Stacey Jeffery
Stacey Jeffery
Verified email at - Homepage
Cited by
Cited by
HASS: A scheduler for heterogeneous multicore systems
D Shelepov, JC Saez Alcaide, S Jeffery, A Fedorova, N Perez, ZF Huang, ...
ACM SIGOPS Operating Systems Review 43 (2), 66-75, 2009
The power of block-encoded matrix powers: improved regression techniques via faster Hamiltonian simulation
S Chakraborty, A Gilyén, S Jeffery
arXiv preprint arXiv:1804.01973, 2018
Quantum homomorphic encryption for circuits of low T-gate complexity
A Broadbent, S Jeffery
Annual Cryptology Conference, 609-629, 2015
Quantum algorithms for the subset-sum problem
DJ Bernstein, S Jeffery, T Lange, A Meurer
Post-Quantum Cryptography: 5th International Workshop, PQCrypto 2013 …, 2013
Verifier-on-a-leash: new schemes for verifiable delegated quantum computation, with quasilinear resources
A Coladangelo, AB Grilo, S Jeffery, T Vidick
Annual international conference on the theory and applications of …, 2019
Quadratic speedup for finding marked vertices by quantum walks
A Ambainis, A Gilyén, S Jeffery, M Kokainis
Proceedings of the 52nd Annual ACM SIGACT Symposium on Theory of Computing …, 2020
Time-efficient quantum walks for 3-distinctness
A Belovs, AM Childs, S Jeffery, R Kothari, F Magniez
International Colloquium on Automata, Languages, and Programming, 105-122, 2013
Secure multi-party quantum computation with a dishonest majority
Y Dulek, AB Grilo, S Jeffery, C Majenz, C Schaffner
Annual International Conference on the Theory and Applications of …, 2020
Nested quantum walks with quantum data structures
S Jeffery, R Kothari, F Magniez
Proceedings of the twenty-fourth annual ACM-SIAM symposium on Discrete …, 2013
A unified framework of quantum walk search
S Apers, A Gilyén, S Jeffery
arXiv preprint arXiv:1912.04233, 2019
Secure software leasing without assumptions
A Broadbent, S Jeffery, S Lord, S Podder, A Sundaram
Theory of Cryptography Conference, 90-120, 2021
Frameworks for quantum algorithms
S Jeffery
University of Waterloo, 2014
Quantum algorithms for graph connectivity and formula evaluation
S Jeffery, S Kimmel
Quantum 1, 26, 2017
Approximate span programs
T Ito, S Jeffery
Algorithmica 81, 2158-2195, 2019
Attacks on the AJPS Mersenne-based cryptosystem
K de Boer, L Ducas, S Jeffery, R de Wolf
Post-Quantum Cryptography: 9th International Conference, PQCrypto 2018, Fort …, 2018
Optimal parallel quantum query algorithms
S Jeffery, F Magniez, R De Wolf
Algorithmica 79, 509-529, 2017
Experimental demonstration of quantum fully homomorphic encryption with application in a two-party secure protocol
WK Tham, H Ferretti, K Bonsma-Fisher, A Brodutch, BC Sanders, ...
Physical Review X 10 (1), 011038, 2020
Improving quantum query complexity of Boolean matrix multiplication using graph collision
S Jeffery, R Kothari, F Le Gall, F Magniez
Algorithmica 76, 1-16, 2016
Quantum algorithms for connectivity and related problems
M Jarret, S Jeffery, S Kimmel, A Piedrafita
arXiv preprint arXiv:1804.10591, 2018
On non-adaptive quantum chosen-ciphertext attacks and learning with errors
G Alagic, S Jeffery, M Ozols, A Poremba
arXiv preprint arXiv:1808.09655, 2018
The system can't perform the operation now. Try again later.
Articles 1–20