Quantum Computing Architectures

Size: px
Start display at page:

Download "Quantum Computing Architectures"

Transcription

1 Quantum Computing Architectures 1:-2: Fred Chong (UCD) - Intro, quantum algorithms, and error correction 2:-2:3 Break and discussion 2:3-3:3 Ike Chuang (MIT) - Device technology and implementation issues 3:3-4: Break and official refreshments 4:-5: Mark Oskin (UW) - Quantum architectures 5:- Discussion Plenty of time for questions and discussion All materials available at: ISCA 5/2 F. Chong -- QC 1

2 Quantum Computing for Architects + Fred Chong University of California at Davis

3 Science Fiction? 5 and 7-bit machines have been built 1-bit machines are planned Better technologies are coming Why architectural study? [Vandersypen1, Laflamme99] [Kane98,Vrijen99,Nakamura99,Mooij99] perspective to guide device development ISCA 5/2 F. Chong -- QC 3

4 Outline Quantum bits and operations Algorithms Quantum search Factorization Error correction Teleportation ISCA 5/2 F. Chong -- QC 4

5 Quantum Bits (qubit) + 1 qubit probabilistically represents 2 states a> = C > + C 1 1> Every additional qubit doubles # states ab> = C > + C 1 1> + C 1 1> +C 11 11> Quantum parallelism on an exponential number of states But measurement collapses qubits to single classical values ISCA 5/2 F. Chong -- QC 5

6 7 qubit Quantum Computer ( Vandersypen, Steffen, Breyta, Yannoni, Sherwood, and Chuang, 21 ) Bulk spin NM: nuclear spin qubits Decoherence in 1 sec; operations at 1 Kz Failure probability = 1-3 per operation Potentially 1 1 Kz = 1-6 per op pentafluorobutadienyl cyclopentadienyldicarbonyliron complex ISCA 5/2 F. Chong -- QC 6

7 Silicon Technology ( Kane, Nature 393, p133, 1998 ) ISCA 5/2 F. Chong -- QC 7

8 Quantum Operations Manipulate probability amplitudes Must conserve energy Must be reversible ISCA 5/2 F. Chong -- QC 8

9 ISCA 5/2 F. Chong -- QC 9 Bit Flip Flips probabilities for > and 1> Conservation of energy eversibility => unitary matrix (* means complex conjugate) 1 X Gate Bit-flip, Not = + X α β α β = + = β α C i i I X X T = = ) ( *

10 Bloch Sphere Visualize a qubit as a vector on a sphere z f Y Operations composed of a rotation primitive x q y 1 ISCA 5/2 F. Chong -- QC 1

11 Controlled Not Controlled Not Controlled X CNot X a b c d = a + b1 + d1 + c11 Control bit determines whether X operates Control bit is affected by operation ISCA 5/2 F. Chong -- QC 11

12 Quantum subsumes Classical A B C A B C AB Toffoli gate, or controlled-controlled-not NAND does not conserve energy Number of inputs must equal number of outputs Toffoli gate simulates NAND Inputs = a,b; c set to 1 Output = c ISCA 5/2 F. Chong -- QC 12

13 Universal Quantum Operations Gate adamard α (α + β) > + (α β) 1 > = β 2 T Gate T α - iπ = αe 8 β e iπ - iπ iπ 8 e 8 8 > + βe 1 > Z Gate Phase-flip Z 1 α -1 β = α > β 1 > Controlled Not Controlled X CNot X a b 1 c d = a > + b 1 > + d 1 > + e 11 > ISCA 5/2 F. Chong -- QC 13

14 Quantum Algorithms Search (function evaluation) Factorization (FFT, discrete log) Key distribution Digital signatures Clock synchronization ISCA 5/2 F. Chong -- QC 14

15 Quantum Parallelism > + 1 > 2 x x Uf ψ > > y y f(x) f(x) :{,1} {,1} ψ > =, f() > + 1, f(1) > 2 ISCA 5/2 F. Chong -- QC 15

16 Deutch s Algorithm(1) [Deutch 85] > x x Uf 1> y y f(x) ψ 1 > ψ 1 >= > + 1 > > 1 > 2 2 ISCA 5/2 F. Chong -- QC 16

17 Deutch s Algorithm(2) > x x Uf 1> y y f(x) Note that the xor just flips the probabilities for > and 1> : U f > 1 > f x) x > = ( 1) x 2 > 1 > 2 ( > ISCA 5/2 F. Chong -- QC 17

18 Deutch s Algorithm(3) > x x Uf 1> y y f(x) ψ 2 > ψ 2 > = > + 1> > 1> ± 2 2 > 1> > 1> ± 2 2 if if f ( ) = f (1) f ( ) f (1) ISCA 5/2 F. Chong -- QC 18

