Quantum Computing Architectures
|
|
|
- Alice Walker
- 9 years ago
- Views:
Transcription
1 Quantum Computing Architectures 1:-2: Fred Chong (UCD) - Intro, quantum algorithms, and error correction 2:-2:3 Break and discussion 2:3-3:3 Ike Chuang (MIT) - Device technology and implementation issues 3:3-4: Break and official refreshments 4:-5: Mark Oskin (UW) - Quantum architectures 5:- Discussion Plenty of time for questions and discussion All materials available at: ISCA 5/2 F. Chong -- QC 1
2 Quantum Computing for Architects + Fred Chong University of California at Davis
3 Science Fiction? 5 and 7-bit machines have been built 1-bit machines are planned Better technologies are coming Why architectural study? [Vandersypen1, Laflamme99] [Kane98,Vrijen99,Nakamura99,Mooij99] perspective to guide device development ISCA 5/2 F. Chong -- QC 3
4 Outline Quantum bits and operations Algorithms Quantum search Factorization Error correction Teleportation ISCA 5/2 F. Chong -- QC 4
5 Quantum Bits (qubit) + 1 qubit probabilistically represents 2 states a> = C > + C 1 1> Every additional qubit doubles # states ab> = C > + C 1 1> + C 1 1> +C 11 11> Quantum parallelism on an exponential number of states But measurement collapses qubits to single classical values ISCA 5/2 F. Chong -- QC 5
6 7 qubit Quantum Computer ( Vandersypen, Steffen, Breyta, Yannoni, Sherwood, and Chuang, 21 ) Bulk spin NM: nuclear spin qubits Decoherence in 1 sec; operations at 1 Kz Failure probability = 1-3 per operation Potentially 1 1 Kz = 1-6 per op pentafluorobutadienyl cyclopentadienyldicarbonyliron complex ISCA 5/2 F. Chong -- QC 6
7 Silicon Technology ( Kane, Nature 393, p133, 1998 ) ISCA 5/2 F. Chong -- QC 7
8 Quantum Operations Manipulate probability amplitudes Must conserve energy Must be reversible ISCA 5/2 F. Chong -- QC 8
9 ISCA 5/2 F. Chong -- QC 9 Bit Flip Flips probabilities for > and 1> Conservation of energy eversibility => unitary matrix (* means complex conjugate) 1 X Gate Bit-flip, Not = + X α β α β = + = β α C i i I X X T = = ) ( *
10 Bloch Sphere Visualize a qubit as a vector on a sphere z f Y Operations composed of a rotation primitive x q y 1 ISCA 5/2 F. Chong -- QC 1
11 Controlled Not Controlled Not Controlled X CNot X a b c d = a + b1 + d1 + c11 Control bit determines whether X operates Control bit is affected by operation ISCA 5/2 F. Chong -- QC 11
12 Quantum subsumes Classical A B C A B C AB Toffoli gate, or controlled-controlled-not NAND does not conserve energy Number of inputs must equal number of outputs Toffoli gate simulates NAND Inputs = a,b; c set to 1 Output = c ISCA 5/2 F. Chong -- QC 12
13 Universal Quantum Operations Gate adamard α (α + β) > + (α β) 1 > = β 2 T Gate T α - iπ = αe 8 β e iπ - iπ iπ 8 e 8 8 > + βe 1 > Z Gate Phase-flip Z 1 α -1 β = α > β 1 > Controlled Not Controlled X CNot X a b 1 c d = a > + b 1 > + d 1 > + e 11 > ISCA 5/2 F. Chong -- QC 13
14 Quantum Algorithms Search (function evaluation) Factorization (FFT, discrete log) Key distribution Digital signatures Clock synchronization ISCA 5/2 F. Chong -- QC 14
