201 lines
16 KiB
BibTeX
201 lines
16 KiB
BibTeX
|
||
@book{Rawling_2023, title={Deontology}, publisher={Cambridge University Press}, author={Rawling}, year={2023}, doi = {10.1017/9781108581196}}
|
||
|
||
|
||
|
||
@book{Johnson_Cureton_2022, title={Kant’s Moral Philosophy}, url={https://plato.stanford.edu/entries/kant-moral/}, journal={Stanford Encyclopedia of Philosophy}, publisher={Stanford University}, author={Johnson, Robert and Cureton, Adam}, year={2022}, month={Jan}}
|
||
|
||
@book{Mill_Bentham_Ryan_2004, place={London}, title={Utilitarianism and Other Essays}, publisher={Penguin Books}, author={Mill, John Stuart and Bentham, Jeremy and Ryan, Alan}, year={2004}, url = {https://www.penguin.co.uk/books/34129/utilitarianism-and-other-essays-by-john-stuart-mill-and-jeremy-bentham-ed-alan-ryan/9780140432725}}
|
||
|
||
@misc{McGregor_2024, title={Quantum computing is coming faster than you think}, url={https://www.forbes.com/sites/tiriasresearch/2023/11/28/quantum-computing-is-coming-faster-than-you-think/}, journal={Forbes}, publisher={Forbes Magazine}, author={McGregor, Jim}, year={2024}, month={Feb}}
|
||
|
||
@article{Shor_1996, title={Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer}, volume={41}, DOI={10.1137/s0036144598347011}, number={2}, journal={SIAM Review}, author={Shor, Peter W.}, year={1996}, month={Jan}, pages={303–332}}
|
||
|
||
@book{udhr,
|
||
author = {\text{United Nations}},
|
||
publisher = {Office of the United Nations High Commissioner for Human Rights},
|
||
title = {Universal Declaration of Human Rights},
|
||
year = 1948,
|
||
day = 10,
|
||
month = dec,
|
||
url = {https://www.un.org/en/about-us/universal-declaration-of-human-rights},
|
||
}
|
||
|
||
@book{Rogers_2005, place={New York}, title={Diffusion of innovations}, publisher={Free Press}, author={Rogers, Everett M.}, year={2005}}
|
||
|
||
|
||
@book{Bernstein_1997, title={Quantum complexity theory}, publisher={Society for Industrial and Applied Mathematics}, author={Bernstein, Ethan Joseph}, year={1997}}
|
||
|
||
@book{Griffiths_2005, place={Upper Saddle River, NJ}, title={Introduction to quantum mechanics}, publisher={Pearson Prentice Hall}, author={Griffiths, David Jeffrey}, year={2005}}
|
||
|
||
@book{eu_quantum_budget, url={https://digital-strategy.ec.europa.eu/en/policies/quantum-technologies-flagship#:~:text=The%20Quantum%20Technologies%20Flagship%20aims,1%20billion%20from%20the%20EU.}, journal={Shaping Europe’s digital future},publisher = {\text{European Comission}}, author = {\text{Quantum Technologies Flagship}}, year={2023}}
|
||
|
||
@book{Collingridge_1982, place={London}, title={The social control of Technology}, publisher={St. Martin's Press; F. Pinter}, author={Collingridge, David}, year={1980}, url = {https://rug.on.worldcat.org/oclc/7128641}}
|
||
|
||
@book{Bay_2017, title={The ethics of Unbreakable Encryption: Rawlsian Privacy and the san bernardino iphone}, DOI={10.5210/fm.v22i2.7006}, publisher={First Monday}, author={Bay, Morten}, year={2017}, month={Jan}}
|
||
% YES, THIS IS NOT A PROBLEM JUST DO note = {\url{link}}
|
||
|
||
THE PROBLEM IS THAT WE CANNOT PRINT EVERYTHING, FOR INSTANCE DOI'S FOR ARTICLE OR PUBLISHERS I DONT KNOW HOW THE MACHINE DECIDES TO PRINT STUFF
|
||
|
||
GOOD NIGHTT WILL DO PRESENTATION TOMORROW MORNING
|
||
OKEY
|
||
|
||