19 Deutch s Algorithm(4) > x x Uf 1> y y f(x) ψ 3 > = > 1> ± > 2 > 1> ± 1> 2 if if ψ 3 > f ( ) = f (1) f ( ) f (1) = ± f () f (1) > > 1 > 2 ISCA 5/2 F. Chong -- QC 19

20 Quantum Factorization For N = pq, where p,q are large primes, find p,q given N Let r = Order(x,N), which is min value > such that x r mod N = 1, x coprime N Then (x r/2 +/- 1) mod N = p,q eg Order(2, 15) = 4 (x 4/2 +/-1) mod 15 = 3,5 ISCA 5/2 F. Chong -- QC 2

21 Shor s Algorithm [Shor94] m qubits > r r FT s/r n qubits > x r mod N j j=1: r> = > + 4> + 8> + 12> + j=2: r> = 1> + 5> + 9> + 13> + j=4: r> = 2> + 6> + 1> + 14> + j=8: r> = 3> + 7> + 11> + 15> + ISCA 5/2 F. Chong -- QC 21

22 Quantum Fourier Transform r is in the period, but how to measure r? QFT takes period r => period s/r Measurement yields I*s/r for some I educe fraction I*s/r => r is the denominator with high probability! epeat algorithm if pq not equal N O(n 3 ) instead of O(2 n )!!! ISCA 5/2 F. Chong -- QC 22

23 Quantum Search (function evaluation) n qubits > G G G measure Oracle workspace Iteratively concentrates probability towards desired measurement [Grover96] Can search N unordered items in N time N ISCA 5/2 F. Chong -- QC 23

24 Error Correction is Crucial Need continuous error correction can operate on encoded data [Shor96, Steane96, Gottesman99] Threshold Theorem [Ahanorov 97] failure rate of 1-4 per op can be tolerated Practical error rates are 1-6 to 1-9 ISCA 5/2 F. Chong -- QC 24

25 Quantum Error Correction Z 12 Z 23 Error Type Action no error no action +1-1 bit 3 flipped flip bit bit 1 flipped flip bit bit 2 flipped flip bit 2 (3-qubit code) ISCA 5/2 F. Chong -- QC 25

26 Syndrome Measurment X X Z 12 Ψ2 Ψ 2 ' Ψ1 Ψ 1 ' ISCA 5/2 F. Chong -- QC 26

27 3-bit Error Correction A 1 X X Z 1 A X X Z 12 Ψ 2 X Ψ 2 ' Ψ 1 X Ψ 1 ' Ψ X Ψ ' ISCA 5/2 F. Chong -- QC 27

28 Concatenated Codes Logical qubit First level of encoding... Second level of encoding ISCA 5/2 F. Chong -- QC 28

29 Error Correction Overhead 7-qubit code [Steane96], applied recursively ecursion Storage Operations Min. time (k) (7 k ) ( 153 k ) ( 5 k ) , ,581, ,41 547,981, ,87 83,841,135, ISCA 5/2 F. Chong -- QC 29

30 ecursion equirements Shor s Grover s ISCA 5/2 F. Chong -- QC 3

31 Clustering ecursive scheme is overkill Don t error correct every operation [Oskin,Chong,Chuang IEEE Computer 2] ISCA 5/2 F. Chong -- QC 31

32 Space Savings Shor s p=1-6 Grover s ISCA 5/2 F. Chong -- QC 32 p=1-6

33 Time Savings Shor s p=1-6 Grover s ISCA 5/2 F. Chong -- QC 33 p=1-6

34 Teleportation Sender a> 1 qubit 2 classical bits eceiver a> Destroy source qubit and recreates at target Pre-communicate half of a CAT state ISCA 5/2 F. Chong -- QC 34

35 CAT State > > > + 1 > > 2 > + 11 > 2 Two bits are in lockstep both or both 1 Named for Shrodinger s cat Also EP pair for Einstein, Podolsky, osen ISCA 5/2 F. Chong -- QC 35

36 Teleportation Circuit source a> EP Pair (CAT) b> target c> CNOT X Z a> Source generates bc> EP pair Pre-communicate c> to target with retry Classical communication to set value Can be used to convert between codes! ISCA 5/2 F. Chong -- QC 36

37 Memory ierarchy Processor qubits Cache lines Memory pages teleport teleport [[343,1,15]] [[245,1,15]] [[392,3,15 More physical qubits Less complex operations Greater de More compl code ISCA 5/2 F. Chong -- QC 37

38 ISCA 5/2 F. Chong -- QC 38 Quantum Fourier Transform

39 Blocked QFT ISCA 5/2 F. Chong -- QC 39

40 Summary Quantum computers can be built Error correction allows scalability Tremendous potential for some applications ISCA 5/2 F. Chong -- QC 4

41 est of the afternoon Isaac Chuang - Quantum devices ow things really work Mark Oskin Quantum architectures What architects can do ISCA 5/2 F. Chong -- QC 41