15 Quantum Parallelism > + 1 > 2 x x Uf ψ > > y y f(x) f(x) :{,1} {,1} ψ > =, f() > + 1, f(1) > 2 ISCA 5/2 F. Chong -- QC 15
16 Deutch s Algorithm(1) [Deutch 85] > x x Uf 1> y y f(x) ψ 1 > ψ 1 >= > + 1 > > 1 > 2 2 ISCA 5/2 F. Chong -- QC 16
17 Deutch s Algorithm(2) > x x Uf 1> y y f(x) Note that the xor just flips the probabilities for > and 1> : U f > 1 > f x) x > = ( 1) x 2 > 1 > 2 ( > ISCA 5/2 F. Chong -- QC 17
18 Deutch s Algorithm(3) > x x Uf 1> y y f(x) ψ 2 > ψ 2 > = > + 1> > 1> ± 2 2 > 1> > 1> ± 2 2 if if f ( ) = f (1) f ( ) f (1) ISCA 5/2 F. Chong -- QC 18
19 Deutch s Algorithm(4) > x x Uf 1> y y f(x) ψ 3 > = > 1> ± > 2 > 1> ± 1> 2 if if ψ 3 > f ( ) = f (1) f ( ) f (1) = ± f () f (1) > > 1 > 2 ISCA 5/2 F. Chong -- QC 19
20 Quantum Factorization For N = pq, where p,q are large primes, find p,q given N Let r = Order(x,N), which is min value > such that x r mod N = 1, x coprime N Then (x r/2 +/- 1) mod N = p,q eg Order(2, 15) = 4 (x 4/2 +/-1) mod 15 = 3,5 ISCA 5/2 F. Chong -- QC 2
21 Shor s Algorithm [Shor94] m qubits > r r FT s/r n qubits > x r mod N j j=1: r> = > + 4> + 8> + 12> + j=2: r> = 1> + 5> + 9> + 13> + j=4: r> = 2> + 6> + 1> + 14> + j=8: r> = 3> + 7> + 11> + 15> + ISCA 5/2 F. Chong -- QC 21
22 Quantum Fourier Transform r is in the period, but how to measure r? QFT takes period r => period s/r Measurement yields I*s/r for some I educe fraction I*s/r => r is the denominator with high probability! epeat algorithm if pq not equal N O(n 3 ) instead of O(2 n )!!! ISCA 5/2 F. Chong -- QC 22
23 Quantum Search (function evaluation) n qubits > G G G measure Oracle workspace Iteratively concentrates probability towards desired measurement [Grover96] Can search N unordered items in N time N ISCA 5/2 F. Chong -- QC 23
24 Error Correction is Crucial Need continuous error correction can operate on encoded data [Shor96, Steane96, Gottesman99] Threshold Theorem [Ahanorov 97] failure rate of 1-4 per op can be tolerated Practical error rates are 1-6 to 1-9 ISCA 5/2 F. Chong -- QC 24
25 Quantum Error Correction Z 12 Z 23 Error Type Action no error no action +1-1 bit 3 flipped flip bit bit 1 flipped flip bit bit 2 flipped flip bit 2 (3-qubit code) ISCA 5/2 F. Chong -- QC 25
26 Syndrome Measurment X X Z 12 Ψ2 Ψ 2 ' Ψ1 Ψ 1 ' ISCA 5/2 F. Chong -- QC 26
27 3-bit Error Correction A 1 X X Z 1 A X X Z 12 Ψ 2 X Ψ 2 ' Ψ 1 X Ψ 1 ' Ψ X Ψ ' ISCA 5/2 F. Chong -- QC 27
28 Concatenated Codes Logical qubit First level of encoding... Second level of encoding ISCA 5/2 F. Chong -- QC 28
29 Error Correction Overhead 7-qubit code [Steane96], applied recursively ecursion Storage Operations Min. time (k) (7 k ) ( 153 k ) ( 5 k ) , ,581, ,41 547,981, ,87 83,841,135, ISCA 5/2 F. Chong -- QC 29
30 ecursion equirements Shor s Grover s ISCA 5/2 F. Chong -- QC 3
31 Clustering ecursive scheme is overkill Don t error correct every operation [Oskin,Chong,Chuang IEEE Computer 2] ISCA 5/2 F. Chong -- QC 31
32 Space Savings Shor s p=1-6 Grover s ISCA 5/2 F. Chong -- QC 32 p=1-6
33 Time Savings Shor s p=1-6 Grover s ISCA 5/2 F. Chong -- QC 33 p=1-6
34 Teleportation Sender a> 1 qubit 2 classical bits eceiver a> Destroy source qubit and recreates at target Pre-communicate half of a CAT state ISCA 5/2 F. Chong -- QC 34