@book{Dargon_2023, title={Quantum Computing Companies: A full 2024 list}, url={https://thequantuminsider.com/2023/12/29/quantum-computing-companies/}, publisher={The Quantum Insider}, author={Dargon, James}, year={2023}, month={Dec}}
|
||
|
||
@book{Clifford_2020, title={Migration Moments: Extremist Adoption of Text‑Based Instant Messaging Applications}, url={https://gnet-research.org/2020/11/09/migration-moments-extremist-adoption-of-text-based-instant-messaging-applications/}, journal={Migration Moments: Extremist Adoption of Text‑Based Instant Messaging Applications}, publisher={Global Network on Extremism and Technology (GNET)}, author={Clifford, Bennett}, year={2020}, month={Dec}}
|
||
|
||
@book{Brandom_2017, title={Google just cracked one of the building blocks of web encryption (but don’t worry)}, url={https://www.theverge.com/2017/2/23/14712118/google-sha1-collision-broken-web-encryption-shattered}, journal={The Verge}, publisher={The Verge}, author={Brandom, Russell}, year={2017}, month={Feb}}
|
||
|
||
|
||
@book{whatsapp,author ={\text{WhatsApp Security Advisories}}, title={\text{WhatsApp
|
||
Encryption Overview - Technical white paper}}, url={https://www.whatsapp.com/security/advisories}, journal={}, publisher={WhatsApp}, year={2023}, }
|
||
|
||
@misc{mckinsey_quantum, title={Quantum Computing: The Time to act is now}, url={https://www.mckinsey.com/capabilities/mckinsey-digital/our-insights/tech-forward/quantum-computing-the-time-to-act-is-now}, journal={McKinsey & Company}, author={Gschwendtner, Martina and Hijazi, Hussein and Morgan, Nicole and Soller, Henning}, year={2024}, publisher = {McKinsey Digital}, month={Feb}}
|
||
|
||
@book{Awati_Bernstein_Cobb_2024, title={\textit{What is the Advanced Encryption Standard (AES)?: Definition from TechTarget}}, url={https://www.techtarget.com/searchsecurity/definition/Advanced-Encryption-Standard#:~:text=Today%2C%20AES%20is%20one%20of,Electronic%20communication%20apps.}, journal={Security}, publisher={TechTarget}, author={Awati, Rahul and Bernstein, Corinne and Cobb, Michael}, year={2024}, month={Feb}}
|
||
|
||
|
||
|
||
@book{Mosca_Piani_2023, title={2023 Quantum Threat Timeline Report}, url={https://globalriskinstitute.org/publication/2023-quantum-threat-timeline-report/}, publisher={Global Risk Institute}, author={Mosca, Michele and Piani, Marco}, year={2023}, month={Dec}}
|
||
|
||
@book{SUTOR_2023, title={Dancing with qubits : how quantum computing works and how it can change the world}, publisher={Packt Publishing, Ltd. }, author={Sutor, Robert S.}, year={2023}, url = {https://rug.on.worldcat.org/oclc/1132426045}}
|
||
|
||
@book{Timm_2022, title={Ten Years After the Patriot Act, a Look at Three of the Most Dangerous Provisions Affecting Ordinary Americans}, url={https://www.eff.org/nl/deeplinks/2011/10/ten-years-later-look-three-scariest-provisions-usa-patriot-act}, publisher={Electronic Frontier Foundation}, author={Timm, Trevor}, year={2011}, month={Nov}}
|
||
|
||
@book{O’Neill_2021, title={The US is worried that hackers are stealing data today so quantum computers can crack it in a decade}, url={https://www.technologyreview.com/2021/11/03/1039171/hackers-quantum-computers-us-homeland-security-cryptography/}, journal={MIT Technology Review}, publisher={MIT Technology Review}, author={O’Neill, Patrick Howell}, year={2021}, month={Nov}}
|
||
|
||