Bits Superposition Quantum Parallelism

Bits Superposition Quantum Parallelism 7-Qubit Quantum Computer Typical Ion Oscillations in a Trap Bits Qubits vs Each qubit can represent both a or at the same time! This phenomenon is known as Superposition. It leads to Quantum Parallelism

More information

0.1 Phase Estimation Technique

0.1 Phase Estimation Technique Phase Estimation In this lecture we will describe Kitaev s phase estimation algorithm, and use it to obtain an alternate derivation of a quantum factoring algorithm We will also use this technique to design

More information

Introduction to Quantum Computing

Introduction to Quantum Computing Introduction to Quantum Computing Javier Enciso [email protected] Joint Advanced Student School 009 Technische Universität München April, 009 Abstract In this paper, a gentle introduction to Quantum Computing

More information

Factoring by Quantum Computers

Factoring by Quantum Computers Factoring by Quantum Computers Ragesh Jaiswal University of California, San Diego A Quantum computer is a device that uses uantum phenomenon to perform a computation. A classical system follows a single

More information

Quantum Computing. Robert Sizemore

Quantum Computing. Robert Sizemore Quantum Computing Robert Sizemore Outline Introduction: What is quantum computing? What use is quantum computing? Overview of Quantum Systems Dirac notation & wave functions Two level systems Classical

More information

Shor s algorithm and secret sharing

Shor s algorithm and secret sharing Shor s algorithm and secret sharing Libor Nentvich: QC 23 April 2007: Shor s algorithm and secret sharing 1/41 Goals: 1 To explain why the factoring is important. 2 To describe the oldest and most successful

More information

Quantum Algorithms in NMR Experiments. 25 th May 2012 Ling LIN & Michael Loretz

Quantum Algorithms in NMR Experiments. 25 th May 2012 Ling LIN & Michael Loretz Quantum Algorithms in NMR Experiments 25 th May 2012 Ling LIN & Michael Loretz Contents 1. Introduction 2. Shor s algorithm 3. NMR quantum computer Nuclear spin qubits in a molecule NMR principles 4. Implementing

More information

Designing Scalable Quantum Computer Architectures: Layout and Initialization

Designing Scalable Quantum Computer Architectures: Layout and Initialization Designing Scalable Quantum Computer Architectures: Layout and Initialization By DEAN ELBERT COPSEY B.S. (University of California, Davis) 1986 M.S. (University of California, Davis) 1996 DISSERTATION Submitted

More information

Quantum computing in practice

Quantum computing in practice Quantum computing in practice & applications to cryptography Renaud Lifchitz OPPIDA NoSuchCon, November 19-21, 2014 Renaud Lifchitz NoSuchCon, November 19-21, 2014 1 / 68 Speaker s bio French senior security

More information

Kandidatexamen. A Review of Freely Available Quantum Computer Simulation Software Johan Brandhorst-Satzkorn. LiTH-MAT-EX 2012/07 SE

Kandidatexamen. A Review of Freely Available Quantum Computer Simulation Software Johan Brandhorst-Satzkorn. LiTH-MAT-EX 2012/07 SE Kandidatexamen A Review of Freely Available Quantum Computer Simulation Software Johan Brandhorst-Satzkorn LiTH-MAT-EX 2012/07 SE A Review of Freely Available Quantum Computer Simulation Software Department

More information

Quantum Computing: Lecture Notes. Ronald de Wolf

Quantum Computing: Lecture Notes. Ronald de Wolf Quantum Computing: Lecture Notes Ronald de Wolf Preface These lecture notes were formed in small chunks during my Quantum computing course at the University of Amsterdam, Feb-May 2011, and compiled into

More information

Quantum Computing Lecture 7. Quantum Factoring. Anuj Dawar

Quantum Computing Lecture 7. Quantum Factoring. Anuj Dawar Quantum Computing Lecture 7 Quantum Factoring Anuj Dawar Quantum Factoring A polynomial time quantum algorithm for factoring numbers was published by Peter Shor in 1994. polynomial time here means that

More information

Quantum Computers. And How Does Nature Compute? Kenneth W. Regan 1 University at Buffalo (SUNY) 21 May, 2015. Quantum Computers

Quantum Computers. And How Does Nature Compute? Kenneth W. Regan 1 University at Buffalo (SUNY) 21 May, 2015. Quantum Computers Quantum Computers And How Does Nature Compute? Kenneth W. Regan 1 University at Buffalo (SUNY) 21 May, 2015 1 Includes joint work with Amlan Chakrabarti, U. Calcutta If you were designing Nature, how would

More information

Keywords Quantum logic gates, Quantum computing, Logic gate, Quantum computer

Keywords Quantum logic gates, Quantum computing, Logic gate, Quantum computer Volume 3 Issue 10 October 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Introduction

More information

Lecture 1 Version: 14/08/28. Frontiers of Condensed Matter San Sebastian, Aug. 28-30, 2014. Dr. Leo DiCarlo [email protected] dicarlolab.tudelft.