35 CAT State > > > + 1 > > 2 > + 11 > 2 Two bits are in lockstep both or both 1 Named for Shrodinger s cat Also EP pair for Einstein, Podolsky, osen ISCA 5/2 F. Chong -- QC 35
36 Teleportation Circuit source a> EP Pair (CAT) b> target c> CNOT X Z a> Source generates bc> EP pair Pre-communicate c> to target with retry Classical communication to set value Can be used to convert between codes! ISCA 5/2 F. Chong -- QC 36
37 Memory ierarchy Processor qubits Cache lines Memory pages teleport teleport [[343,1,15]] [[245,1,15]] [[392,3,15 More physical qubits Less complex operations Greater de More compl code ISCA 5/2 F. Chong -- QC 37
38 ISCA 5/2 F. Chong -- QC 38 Quantum Fourier Transform
39 Blocked QFT ISCA 5/2 F. Chong -- QC 39
40 Summary Quantum computers can be built Error correction allows scalability Tremendous potential for some applications ISCA 5/2 F. Chong -- QC 4
41 est of the afternoon Isaac Chuang - Quantum devices ow things really work Mark Oskin Quantum architectures What architects can do ISCA 5/2 F. Chong -- QC 41
Bits Superposition Quantum Parallelism
7-Qubit Quantum Computer Typical Ion Oscillations in a Trap Bits Qubits vs Each qubit can represent both a or at the same time! This phenomenon is known as Superposition. It leads to Quantum Parallelism
0.1 Phase Estimation Technique
Phase Estimation In this lecture we will describe Kitaev s phase estimation algorithm, and use it to obtain an alternate derivation of a quantum factoring algorithm We will also use this technique to design
Introduction to Quantum Computing
Introduction to Quantum Computing Javier Enciso [email protected] Joint Advanced Student School 009 Technische Universität München April, 009 Abstract In this paper, a gentle introduction to Quantum Computing
Factoring by Quantum Computers
Factoring by Quantum Computers Ragesh Jaiswal University of California, San Diego A Quantum computer is a device that uses uantum phenomenon to perform a computation. A classical system follows a single
Quantum Computing. Robert Sizemore
Quantum Computing Robert Sizemore Outline Introduction: What is quantum computing? What use is quantum computing? Overview of Quantum Systems Dirac notation & wave functions Two level systems Classical
Shor s algorithm and secret sharing
Shor s algorithm and secret sharing Libor Nentvich: QC 23 April 2007: Shor s algorithm and secret sharing 1/41 Goals: 1 To explain why the factoring is important. 2 To describe the oldest and most successful
Quantum Algorithms in NMR Experiments. 25 th May 2012 Ling LIN & Michael Loretz
Quantum Algorithms in NMR Experiments 25 th May 2012 Ling LIN & Michael Loretz Contents 1. Introduction 2. Shor s algorithm 3. NMR quantum computer Nuclear spin qubits in a molecule NMR principles 4. Implementing
Designing Scalable Quantum Computer Architectures: Layout and Initialization
Designing Scalable Quantum Computer Architectures: Layout and Initialization By DEAN ELBERT COPSEY B.S. (University of California, Davis) 1986 M.S. (University of California, Davis) 1996 DISSERTATION Submitted
