<--- Back to Details
First PageDocument Content
Quantum mechanics / Physics / Theoretical computer science / Quantum information science / Cryptography / Quantum measurement / Statistical randomness / Information theory / Randomness extractor / Randomness / Random number generation / Pseudorandomness
Date: 2018-08-27 05:42:19
Quantum mechanics
Physics
Theoretical computer science
Quantum information science
Cryptography
Quantum measurement
Statistical randomness
Information theory
Randomness extractor
Randomness
Random number generation
Pseudorandomness

Lecture 15, Thurs March 9: Einstein-Certified Randomness Until recently, the Bell inequality was taught because it was historically and conceptually important, not because it had any practical applications. Sure, it esta

Add to Reading List

Source URL: www.scottaaronson.com

Download Document from Source Website

File Size: 170,38 KB

Share Document on Facebook

Similar Documents

Why Simple Hash Functions Work: Exploiting the Entropy in a Data Stream∗ Michael Mitzenmacher† Salil Vadhan‡ School of Engineering & Applied Sciences Harvard University

Why Simple Hash Functions Work: Exploiting the Entropy in a Data Stream∗ Michael Mitzenmacher† Salil Vadhan‡ School of Engineering & Applied Sciences Harvard University

DocID: 1r5sy - View Document

Why Simple Hash Functions Work: Exploiting the Entropy in a Data Stream

Why Simple Hash Functions Work: Exploiting the Entropy in a Data Stream

DocID: 1qUBE - View Document

Lossless Condensers, Unbalanced Expanders, and Extractors Amnon Ta-Shma∗ Christopher Umans†  David Zuckerman‡

Lossless Condensers, Unbalanced Expanders, and Extractors Amnon Ta-Shma∗ Christopher Umans† David Zuckerman‡

DocID: 1qPOU - View Document

Simple Extractors for All Min-Entropies and a New Pseudorandom Generator∗ Ronen Shaltiel † Christopher Umans ‡

Simple Extractors for All Min-Entropies and a New Pseudorandom Generator∗ Ronen Shaltiel † Christopher Umans ‡

DocID: 1qB1P - View Document

LNCSOur Data, Ourselves: Privacy Via Distributed Noise Generation

LNCSOur Data, Ourselves: Privacy Via Distributed Noise Generation

DocID: 1pOcL - View Document