Lecture 1 Version: 14/08/28. Frontiers of Condensed Matter San Sebastian, Aug. 28-30, 2014. Dr. Leo DiCarlo l.dicarlo@tudelft.nl dicarlolab.tudelft. Introduction to quantum computing (with superconducting circuits) Lecture 1 Version: 14/08/28 Frontiers of Condensed Matter San Sebastian, Aug. 28-30, 2014 Dr. Leo DiCarlo [email protected] dicarlolab.tudelft.nl

More information

QUANTUM INFORMATION, COMPUTATION AND FUNDAMENTAL LIMITATION

QUANTUM INFORMATION, COMPUTATION AND FUNDAMENTAL LIMITATION Arun K. Pati Theoretical Physics Division QUANTUM INFORMATION, COMPUTATION AND FUNDAMENTAL LIMITATION Introduction Quantum information theory is a marriage between two scientific pillars of the twentieth

More information

What Has Quantum Mechanics to Do With Factoring? Things I wish they had told me about Peter Shor s algorithm

What Has Quantum Mechanics to Do With Factoring? Things I wish they had told me about Peter Shor s algorithm What Has Quantum Mechanics to Do With Factoring? Things I wish they had told me about Peter Shor s algorithm 1 Question: What has quantum mechanics to do with factoring? Answer: Nothing! 2 Question: What

More information

Quantum Algorithms Lecture Notes Summer School on Theory and Technology in Quantum Information, Communication, Computation and Cryptography

Quantum Algorithms Lecture Notes Summer School on Theory and Technology in Quantum Information, Communication, Computation and Cryptography Quantum Algorithms Lecture Notes Summer School on Theory and Technology in Quantum Information, Communication, Computation and Cryptography Julia Kempe CNRS & LRI, Université de Paris-Sud 9405 Orsay, France

More information

Introduction to computer science

Introduction to computer science Introduction to computer science Michael A. Nielsen University of Queensland Goals: 1. Introduce the notion of the computational complexity of a problem, and define the major computational complexity classes.

More information

Quantum Computing. Robert Senser, PhD. CSC 5446 Presentation Spring 2015. http://cse.ucdenver.edu/~rsenser/ Version 2014.1

Quantum Computing. Robert Senser, PhD. CSC 5446 Presentation Spring 2015. http://cse.ucdenver.edu/~rsenser/ Version 2014.1 Quantum Computing Robert Senser, PhD http://cse.ucdenver.edu/~rsenser/ CSC 5446 Presentation Spring 2015 Version 2014.1 Quantum Computing Overview of Presentation Topics Terms: Measurement Qubit Superposition

More information

ECE 842 Report Implementation of Elliptic Curve Cryptography

ECE 842 Report Implementation of Elliptic Curve Cryptography ECE 842 Report Implementation of Elliptic Curve Cryptography Wei-Yang Lin December 15, 2004 Abstract The aim of this report is to illustrate the issues in implementing a practical elliptic curve cryptographic

More information

Quantum Computation: a Tutorial

Quantum Computation: a Tutorial Quantum Computation: a Tutorial 1 Quantum Computation: a Tutorial Benoît Valiron University of Pennsylvania, Department of Computer and Information Science, 3330 Walnut Street, Philadelphia, Pennsylvania,

More information

230483 - QOT - Quantum Optical Technologies

230483 - QOT - Quantum Optical Technologies Coordinating unit: Teaching unit: Academic year: Degree: ECTS credits: 2015 230 - ETSETB - Barcelona School of Telecommunications Engineering 739 - TSC - Department of Signal Theory and Communications

More information

arxiv:quant-ph/9809016 v2 19 Jan 2000

arxiv:quant-ph/9809016 v2 19 Jan 2000 An Introduction to Quantum Computing for Non-Physicists arxiv:quant-ph/9809016 v 19 Jan 000 Eleanor Rieffel FX Palo Alto Labratory and Wolfgang Polak Consultant FX Palo Alto Laboratory, 3400 Hillview Avenue,

More information

Quantum Computers vs. Computers Security. @veorq http://aumasson.jp

Quantum Computers vs. Computers Security. @veorq http://aumasson.jp Quantum Computers vs. Computers Security @veorq http://aumasson.jp Schrodinger equation Entanglement Bell states EPR pairs Wave functions Uncertainty principle Tensor products Unitary matrices Hilbert