Quantum computing in practice
Quantum computing in practice & applications to cryptography Renaud Lifchitz OPPIDA NoSuchCon, November 19-21, 2014 Renaud Lifchitz NoSuchCon, November 19-21, 2014 1 / 68 Speaker s bio French senior security
Kandidatexamen. A Review of Freely Available Quantum Computer Simulation Software Johan Brandhorst-Satzkorn. LiTH-MAT-EX 2012/07 SE
Kandidatexamen A Review of Freely Available Quantum Computer Simulation Software Johan Brandhorst-Satzkorn LiTH-MAT-EX 2012/07 SE A Review of Freely Available Quantum Computer Simulation Software Department
Quantum Computing: Lecture Notes. Ronald de Wolf
Quantum Computing: Lecture Notes Ronald de Wolf Preface These lecture notes were formed in small chunks during my Quantum computing course at the University of Amsterdam, Feb-May 2011, and compiled into
Quantum Computing Lecture 7. Quantum Factoring. Anuj Dawar
Quantum Computing Lecture 7 Quantum Factoring Anuj Dawar Quantum Factoring A polynomial time quantum algorithm for factoring numbers was published by Peter Shor in 1994. polynomial time here means that
Quantum Computers. And How Does Nature Compute? Kenneth W. Regan 1 University at Buffalo (SUNY) 21 May, 2015. Quantum Computers
Quantum Computers And How Does Nature Compute? Kenneth W. Regan 1 University at Buffalo (SUNY) 21 May, 2015 1 Includes joint work with Amlan Chakrabarti, U. Calcutta If you were designing Nature, how would
Keywords Quantum logic gates, Quantum computing, Logic gate, Quantum computer
Volume 3 Issue 10 October 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Introduction
Lecture 1 Version: 14/08/28. Frontiers of Condensed Matter San Sebastian, Aug. 28-30, 2014. Dr. Leo DiCarlo [email protected] dicarlolab.tudelft.
Introduction to quantum computing (with superconducting circuits) Lecture 1 Version: 14/08/28 Frontiers of Condensed Matter San Sebastian, Aug. 28-30, 2014 Dr. Leo DiCarlo [email protected] dicarlolab.tudelft.nl
QUANTUM INFORMATION, COMPUTATION AND FUNDAMENTAL LIMITATION
Arun K. Pati Theoretical Physics Division QUANTUM INFORMATION, COMPUTATION AND FUNDAMENTAL LIMITATION Introduction Quantum information theory is a marriage between two scientific pillars of the twentieth
What Has Quantum Mechanics to Do With Factoring? Things I wish they had told me about Peter Shor s algorithm
What Has Quantum Mechanics to Do With Factoring? Things I wish they had told me about Peter Shor s algorithm 1 Question: What has quantum mechanics to do with factoring? Answer: Nothing! 2 Question: What
Quantum Algorithms Lecture Notes Summer School on Theory and Technology in Quantum Information, Communication, Computation and Cryptography
Quantum Algorithms Lecture Notes Summer School on Theory and Technology in Quantum Information, Communication, Computation and Cryptography Julia Kempe CNRS & LRI, Université de Paris-Sud 9405 Orsay, France
Introduction to computer science
Introduction to computer science Michael A. Nielsen University of Queensland Goals: 1. Introduce the notion of the computational complexity of a problem, and define the major computational complexity classes.
