Advertisement · 728 × 90

Posts by Craig Gidney

It was two weeks, not six months. Pretty impressive actually, given that they didn't just find the problem but also made a working malicious circuit that met the qubit requirement.

2 days ago 1 0 1 0

I took solace in the part of the post where he'd bypassed the need to uncompute (a *HUGE* advantage for saving qubits) but was still struggling to match our qubit count 😈.

With an advantage that physically impossible, I bet you can hit ~800 qubits instead of ~1150.

3 days ago 4 0 0 0
Preview
We beat Google’s zero-knowledge proof of quantum cryptanalysis Trail of Bits discovered and exploited memory safety and logic vulnerabilities in Google’s Rust zero-knowledge proof code to forge a proof claiming better quantum circuit performance metrics than Goog...

Congrats to Keegan Ryan for being the first to exploit the simulator we used to validate the secret quantum circuits: blog.trailofbits.com/2026/04/17/w...

It kills me that the (now fixed) bugs were simple (we didn't port the op validation code from C++ to Rust!), but that's to be expected.

3 days ago 17 2 1 1

It is transversal in the sense that it is performed by broadcasting the physical operation over the physical qubits of the logical qubit. And often this is fault tolerant.

...but yes I agree and the blog post makes this exact point. It is conditionally transversal, not truly transversal.

2 weeks ago 0 0 1 0

The Z stabilizers are needed to check for physical X errors. Immediately after a measurement that's fine because X errors do nothing to X eigenstates. But once you do the transversal T the X errors start to matter so you need to be able to check for them. So you need the Z stabilizers back before T.

2 weeks ago 0 0 1 0

A Z basis stabilizer that touches qubit q does not commute with an X basis measurement of q. If you measure the stabilizer before the measurement and after the measurement, you don't get the same result. In a transversal X measurement this happens to all Z stabilizers.

2 weeks ago 0 0 1 0

My dream paper is a zero-knowledge proof that I know the answer to the Collatz conjecture.

2 weeks ago 19 4 1 0
Advertisement
On Eastin-Knill Being Wrong Craig Gidney's computer science blog

A special blog post for today: On Eastin-Knill Being Wrong

algassert.com/post/2600

2 weeks ago 15 0 2 0

This is from a paper that should have appeared on arXiv today but due to technical issues will only be there tomorrow; for the moment it's at quantumai.google/static/site-...

See also this blog post on the idea: research.google/blog/safegua...

2 weeks ago 8 3 1 0
Post image

As timelines tighten, details might benefit attackers more than defenders. So we're trying something weird: proving a circuit exists without revealing it.

For example, here's a zero-knowledge proof that we found 10x smaller quantum circuits for ECDLP: github.com/tanujkhattar...

2 weeks ago 16 4 2 3

There's support for making SVG diagrams of circuits, and there are existing tools to convert SVGs into TikZ.

3 weeks ago 1 0 0 0
How To Make Quantum Algorithms Cheaper | Craig Gidney on Magic-State Factories, Resource Estimates
How To Make Quantum Algorithms Cheaper | Craig Gidney on Magic-State Factories, Resource Estimates YouTube video by 632nm

While I was attending APS March Meeting, I appeared in the 632nm podcast. The recording is available on youtube: www.youtube.com/watch?v=lnHg...

Never been on a podcast before, and no doubt that shows, but it was fun.

3 weeks ago 15 2 0 0
Preview
Quantum frontiers may be closer than they appear An overview of how Google is accelerating its timeline for post-quantum cryptography migration.

I would bet against Q day by 2030, but I wouldn't bet against it at 10:1 odds. ~10% risk is unacceptably high here, so I'm very in favor of transitioning to quantum-safe cryptography by 2029: blog.google/innovation-a...

Yes this means I 90% expect to be made fun of in 2030. Oh well.

3 weeks ago 22 7 1 0

I have to admit, reading the abstract, I don't understand how this differs from what McKague+ showed in 2008 (or equivalently what I described in my blog post). Eve can pass any test for complex gates using only real gates if she has pre-distributed some constant-sized entangled catalysts.

4 weeks ago 0 0 1 0
Preview
[APS2026] How to eat magic states How to eat magic states APS March Meeting 2026 Craig Gidney Google Quantum AI Hello everyone, My name is Craig and my talk is called "how to eat magic states". Now... I have a bit of a confession. The...

The slides from my talk "how to eat magic states" at APS 2026:
docs.google.com/presentation...

...The content of the talk definitely drifted from when I picked the title. Mostly I talked about realizing I didn't understand reaction depth a few months ago.

1 month ago 15 0 0 1
Advertisement

Whoops, I missed that they have multiple shots. The gate overhead is ~5600x not 256x.