More information

QUANTUM COMPUTERS AND CRYPTOGRAPHY. Mark Zhandry Stanford University

QUANTUM COMPUTERS AND CRYPTOGRAPHY. Mark Zhandry Stanford University QUANTUM COMPUTERS AND CRYPTOGRAPHY Mark Zhandry Stanford University Classical Encryption pk m c = E(pk,m) sk m = D(sk,c) m??? Quantum Computing Attack pk m aka Post-quantum Crypto c = E(pk,m) sk m = D(sk,c)

More information

Using quantum computing to realize the Fourier Transform in computer vision applications

Using quantum computing to realize the Fourier Transform in computer vision applications Using quantum computing to realize the Fourier Transorm in computer vision applications Renato O. Violin and José H. Saito Computing Department Federal University o São Carlos {renato_violin, saito }@dc.uscar.br

More information

Quantum Systems for Information Technology

Quantum Systems for Information Technology Lecture Quantum Systems for Information Technology fall term (HS) 2010 Lecturer: e Andreas Wallraff office: HPF D 8/9, ETH Hoenggerberg email: [email protected] What is this lecture about? Quantum

More information

A Recent Improvements in Quantum Model and Counter Measures in Quantum Computing

A Recent Improvements in Quantum Model and Counter Measures in Quantum Computing A Recent Improvements in Quantum Model and Counter Measures in Quantum Computing J.Senthil Murugan 1, V.Parthasarathy 2, S.Sathya 3, M.Anand 4 Assistant Professor, VelTech HighTech Dr.Rangarajan Dr.Sakunthala

More information

Quantum Computability and Complexity and the Limits of Quantum Computation

Quantum Computability and Complexity and the Limits of Quantum Computation Quantum Computability and Complexity and the Limits of Quantum Computation Eric Benjamin, Kenny Huang, Amir Kamil, Jimmy Kittiyachavalit University of California, Berkeley December 7, 2003 This paper will

More information

A Beginning in the Reversible Logic Synthesis of Sequential Circuits

A Beginning in the Reversible Logic Synthesis of Sequential Circuits A Beginning in the Reversible Logic Synthesis of Sequential s Himanshu Thapliyal and M.B Srinivas Centre for VLSI and Embedded System Technologies International Institute of Information Technology, Hyderabad,

More information

arxiv:quant-ph/9508027v2 25 Jan 1996

arxiv:quant-ph/9508027v2 25 Jan 1996 Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer arxiv:quant-ph/9508027v2 25 Jan 1996 Peter W. Shor Abstract A digital computer is generally believed to

More information

Simulated Quantum Annealer

Simulated Quantum Annealer Simulated Quantum Annealer Department of CIS - Senior Design 013-014 Danica Bassman [email protected] University of Pennsylvania Philadelphia, PA ABSTRACT Quantum computing requires qubits, which

More information

Fast Fourier Transform: Theory and Algorithms

Fast Fourier Transform: Theory and Algorithms Fast Fourier Transform: Theory and Algorithms Lecture Vladimir Stojanović 6.973 Communication System Design Spring 006 Massachusetts Institute of Technology Discrete Fourier Transform A review Definition

More information

Techniques algébriques en calcul quantique

Techniques algébriques en calcul quantique Techniques algébriques en calcul quantique E. Jeandel Laboratoire de l Informatique du Parallélisme LIP, ENS Lyon, CNRS, INRIA, UCB Lyon 8 Avril 25 E. Jeandel, LIP, ENS Lyon Techniques algébriques en calcul

More information

Quantum Computing with NMR

Quantum Computing with NMR Quantum Computing with NMR Sabine Keiber, Martin Krauÿ June 3, 2009 Sabine Keiber, Martin Krauÿ Quantum Computing with NMR June 3, 2009 1 / 46 1 A Short Introduction to NMR 2 Di Vincenzo's Requirements

More information

Factoring Algorithms Based on NMR Quantum

Factoring Algorithms Based on NMR Quantum 1295 2002 69-74 69 Factoring Algorithms Based on NMR Quantum Computers (Noboru Kunihiro) (Shigeru Yamashita) NTT NTT Abstract No polynomial time algorithms have been proposed for the factoring and discrete

More information

Lecture 13: Factoring Integers

Lecture 13: Factoring Integers CS 880: Quantum Information Processing 0/4/0 Lecture 3: Factoring Integers Instructor: Dieter van Melkebeek Scribe: Mark Wellons In this lecture, we review order finding and use this to develop a method

More information

CAs and Turing Machines. The Basis for Universal Computation

CAs and Turing Machines. The Basis for Universal Computation CAs and Turing Machines The Basis for Universal Computation What We Mean By Universal When we claim universal computation we mean that the CA is capable of calculating anything that could possibly be calculated*.