Quantum Computing. Robert Senser, PhD. CSC 5446 Presentation Spring 2015. http://cse.ucdenver.edu/~rsenser/ Version 2014.1
Quantum Computing Robert Senser, PhD http://cse.ucdenver.edu/~rsenser/ CSC 5446 Presentation Spring 2015 Version 2014.1 Quantum Computing Overview of Presentation Topics Terms: Measurement Qubit Superposition
ECE 842 Report Implementation of Elliptic Curve Cryptography
ECE 842 Report Implementation of Elliptic Curve Cryptography Wei-Yang Lin December 15, 2004 Abstract The aim of this report is to illustrate the issues in implementing a practical elliptic curve cryptographic
Quantum Computation: a Tutorial
Quantum Computation: a Tutorial 1 Quantum Computation: a Tutorial Benoît Valiron University of Pennsylvania, Department of Computer and Information Science, 3330 Walnut Street, Philadelphia, Pennsylvania,
230483 - QOT - Quantum Optical Technologies
Coordinating unit: Teaching unit: Academic year: Degree: ECTS credits: 2015 230 - ETSETB - Barcelona School of Telecommunications Engineering 739 - TSC - Department of Signal Theory and Communications
arxiv:quant-ph/9809016 v2 19 Jan 2000
An Introduction to Quantum Computing for Non-Physicists arxiv:quant-ph/9809016 v 19 Jan 000 Eleanor Rieffel FX Palo Alto Labratory and Wolfgang Polak Consultant FX Palo Alto Laboratory, 3400 Hillview Avenue,
Quantum Computers vs. Computers Security. @veorq http://aumasson.jp
Quantum Computers vs. Computers Security @veorq http://aumasson.jp Schrodinger equation Entanglement Bell states EPR pairs Wave functions Uncertainty principle Tensor products Unitary matrices Hilbert
QUANTUM COMPUTERS AND CRYPTOGRAPHY. Mark Zhandry Stanford University
QUANTUM COMPUTERS AND CRYPTOGRAPHY Mark Zhandry Stanford University Classical Encryption pk m c = E(pk,m) sk m = D(sk,c) m??? Quantum Computing Attack pk m aka Post-quantum Crypto c = E(pk,m) sk m = D(sk,c)
Using quantum computing to realize the Fourier Transform in computer vision applications
Using quantum computing to realize the Fourier Transorm in computer vision applications Renato O. Violin and José H. Saito Computing Department Federal University o São Carlos {renato_violin, saito }@dc.uscar.br
Quantum Systems for Information Technology
Lecture Quantum Systems for Information Technology fall term (HS) 2010 Lecturer: e Andreas Wallraff office: HPF D 8/9, ETH Hoenggerberg email: [email protected] What is this lecture about? Quantum
A Recent Improvements in Quantum Model and Counter Measures in Quantum Computing
A Recent Improvements in Quantum Model and Counter Measures in Quantum Computing J.Senthil Murugan 1, V.Parthasarathy 2, S.Sathya 3, M.Anand 4 Assistant Professor, VelTech HighTech Dr.Rangarajan Dr.Sakunthala
Quantum Computability and Complexity and the Limits of Quantum Computation
Quantum Computability and Complexity and the Limits of Quantum Computation Eric Benjamin, Kenny Huang, Amir Kamil, Jimmy Kittiyachavalit University of California, Berkeley December 7, 2003 This paper will
A Beginning in the Reversible Logic Synthesis of Sequential Circuits
A Beginning in the Reversible Logic Synthesis of Sequential s Himanshu Thapliyal and M.B Srinivas Centre for VLSI and Embedded System Technologies International Institute of Information Technology, Hyderabad,
arxiv:quant-ph/9508027v2 25 Jan 1996
Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer arxiv:quant-ph/9508027v2 25 Jan 1996 Peter W. Shor Abstract A digital computer is generally believed to
Simulated Quantum Annealer
Simulated Quantum Annealer Department of CIS - Senior Design 013-014 Danica Bassman [email protected] University of Pennsylvania Philadelphia, PA ABSTRACT Quantum computing requires qubits, which
Fast Fourier Transform: Theory and Algorithms
Fast Fourier Transform: Theory and Algorithms Lecture Vladimir Stojanović 6.973 Communication System Design Spring 006 Massachusetts Institute of Technology Discrete Fourier Transform A review Definition
Techniques algébriques en calcul quantique
Techniques algébriques en calcul quantique E. Jeandel Laboratoire de l Informatique du Parallélisme LIP, ENS Lyon, CNRS, INRIA, UCB Lyon 8 Avril 25 E. Jeandel, LIP, ENS Lyon Techniques algébriques en calcul
Quantum Computing with NMR
Quantum Computing with NMR Sabine Keiber, Martin Krauÿ June 3, 2009 Sabine Keiber, Martin Krauÿ Quantum Computing with NMR June 3, 2009 1 / 46 1 A Short Introduction to NMR 2 Di Vincenzo's Requirements
Factoring Algorithms Based on NMR Quantum
1295 2002 69-74 69 Factoring Algorithms Based on NMR Quantum Computers (Noboru Kunihiro) (Shigeru Yamashita) NTT NTT Abstract No polynomial time algorithms have been proposed for the factoring and discrete
Lecture 13: Factoring Integers
CS 880: Quantum Information Processing 0/4/0 Lecture 3: Factoring Integers Instructor: Dieter van Melkebeek Scribe: Mark Wellons In this lecture, we review order finding and use this to develop a method
CAs and Turing Machines. The Basis for Universal Computation
CAs and Turing Machines The Basis for Universal Computation What We Mean By Universal When we claim universal computation we mean that the CA is capable of calculating anything that could possibly be calculated*.