@book{Morozov_2019, place={London, England}, title={Quantum cryptography in Advanced Networks}, publisher={InTech}, author={Morozov, Oleg G.}, year={2019}, url = {https://rug.on.worldcat.org/oclc/1229508712}}
|
||
|
||
@book{Roundy_2023, title={Explore 7 future potential quantum computing uses}, url={https://www.techtarget.com/searchdatacenter/tip/Explore-future-potential-quantum-computing-uses}, publisher={TechTarget}, author={Roundy, Jacob}, year={2023}, month={Feb}}
|
||
|
||
@book{NIST_2018, author = {NIST}, url={https://www.nist.gov/news-events/news/2016/12/nist-asks-public-help-future-proof-electronic-information}, title = {NIST Asks Public to Help Future-Proof Electronic Information}, journal={NIST}, year={2018}, month={Jan}, publisher = {NIST}}
|
||
|
||
@book{Ramer_2023, title={3 Tremendously Undervalued Quantum Computing Stocks to Buy}, url={https://www.nasdaq.com/articles/3-tremendously-undervalued-quantum-computing-stocks-to-buy}, journal={Nasdaq}, author={Ramer, Larry}, year={2023}, month={Nov}, publisher = {NASDAQ}}
|
||
|
||
|
||
@book{NIST_2017, title={Minimum acceptability requirements - post-quantum cryptography: CSRC}, url={https://csrc.nist.gov/projects/post-quantum-cryptography/post-quantum-cryptography-standardization/minimum-acceptability-requirements}, journal={Information Technology Laboratory Computer Security Resource Center (CSRC)}, publisher={NIST}, author={NIST}, year={2017}, month={Jan}}
|
||
|
||
@book{NIST_2021, title={NIST’s Post-Quantum Cryptography Program enters “Selection round”}, url={https://www.nist.gov/news-events/news/2020/07/nists-post-quantum-cryptography-program-enters-selection-round}, publisher={NIST}, author={NIST}, year={2021}, month={Aug}}
|
||
|
||
@book{NIST_2022, title={NIST announces first four quantum-resistant cryptographic algorithms}, url={https://www.nist.gov/news-events/news/2022/07/nist-announces-first-four-quantum-resistant-cryptographic-algorithms}, publisher={NIST}, author={NIST}, year={2022}, month={Jul}}
|
||
|
||
@book{NIST_2023, title={NIST to standardize encryption algorithms that can resist attack by quantum computers}, url={https://www.nist.gov/news-events/news/2023/08/nist-standardize-encryption-algorithms-can-resist-attack-quantum-computers}, journal={National Institute of Standards and Technology}, author={NIST}, publisher ={NIST}, year={2023}, month={Aug}}
|
||
|
||
|
||
@book{roberto, title={The \$ 1.2 billion case for Quantum}, url={https://www.politico.com/newsletters/digital-future-daily/2023/10/12/the-case-for-cash-for-quantum-00121280}, publisher={POLITICO}, author={Robertson, Derek}, year={2023}, month = {January}}
|
||
|
||
@book{The_Quantum_Insider , title={The History Of Quantum Computing You Need To Know}, url={https://thequantuminsider.com/2020/05/26/history-of-quantum-computing/}, publisher={The Quantum Insider }, author={\text{The Quantum Insider} }, year={2020}}
|
||
|
||
@book{Chen, title={A Brief History of Quantum Computing}, url={ https://quantumpedia.uk/a-brief-history-of-quantum-computing-e0bbd05893d0}, journal={A Brief History of Quantum Computing}, publisher={Medium.com}, author={Chen, Louis}, year={2023}}
|
||
|
||
@book{Classiq, title={Quantum Cryptography - Shor's algorithm explained},url={https://www.classiq.io/insights/shors-algorithm-explained}, journal={Quantum Cryptography - Shor’s algorithm explained}, publisher={Classiq}, author={Classiq}, year={2022}} #YOU ORRIGINALY WROTE NO DATE HERE BUT IF YOU CLICK ON LINK IT IS 2022??