More information

"in recognition of the services he rendered to the advancement of Physics by his discovery of energy quanta". h is the Planck constant he called it

in recognition of the services he rendered to the advancement of Physics by his discovery of energy quanta. h is the Planck constant he called it 1 2 "in recognition of the services he rendered to the advancement of Physics by his discovery of energy quanta". h is the Planck constant he called it the quantum of action 3 Newton believed in the corpuscular

More information

SIMULATING QUANTUM COMPUTING: QUANTUM EXPRESS

SIMULATING QUANTUM COMPUTING: QUANTUM EXPRESS Proceedings of the 2003 Winter Simulation Conference S. Chick, P. J. Sánchez, D. Ferrin, and D. J. Morrice, eds. SIMULATING QUANTUM COMPUTING: QUANTUM EXPRESS Kareem S. Aggour Renee Guhde Melvin K. Simmons

More information

A New Reversible TSG Gate and Its Application For Designing Efficient Adder Circuits

A New Reversible TSG Gate and Its Application For Designing Efficient Adder Circuits A New Reversible TSG Gate and Its Application For Designing Efficient Adder s Himanshu Thapliyal Center for VLSI and Embedded System Technologies International Institute of Information Technology Hyderabad-500019,

More information

Quantum Computing and Grover s Algorithm

Quantum Computing and Grover s Algorithm Quantum Computing and Grover s Algorithm Matthew Hayward January 14, 2015 1 Contents 1 Motivation for Study of Quantum Computing 3 1.1 A Killer App for Quantum Computing.............. 3 2 The Quantum Computer

More information

2 Elements of classical computer science

2 Elements of classical computer science 2 Elements of classical computer science 11 Good references for the material of this section are [3], Chap. 3, [5], Secs. 2 and 3, [7], Sec. 6.1, and [11] as a nice readable account of complexit with some

More information

How To Solve An Npa-Complete Problems With Quantum Computing And Chaotic Dynamics

How To Solve An Npa-Complete Problems With Quantum Computing And Chaotic Dynamics CDMTCS Research Report Series A New Quantum Algorithm for NP-complete Problems Masanori Ohya Igor V. Volovich Science University of Tokyo Steklov Mathematical Institute CDMTCS-194 September 00 Centre for

More information

Chapter 12: Multiprocessor Architectures. Lesson 01: Performance characteristics of Multiprocessor Architectures and Speedup

Chapter 12: Multiprocessor Architectures. Lesson 01: Performance characteristics of Multiprocessor Architectures and Speedup Chapter 12: Multiprocessor Architectures Lesson 01: Performance characteristics of Multiprocessor Architectures and Speedup Objective Be familiar with basic multiprocessor architectures and be able to

More information

Quantum and Non-deterministic computers facing NP-completeness

Quantum and Non-deterministic computers facing NP-completeness Quantum and Non-deterministic computers facing NP-completeness Thibaut University of Vienna Dept. of Business Administration Austria Vienna January 29th, 2013 Some pictures come from Wikipedia Introduction

More information

Quantum Network Coding

Quantum Network Coding Salah A. Aly Department of Computer Science Texas A& M University Quantum Computing Seminar April 26, 2006 Network coding example In this butterfly network, there is a source S 1 and two receivers R 1

More information

Introduction to Quantum Computing

Introduction to Quantum Computing Introduction to Quantum Computing Frédéric Magniez LIAFA & PCQC, Université Paris Diderot The genesis 2 Copenhagen School (Bohr, Heisenberg, ) - The state of a quantum particule is only fixed after a measurement

More information

Sensors & Transducers 2015 by IFSA Publishing, S. L. http://www.sensorsportal.com

Sensors & Transducers 2015 by IFSA Publishing, S. L. http://www.sensorsportal.com Sensors & Transducers 2015 by IFSA Publishing, S. L. http://www.sensorsportal.com A Dynamic Deployment Policy of Slave Controllers for Software Defined Network Yongqiang Yang and Gang Xu College of Computer

More information

An Extension to DNA Based Fredkin Gate Circuits: Design of Reversible Sequential Circuits using Fredkin Gates

An Extension to DNA Based Fredkin Gate Circuits: Design of Reversible Sequential Circuits using Fredkin Gates An Extension to DNA Based Fredkin Gate Circuits: Design of Reversible Sequential Circuits using Fredkin Gates Himanshu Thapliyal and M.B Srinivas ([email protected], [email protected]) Center

More information

Secure Network Communication Part II II Public Key Cryptography. Public Key Cryptography

Secure Network Communication Part II II Public Key Cryptography. Public Key Cryptography Kommunikationssysteme (KSy) - Block 8 Secure Network Communication Part II II Public Key Cryptography Dr. Andreas Steffen 2000-2001 A. Steffen, 28.03.2001, KSy_RSA.ppt 1 Secure Key Distribution Problem

More information

Nanoscience Course Descriptions

Nanoscience Course Descriptions Nanoscience Course Descriptions NANO*1000 Introduction to Nanoscience This course introduces students to the emerging field of nanoscience. Its representation in popular culture and journalism will be

More information

α α λ α = = λ λ α ψ = = α α α λ λ ψ α = + β = > θ θ β > β β θ θ θ β θ β γ θ β = γ θ > β > γ θ β γ = θ β = θ β = θ β = β θ = β β θ = = = β β θ = + α α α α α = = λ λ λ λ λ λ λ = λ λ α α α α λ ψ + α =

More information

Network Security Technology Network Management

Network Security Technology Network Management COMPUTER NETWORKS Network Security Technology Network Management Source Encryption E(K,P) Decryption D(K,C) Destination The author of these slides is Dr. Mark Pullen of George Mason University. Permission

More information

Lecture 13 - Basic Number Theory.