"in recognition of the services he rendered to the advancement of Physics by his discovery of energy quanta". h is the Planck constant he called it
1 2 "in recognition of the services he rendered to the advancement of Physics by his discovery of energy quanta". h is the Planck constant he called it the quantum of action 3 Newton believed in the corpuscular
SIMULATING QUANTUM COMPUTING: QUANTUM EXPRESS
Proceedings of the 2003 Winter Simulation Conference S. Chick, P. J. Sánchez, D. Ferrin, and D. J. Morrice, eds. SIMULATING QUANTUM COMPUTING: QUANTUM EXPRESS Kareem S. Aggour Renee Guhde Melvin K. Simmons
A New Reversible TSG Gate and Its Application For Designing Efficient Adder Circuits
A New Reversible TSG Gate and Its Application For Designing Efficient Adder s Himanshu Thapliyal Center for VLSI and Embedded System Technologies International Institute of Information Technology Hyderabad-500019,
Quantum Computing and Grover s Algorithm
Quantum Computing and Grover s Algorithm Matthew Hayward January 14, 2015 1 Contents 1 Motivation for Study of Quantum Computing 3 1.1 A Killer App for Quantum Computing.............. 3 2 The Quantum Computer
2 Elements of classical computer science
2 Elements of classical computer science 11 Good references for the material of this section are [3], Chap. 3, [5], Secs. 2 and 3, [7], Sec. 6.1, and [11] as a nice readable account of complexit with some
How To Solve An Npa-Complete Problems With Quantum Computing And Chaotic Dynamics
CDMTCS Research Report Series A New Quantum Algorithm for NP-complete Problems Masanori Ohya Igor V. Volovich Science University of Tokyo Steklov Mathematical Institute CDMTCS-194 September 00 Centre for
Chapter 12: Multiprocessor Architectures. Lesson 01: Performance characteristics of Multiprocessor Architectures and Speedup
Chapter 12: Multiprocessor Architectures Lesson 01: Performance characteristics of Multiprocessor Architectures and Speedup Objective Be familiar with basic multiprocessor architectures and be able to
Quantum and Non-deterministic computers facing NP-completeness
Quantum and Non-deterministic computers facing NP-completeness Thibaut University of Vienna Dept. of Business Administration Austria Vienna January 29th, 2013 Some pictures come from Wikipedia Introduction
Quantum Network Coding
Salah A. Aly Department of Computer Science Texas A& M University Quantum Computing Seminar April 26, 2006 Network coding example In this butterfly network, there is a source S 1 and two receivers R 1
Introduction to Quantum Computing
Introduction to Quantum Computing Frédéric Magniez LIAFA & PCQC, Université Paris Diderot The genesis 2 Copenhagen School (Bohr, Heisenberg, ) - The state of a quantum particule is only fixed after a measurement
Sensors & Transducers 2015 by IFSA Publishing, S. L. http://www.sensorsportal.com
Sensors & Transducers 2015 by IFSA Publishing, S. L. http://www.sensorsportal.com A Dynamic Deployment Policy of Slave Controllers for Software Defined Network Yongqiang Yang and Gang Xu College of Computer
An Extension to DNA Based Fredkin Gate Circuits: Design of Reversible Sequential Circuits using Fredkin Gates
An Extension to DNA Based Fredkin Gate Circuits: Design of Reversible Sequential Circuits using Fredkin Gates Himanshu Thapliyal and M.B Srinivas ([email protected], [email protected]) Center
Secure Network Communication Part II II Public Key Cryptography. Public Key Cryptography
Kommunikationssysteme (KSy) - Block 8 Secure Network Communication Part II II Public Key Cryptography Dr. Andreas Steffen 2000-2001 A. Steffen, 28.03.2001, KSy_RSA.ppt 1 Secure Key Distribution Problem
Nanoscience Course Descriptions
Nanoscience Course Descriptions NANO*1000 Introduction to Nanoscience This course introduces students to the emerging field of nanoscience. Its representation in popular culture and journalism will be
α α λ α = = λ λ α ψ = = α α α λ λ ψ α = + β = > θ θ β > β β θ θ θ β θ β γ θ β = γ θ > β > γ θ β γ = θ β = θ β = θ β = β θ = β β θ = = = β β θ = + α α α α α = = λ λ λ λ λ λ λ = λ λ α α α α λ ψ + α =
Network Security Technology Network Management
COMPUTER NETWORKS Network Security Technology Network Management Source Encryption E(K,P) Decryption D(K,C) Destination The author of these slides is Dr. Mark Pullen of George Mason University. Permission
Lecture 13 - Basic Number Theory.