|
||
|
||
@book{IBM, title={\text{Grover's algorithm}}, url={https://learning.quantum.ibm.com/course/fundamentals-of-quantum-algorithms/grovers-algorithm}, publisher={IBM}, author={\text{IBM Quantum Learning}}, year={2023}}
|
||
|
||
@book{Conover, title={Google claimed quantum supremacy in 2019 — and sparked controversy}, url={https://www.sciencenews.org/article/google-quantum-supremacy-claim-controversy-top-science-stories-2019-yir}, publisher={Science News}, author={Conover, Emily}, year={2019}}
|
||
|
||
@book{Swayne, title={What Are The Remaining Challenges Of Quantum Computing?}, url={https://thequantuminsider.com/2023/03/24/quantum-computing-challenges/}, publisher={The Quantum Insider}, author={Swayne, Matt}, year={2023}}
|
||
|
||
@book{NIST_2009, title={About NIST}, url={https://www.nist.gov/about-nist}, publisher={NIST}, author={NIST}, year={2009}}
|
||
|
||
@book{Dubinsky_2023, place={Boca Raton}, title={Cryptography for Payment Professionals}, publisher={Auerbach Publishers, Incorporated.}, author={Dubinsky, Ilya}, year={2023}, doi = {10.1201/9781003371366}}
|
||
|
||
@book{NIST_2014, title={NIST Releases Cybersecurity Framework Version 1.0}, url={https://www.nist.gov/news-events/news/2014/02/nist-releases-cybersecurity-framework-version-10}, publisher={NIST}, author={NIST}, year={2014}}
|
||
|
||
@book{Shah, title={What Is AES Encryption? The Complete Guide}, url={https://www.nist.gov/news-events/news/2014/02/nist-releases-cybersecurity-framework-version-10}, publisher={1Kosmos}, author={Shah, Javed}, year={}}
|
||
|
||
@book{Cobb, title={RSA algorithm (Rivest-Shamir-Adleman)}, url={https://www.techtarget.com/searchsecurity/definition/RSA#:~:text=RSA%20is%20a%20type%20of,is%20used%20to%20decrypt%20it.}, publisher={TechTarget}, author={Cobb, Michael}, year={}}
|
||
|
||
@book{aivd, title = {Prepare for the threat of quantum computers}, author = {AIVD}, publisher = {Algemene Inlichtingen- en Veiligheidsdienst}, url = {https://english.aivd.nl/binaries/aivd-en/documenten/publications/2022/01/18/prepare-for-the-threat-of-quantumcomputers/Prepare+for+the+threat+of+quantumcomputers.pdf}, year = {}}
|
||
|
||
@book{Noone_2023, title={Banks are having a quantum computing revolution}, url={https://techmonitor.ai/hardware/quantum/who-are-early-adopters-quantum-computers-big-banks-finance}, publisher={Tech Monitor}, author={Noone, Greg}, year={2023}, month={}}
|
||
|
||
|
||
@book{aurich_2005, title={CMB anisotropy of spherical spaces}, url={https://iopscience.iop.org/article/10.1088/0264-9381/22/17/006/pdf}, publisher={Classical and Quantum Gravity}, author={Aurich, R. and Lustig, S. and Steiner, F.}, year={2005}, month={}}
|
||
|
||
@book{luminet_2005, title={Eigenmodes of three-dimensional spherical spaces and their application to cosmology}, url={https://doi.org/10.1088/0264-9381/19/18/305}, publisher={Classical and Quantum Gravity}, author={ Lehoucq, R. and Weeks, J. and Uzan, J. P. and Gausmann, E. and Luminet, J.P.}, year={2002}, month={}}
|
||
|
||
|
||
@book{emilio, title={The spectral geometry of hyperbolic and spherical manifolds: analogies and open problems}, url={https://arxiv.org/abs/2305.10950}, publisher={New York Journal of Mathematics}, author={Lauret, E. A. and Linowitz, B. }, year={2025}, month={}}
|
||
|
||
@book{serri, title={Analysis on Manifolds}, url={https://github.com/mseri/AoM/releases}, publisher={AMS Open Math Notes}, author={Serri, M.}, year={2025}, month={}}
