<--- Back to Details
First PageDocument Content
Quantum information science / Theoretical computer science / Quantum mechanics / Quantum computing / Quantum error correction / Quantum logic gate / Controlled NOT gate / GottesmanKnill theorem / Stabilizer code / Superdense coding / Quantum circuit / Quantum teleportation
Date: 2018-08-26 18:24:02
Quantum information science
Theoretical computer science
Quantum mechanics
Quantum computing
Quantum error correction
Quantum logic gate
Controlled NOT gate
GottesmanKnill theorem
Stabilizer code
Superdense coding
Quantum circuit
Quantum teleportation

Lecture 28, Tues May 2: Stabilizer Formalism Today we’ll see a beautiful formalism that was originally invented to describe quantum-error correcting codes, but now plays many different roles in quantum computation. Fir

Add to Reading List

Source URL: www.scottaaronson.com

Download Document from Source Website

File Size: 375,10 KB

Share Document on Facebook

Similar Documents

Lecture 9: Tues Feb 14: Superdense Coding OK, now on to some new stuff! Superdense Coding is the first protocol we’ll see that requires entanglement. Basic information theory (Shannon) tells us that “by sending bits,

Lecture 9: Tues Feb 14: Superdense Coding OK, now on to some new stuff! Superdense Coding is the first protocol we’ll see that requires entanglement. Basic information theory (Shannon) tells us that “by sending bits,

DocID: 1xVqR - View Document

1  Ph 219a/CS 219a Exercises Due: Wednesday 6 November[removed]The price of quantum state encryption

1 Ph 219a/CS 219a Exercises Due: Wednesday 6 November[removed]The price of quantum state encryption

DocID: yYKo - View Document

C/CS/Phys 191  Unitary Evolution, No Cloning Theorem, Superdense Coding[removed]Fall 2003

C/CS/Phys 191 Unitary Evolution, No Cloning Theorem, Superdense Coding[removed]Fall 2003

DocID: y0ti - View Document

Vulnerabilities in Quantum Key Distribution Protocols D. Richard Kuhn [removed] National Institute of Standards and Technology Abstract. Recently proposed quantum key distribution protocols are shown to be vulnerable

Vulnerabilities in Quantum Key Distribution Protocols D. Richard Kuhn [removed] National Institute of Standards and Technology Abstract. Recently proposed quantum key distribution protocols are shown to be vulnerable

DocID: vWyq - View Document

ENTANGLED QUANTUM DYNAMICS Matthew Leifer School of Mathematics

ENTANGLED QUANTUM DYNAMICS Matthew Leifer School of Mathematics

DocID: emHx - View Document