Lecture 13 - Basic Number Theory. Boaz Barak March 22, 2010 Divisibility and primes Unless mentioned otherwise throughout this lecture all numbers are non-negative integers. We say that A divides B, denoted
Cryptography Lecture 8. Digital signatures, hash functions
Cryptography Lecture 8 Digital signatures, hash functions A Message Authentication Code is what you get from symmetric cryptography A MAC is used to prevent Eve from creating a new message and inserting
Chapter 6 Quantum Computing Based Software Testing Strategy (QCSTS)
Chapter 6 Quantum Computing Based Software Testing Strategy (QCSTS) 6.1 Introduction Software testing is a dual purpose process that reveals defects and is used to evaluate quality attributes of the software,
The Limits of Adiabatic Quantum Computation
The Limits of Adiabatic Quantum Computation Alper Sarikaya June 11, 2009 Presentation of work given on: Thesis and Presentation approved by: Date: Contents Abstract ii 1 Introduction to Quantum Computation
6.080/6.089 GITCS Feb 12, 2008. Lecture 3
6.8/6.89 GITCS Feb 2, 28 Lecturer: Scott Aaronson Lecture 3 Scribe: Adam Rogal Administrivia. Scribe notes The purpose of scribe notes is to transcribe our lectures. Although I have formal notes of my
Fault Modeling. Why model faults? Some real defects in VLSI and PCB Common fault models Stuck-at faults. Transistor faults Summary
Fault Modeling Why model faults? Some real defects in VLSI and PCB Common fault models Stuck-at faults Single stuck-at faults Fault equivalence Fault dominance and checkpoint theorem Classes of stuck-at
Lecture 9 - Message Authentication Codes
Lecture 9 - Message Authentication Codes Boaz Barak March 1, 2010 Reading: Boneh-Shoup chapter 6, Sections 9.1 9.3. Data integrity Until now we ve only been interested in protecting secrecy of data. However,
Lecture 3: Linear methods for classification
Lecture 3: Linear methods for classification Rafael A. Irizarry and Hector Corrada Bravo February, 2010 Today we describe four specific algorithms useful for classification problems: linear regression,
Chapter 4 Register Transfer and Microoperations. Section 4.1 Register Transfer Language
Chapter 4 Register Transfer and Microoperations Section 4.1 Register Transfer Language Digital systems are composed of modules that are constructed from digital components, such as registers, decoders,
Synchronization. Todd C. Mowry CS 740 November 24, 1998. Topics. Locks Barriers
Synchronization Todd C. Mowry CS 740 November 24, 1998 Topics Locks Barriers Types of Synchronization Mutual Exclusion Locks Event Synchronization Global or group-based (barriers) Point-to-point tightly
ETEC 2301 Programmable Logic Devices. Chapter 10 Counters. Shawnee State University Department of Industrial and Engineering Technologies
ETEC 2301 Programmable Logic Devices Chapter 10 Counters Shawnee State University Department of Industrial and Engineering Technologies Copyright 2007 by Janna B. Gallaher Asynchronous Counter Operation
arxiv:quant-ph/9607009v1 11 Jul 1996
Distillability of Inseparable Quantum Systems Micha l Horodecki Department of Mathematics and Physics University of Gdańsk, 80 952 Gdańsk, Poland arxiv:quant-ph/9607009v1 11 Jul 1996 Pawe l Horodecki Faculty
Entanglement: The Holy Grail of High-Speed Design