|
||
|
||
@book{ikeda80, title={On the spectrum of a Riemannian manifold of positive constant curvature}, url={https://ir.library.osaka-u.ac.jp/repo/ouka/all/5171/}, publisher={ Osaka Journal of Mathematics}, author={Ikeda, A.}, year={1980}}
|
||
|
||
@book{aurich_2012, title={
|
||
A survey of lens spaces and large-scale CMB anisotropy}, url={
|
||
https://doi.org/10.1111/j.1365-2966.2012.21363.x}, publisher={
|
||
Monthly Notices of the Royal Astronomical Society}, author={ Aurich, R. and Kramer, P. and Lustig, S.},volume = {}, year={2012}}
|
||
|
||
@book{Kashino_2012, title={Test for anisotropy in the mean of the CMB
|
||
temperature fluctuation in spherical harmonic space.}, url={https://doi.org/10.1103/physrevd.85.063001}, publisher={Physics Review}, author={Kashino, D. and Ichiki, K. and Takeuchi, T.}, year={2012}}
|
||
|
||
@book{topcat, title={Topology, a categorical approach}, url={https://mitpress.mit.edu/9780262539357/topology/}, author={Tai-Dana, B. and Bryson, T. and Terilla, J.}, year={2020}, month={}, publisher={The MIT Press}}
|
||
|
||
@book{Jarosik_2011, title={Seven-year Wilkinson Microwave Anisotropy Probe (WMAP) Observations: Sky Maps, Systematic Errors, and Basic Results}, url={https://iopscience.iop.org/article/10.1088/0067-0049/192/2/14}, publisher={The American Astronomical Society}, author={N. Jarosik et. al.}, year={2011}}
|
||
|
||
@book{Pedro_2013,
|
||
author = {Labrana, P.},
|
||
year = {2013},
|
||
month = {},
|
||
pages = {},
|
||
title = {Emergent Universe Scenario and the Low CMB Multipoles},
|
||
volume = {},
|
||
publisher = {Physical Review },
|
||
doi = {10.1103/PhysRevD.91.083534}
|
||
}
|
||
|
||
@book{Bielewicz_2004,
|
||
title={Low-order multipole maps of cosmic microwave background anisotropy derived from WMAP},
|
||
volume={},
|
||
ISSN={1365-2966},
|
||
url={http://dx.doi.org/10.1111/j.1365-2966.2004.08405.x},
|
||
DOI={10.1111/j.1365-2966.2004.08405.x},
|
||
number={},
|
||
journal={Monthly Notices of the Royal Astronomical Society},
|
||
publisher={Oxford University Press},
|
||
author={Bielewicz, P. and Górski, K. M. and Banday, A. J.},
|
||
year={2004},
|
||
pages={1283–1302} }
|
||
|
||
|
||
@book{Aurich_2011,
|
||
year = {2011},
|
||
month = {},
|
||
pages = {},
|
||
title = {Cosmic microwave background radiation in an inhomogeneous spherical space},
|
||
volume = {},
|
||
author = {Aurich, R. and Kramer, P. and Lustig, S.},
|
||
publisher = {Physica Scripta},
|
||
doi = {10.1088/0031-8949/84/05/055901}
|
||
}
|
||
|
||
@misc{ wiki:covering,
|
||
author = {Wikimedia Commons},
|
||
title = "Covering space --- {W}ikipedia{,} The Free Encyclopedia",
|
||
year = "2025",
|
||
url = "https://en.wikipedia.org/wiki/Covering_space",
|
||
note = "[Online; accessed 28-February-2025]"
|
||
}
|
||
|
||
@book{Egan_2021,
|
||
year = {2021},
|
||
month = {},
|
||
pages = {},
|
||
title = {Symmetries and the 24-cell},
|
||
volume = {},
|
||
author = {Egan, G.},
|
||
publisher = {},
|
||
note = {Accessed at \url{https://www.gregegan.net/SCIENCE/24-cell/24-cell.html}}
|
||
}
|
||
|
||
@book{Herlihy_1996,
|
||
author = {Herlihy, M. and Shavit, N.},
|
||
year = {1996},
|
||
month = {},
|
||
pages = {},
|
||
title = {The Topological Structure of Asynchronous Computability. },
|
||
volume = {},
|
||
publisher = {Journal of the ACM},
|
||
doi = {10.1145/331524.331529}
|
||
} |