2 months ago 3 0 0 0
Preview
Reducing the Number of Qubits in Quantum Discrete Logarithms on Elliptic Curves Solving the Discrete Logarithm problem on the group of points of an elliptic curve is one of the major cryptographic applications of Shor's algorithm. However, current estimates for the number of qubi...

Chevignard et al show residues also reduce the qubit cost of quantum attacks on elliptic curves: eprint.iacr.org/2026/280

The space savings is less dramatic than for factoring (1.6x instead of 6x), and they again pay a big gate count penalty (256x), but very interesting.

2 months ago 4 0 1 0
How to make Quantum Error Correction circuits with Crumble
How to make Quantum Error Correction circuits with Crumble YouTube video by Craig Gidney

Made a video tutorial of using crumble to create a quantum error correction circuit: youtu.be/SnpLSvyyEx8

2 months ago 13 0 0 0

And, of course, if you're in charge of some security thing that's vulnerable to quantum attacks, you should be *assuming progress*. The strategy "we'll start our 3 year plan when it looks 4 years away" is just guaranteeing an "oh shit" moment when progress subtracts 2 years.

2 months ago 11 1 0 0

The cost of holding assumptions constant is they go stale. In 2012, demanding 1e-3 noise was audacious. Now it's conservative. Locality? The mechanisms for long-range connections are multiplying and improving. Frankly, if you assume *progress*, 100k qubits starts looking high.

2 months ago 5 0 1 0
Preview
Factoring 2048-bit RSA Integers in 177 Days with 13436 Qubits and a Multimode Memory We analyze the performance of a quantum computer architecture combining a small processor and a storage unit. By focusing on integer factorization, we show a reduction by several orders of magnitude o...

This might be unappreciated outside the field, but it's easy to juice numbers by demanding more from hardware. It's a common type of paper (e.g. arxiv.org/abs/2103.06159 and arxiv.org/abs/2302.06639). To avoid this confounder. I've tried to hold my assumptions constant over time.

2 months ago 4 0 1 0
Preview
The Pinnacle Architecture: Reducing the cost of breaking RSA-2048 to 100 000 physical qubits using quantum LDPC codes The realisation of utility-scale quantum computing inextricably depends on the design of practical, low-overhead fault-tolerant architectures. We introduce the \textit{Pinnacle Architecture}, which us...

I've been asked several times to comment on arxiv.org/abs/2602.11457, which claims to reduce the qubit cost of factoring by 10x.

My take is that they demand a *lot* more qubit connectivity for that number. Your mileage depends entirely on how plausible you find those demands.

2 months ago 24 4 1 1

From having seen Austin explain the surface code many times: this makes sense to me as the progression he'd chose. He's known surface codes so long that the complications become hard to perceive. And with prerecorded lectures the students can't stop the runaway train with "wait what?" questions.

2 months ago 0 0 0 0

Yup, it's a bit like zooming way in on the boundary of a hyperbolic code. Except I think those don't have a boundary at the edge, but instead have non-local links to other sections of the edge. Otherwise you can't get the constant coding rates they advertise.

2 months ago 0 0 0 0
Advertisement

I use *programming* to generate images. I like SVG as a target format because it's so easy to generate programmatically from any language. In this case I was calling stuff I'd previously written to draw the stabilizers of a code. So I just picked qubit locations and stabilizer bases.

2 months ago 0 0 0 0
Post image

A surface code that goes from a normal tiling to one where each row keeps using half as many qubits as the last.

I can't think of a reason to do this, but it's visually interesting.

2 months ago 14 0 3 0

Or someone has to endorse you. TBH I thought this was already how it worked. For my first submission nine years ago I had to get an endorsement. I got it from Dave Bacon.

It looks like the main change is that previously endorsement was skipped if your email address was associated with a university.

2 months ago 5 0 1 0

In other words: Early Fault Tolerance starts when quality transitions from an impassable barrier to a mere tradeoff.

Concretely… I arbitrarily declare EFT begins once it's demonstrably possible to do T gates with an infidelity of 10^-10. You mostly won't do T gates that way... but you *could*.

3 months ago 3 0 1 0

To me it refers to the quality problem being solved while the quantity problem remains.

So you *could* perform universal logical gates far better than you could ever need... but you can't hold a lot of qubits at once. Sacrificing quality to gain a bit of quantity is then a natural tradeoff.

3 months ago 4 0 1 0
Preview
Efficient simulation of logical magic state preparation protocols Developing space- and time-efficient logical magic state preparation protocols will likely be an essential step towards building a large-scale fault-tolerant quantum computer. Motivated by this need, ...

Another paper related to simulating magic state cultivation. This time it's algorithmic insights, rather than hulk-smashing at the circuit with GPUs: scirate.com/arxiv/2512.2...

(...¿porque no los dos?)

3 months ago 4 0 0 0