by Barry Olney column BEYOND DESIGN Entanglement: The Holy Grail of High-Speed Design While high-speed SERDES serial communications seems to currently be at the cutting edge of technology, maybe it will
CHAPTER 3 Boolean Algebra and Digital Logic
CHAPTER 3 Boolean Algebra and Digital Logic 3.1 Introduction 121 3.2 Boolean Algebra 122 3.2.1 Boolean Expressions 123 3.2.2 Boolean Identities 124 3.2.3 Simplification of Boolean Expressions 126 3.2.4
INTRODUCTION TO DIGITAL SYSTEMS. IMPLEMENTATION: MODULES (ICs) AND NETWORKS IMPLEMENTATION OF ALGORITHMS IN HARDWARE
INTRODUCTION TO DIGITAL SYSTEMS 1 DESCRIPTION AND DESIGN OF DIGITAL SYSTEMS FORMAL BASIS: SWITCHING ALGEBRA IMPLEMENTATION: MODULES (ICs) AND NETWORKS IMPLEMENTATION OF ALGORITHMS IN HARDWARE COURSE EMPHASIS:
Open Problems in Quantum Information Processing. John Watrous Department of Computer Science University of Calgary
Open Problems in Quantum Information Processing John Watrous Department of Computer Science University of Calgary #1 Open Problem Find new quantum algorithms. Existing algorithms: Shor s Algorithm (+ extensions)
Chapter 1. Computation theory
Chapter 1. Computation theory In this chapter we will describe computation logic for the machines. This topic is a wide interdisciplinary field, so that the students can work in an interdisciplinary context.
Computer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 20 Public-Key Cryptography and Message Authentication First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Public-Key Cryptography
Factorization Methods: Very Quick Overview
Factorization Methods: Very Quick Overview Yuval Filmus October 17, 2012 1 Introduction In this lecture we introduce modern factorization methods. We will assume several facts from analytic number theory.
Chapter 3. if 2 a i then location: = i. Page 40
Chapter 3 1. Describe an algorithm that takes a list of n integers a 1,a 2,,a n and finds the number of integers each greater than five in the list. Ans: procedure greaterthanfive(a 1,,a n : integers)
A Layered Software Architecture for Quantum Computing Design Tools
C O V E R F E A T U R E A Layered Software Architecture for Quantum Computing Design Tools Krysta M. Svore, Alfred V. Aho Columbia University Andrew W. Cross, Isaac Chuang Massachusetts Institute of Technology
MTAT.07.003 Cryptology II. Digital Signatures. Sven Laur University of Tartu
MTAT.07.003 Cryptology II Digital Signatures Sven Laur University of Tartu Formal Syntax Digital signature scheme pk (sk, pk) Gen (m, s) (m,s) m M 0 s Sign sk (m) Ver pk (m, s)? = 1 To establish electronic
ASYNCHRONOUS COUNTERS
LB no.. SYNCHONOUS COUNTES. Introduction Counters are sequential logic circuits that counts the pulses applied at their clock input. They usually have 4 bits, delivering at the outputs the corresponding
Quantum Computing in Finance. Colin P. Williams D- Wave Systems Inc.
Quantum Computing in Finance Colin P. Williams D- Wave Systems Inc. Overview Company background Quantum compudng & why it majers Product (D- Wave 2X TM ) Performance Programming ApplicaDons 2015 D- Wave
Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket
IT 4823 Information Security Administration Public Key Encryption Revisited April 5 Notice: This session is being recorded. Lecture slides prepared by Dr Lawrie Brown for Computer Security: Principles