Lecture 13 - Basic Number Theory. Lecture 13 - Basic Number Theory. Boaz Barak March 22, 2010 Divisibility and primes Unless mentioned otherwise throughout this lecture all numbers are non-negative integers. We say that A divides B, denoted

More information

Cryptography Lecture 8. Digital signatures, hash functions

Cryptography Lecture 8. Digital signatures, hash functions Cryptography Lecture 8 Digital signatures, hash functions A Message Authentication Code is what you get from symmetric cryptography A MAC is used to prevent Eve from creating a new message and inserting

More information

Chapter 6 Quantum Computing Based Software Testing Strategy (QCSTS)

Chapter 6 Quantum Computing Based Software Testing Strategy (QCSTS) Chapter 6 Quantum Computing Based Software Testing Strategy (QCSTS) 6.1 Introduction Software testing is a dual purpose process that reveals defects and is used to evaluate quality attributes of the software,

More information

The Limits of Adiabatic Quantum Computation

The Limits of Adiabatic Quantum Computation The Limits of Adiabatic Quantum Computation Alper Sarikaya June 11, 2009 Presentation of work given on: Thesis and Presentation approved by: Date: Contents Abstract ii 1 Introduction to Quantum Computation

More information

6.080/6.089 GITCS Feb 12, 2008. Lecture 3

6.080/6.089 GITCS Feb 12, 2008. Lecture 3 6.8/6.89 GITCS Feb 2, 28 Lecturer: Scott Aaronson Lecture 3 Scribe: Adam Rogal Administrivia. Scribe notes The purpose of scribe notes is to transcribe our lectures. Although I have formal notes of my

More information

Fault Modeling. Why model faults? Some real defects in VLSI and PCB Common fault models Stuck-at faults. Transistor faults Summary

Fault Modeling. Why model faults? Some real defects in VLSI and PCB Common fault models Stuck-at faults. Transistor faults Summary Fault Modeling Why model faults? Some real defects in VLSI and PCB Common fault models Stuck-at faults Single stuck-at faults Fault equivalence Fault dominance and checkpoint theorem Classes of stuck-at

More information

Lecture 9 - Message Authentication Codes

Lecture 9 - Message Authentication Codes Lecture 9 - Message Authentication Codes Boaz Barak March 1, 2010 Reading: Boneh-Shoup chapter 6, Sections 9.1 9.3. Data integrity Until now we ve only been interested in protecting secrecy of data. However,

More information

Lecture 3: Linear methods for classification

Lecture 3: Linear methods for classification Lecture 3: Linear methods for classification Rafael A. Irizarry and Hector Corrada Bravo February, 2010 Today we describe four specific algorithms useful for classification problems: linear regression,

More information

Chapter 4 Register Transfer and Microoperations. Section 4.1 Register Transfer Language

Chapter 4 Register Transfer and Microoperations. Section 4.1 Register Transfer Language Chapter 4 Register Transfer and Microoperations Section 4.1 Register Transfer Language Digital systems are composed of modules that are constructed from digital components, such as registers, decoders,

More information

Synchronization. Todd C. Mowry CS 740 November 24, 1998. Topics. Locks Barriers

Synchronization. Todd C. Mowry CS 740 November 24, 1998. Topics. Locks Barriers Synchronization Todd C. Mowry CS 740 November 24, 1998 Topics Locks Barriers Types of Synchronization Mutual Exclusion Locks Event Synchronization Global or group-based (barriers) Point-to-point tightly

More information

ETEC 2301 Programmable Logic Devices. Chapter 10 Counters. Shawnee State University Department of Industrial and Engineering Technologies

ETEC 2301 Programmable Logic Devices. Chapter 10 Counters. Shawnee State University Department of Industrial and Engineering Technologies ETEC 2301 Programmable Logic Devices Chapter 10 Counters Shawnee State University Department of Industrial and Engineering Technologies Copyright 2007 by Janna B. Gallaher Asynchronous Counter Operation

More information

arxiv:quant-ph/9607009v1 11 Jul 1996

arxiv:quant-ph/9607009v1 11 Jul 1996 Distillability of Inseparable Quantum Systems Micha l Horodecki Department of Mathematics and Physics University of Gdańsk, 80 952 Gdańsk, Poland arxiv:quant-ph/9607009v1 11 Jul 1996 Pawe l Horodecki Faculty

