Randomness and Distributing Keys Using Untrusted Quantum Devices, Journal of the ACM, vol. 63, no. 4, pp. 33:1–33:63, 2016.