More information

Entanglement: The Holy Grail of High-Speed Design

Entanglement: The Holy Grail of High-Speed Design by Barry Olney column BEYOND DESIGN Entanglement: The Holy Grail of High-Speed Design While high-speed SERDES serial communications seems to currently be at the cutting edge of technology, maybe it will

More information

CHAPTER 3 Boolean Algebra and Digital Logic

CHAPTER 3 Boolean Algebra and Digital Logic CHAPTER 3 Boolean Algebra and Digital Logic 3.1 Introduction 121 3.2 Boolean Algebra 122 3.2.1 Boolean Expressions 123 3.2.2 Boolean Identities 124 3.2.3 Simplification of Boolean Expressions 126 3.2.4

More information

INTRODUCTION TO DIGITAL SYSTEMS. IMPLEMENTATION: MODULES (ICs) AND NETWORKS IMPLEMENTATION OF ALGORITHMS IN HARDWARE

INTRODUCTION TO DIGITAL SYSTEMS. IMPLEMENTATION: MODULES (ICs) AND NETWORKS IMPLEMENTATION OF ALGORITHMS IN HARDWARE INTRODUCTION TO DIGITAL SYSTEMS 1 DESCRIPTION AND DESIGN OF DIGITAL SYSTEMS FORMAL BASIS: SWITCHING ALGEBRA IMPLEMENTATION: MODULES (ICs) AND NETWORKS IMPLEMENTATION OF ALGORITHMS IN HARDWARE COURSE EMPHASIS:

More information

Open Problems in Quantum Information Processing. John Watrous Department of Computer Science University of Calgary

Open Problems in Quantum Information Processing. John Watrous Department of Computer Science University of Calgary Open Problems in Quantum Information Processing John Watrous Department of Computer Science University of Calgary #1 Open Problem Find new quantum algorithms. Existing algorithms: Shor s Algorithm (+ extensions)

More information

Chapter 1. Computation theory

Chapter 1. Computation theory Chapter 1. Computation theory In this chapter we will describe computation logic for the machines. This topic is a wide interdisciplinary field, so that the students can work in an interdisciplinary context.

More information

Computer Security: Principles and Practice

Computer Security: Principles and Practice Computer Security: Principles and Practice Chapter 20 Public-Key Cryptography and Message Authentication First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Public-Key Cryptography

More information

Factorization Methods: Very Quick Overview

Factorization Methods: Very Quick Overview Factorization Methods: Very Quick Overview Yuval Filmus October 17, 2012 1 Introduction In this lecture we introduce modern factorization methods. We will assume several facts from analytic number theory.

More information

Chapter 3. if 2 a i then location: = i. Page 40

Chapter 3. if 2 a i then location: = i. Page 40 Chapter 3 1. Describe an algorithm that takes a list of n integers a 1,a 2,,a n and finds the number of integers each greater than five in the list. Ans: procedure greaterthanfive(a 1,,a n : integers)

More information

A Layered Software Architecture for Quantum Computing Design Tools

A Layered Software Architecture for Quantum Computing Design Tools C O V E R F E A T U R E A Layered Software Architecture for Quantum Computing Design Tools Krysta M. Svore, Alfred V. Aho Columbia University Andrew W. Cross, Isaac Chuang Massachusetts Institute of Technology

More information

MTAT.07.003 Cryptology II. Digital Signatures. Sven Laur University of Tartu

MTAT.07.003 Cryptology II. Digital Signatures. Sven Laur University of Tartu MTAT.07.003 Cryptology II Digital Signatures Sven Laur University of Tartu Formal Syntax Digital signature scheme pk (sk, pk) Gen (m, s) (m,s) m M 0 s Sign sk (m) Ver pk (m, s)? = 1 To establish electronic

More information

ASYNCHRONOUS COUNTERS

ASYNCHRONOUS COUNTERS LB no.. SYNCHONOUS COUNTES. Introduction Counters are sequential logic circuits that counts the pulses applied at their clock input. They usually have 4 bits, delivering at the outputs the corresponding

More information

Quantum Computing in Finance. Colin P. Williams D- Wave Systems Inc.

Quantum Computing in Finance. Colin P. Williams D- Wave Systems Inc. Quantum Computing in Finance Colin P. Williams D- Wave Systems Inc. Overview Company background Quantum compudng & why it majers Product (D- Wave 2X TM ) Performance Programming ApplicaDons 2015 D- Wave

More information

Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket

Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket IT 4823 Information Security Administration Public Key Encryption Revisited April 5 Notice: This session is being recorded. Lecture slides prepared by Dr Lawrie Brown for Computer Security: Principles

More information