-
1
-
-
0037239692
-
From cbits to qbits: Teaching computer scientists quantum mechanics
-
N. D. Mermin, "From cbits to qbits: Teaching computer scientists quantum mechanics," Am. J. Phys. 71, 23-30 (2003).
-
(2003)
Am. J. Phys.
, vol.71
, pp. 23-30
-
-
Mermin, N.D.1
-
2
-
-
0035638196
-
From Schrodinger's equation to the quantum search algorithm
-
L. K. Grover, "From Schrodinger's equation to the quantum search algorithm," Am. J. Phys. 69, 769-777 (2001).
-
(2001)
Am. J. Phys.
, vol.69
, pp. 769-777
-
-
Grover, L.K.1
-
3
-
-
85115374351
-
Algorithms for quantum computation: Discrete logarithms and factoring
-
edited by S. Goldwasser IEEE Computer Society, Los Alamitos, CA
-
P. W. Shor, "Algorithms for quantum computation: Discrete logarithms and factoring," in Proceedings of the 35th Annual Symposium on the Foundations of Computer Science, edited by S. Goldwasser (IEEE Computer Society, Los Alamitos, CA, 1994), pp. 124-134.
-
(1994)
Proceedings of the 35th Annual Symposium on the Foundations of Computer Science
, pp. 124-134
-
-
Shor, P.W.1
-
4
-
-
0142051871
-
-
provides an expanded version of Shor's original paper
-
P. W. Shor, SIAM J. Comput. 26, 1484-1509 (1997) provides an expanded version of Shor's original paper.
-
(1997)
SIAM J. Comput.
, vol.26
, pp. 1484-1509
-
-
Shor, P.W.1
-
6
-
-
0030520263
-
Quantum computation and Shor's factoring algorithm
-
A. Ekert and R. Josza, "Quantum computation and Shor's factoring algorithm," Rev. Mod. Phys. 68, 733-753 (1996).
-
(1996)
Rev. Mod. Phys.
, vol.68
, pp. 733-753
-
-
Ekert, A.1
Josza, R.2
-
11
-
-
84860953553
-
-
〈arXiv.org/archive/quant-ph〉. See also
-
See, for example, 〈arXiv.org/archive/quant-ph〉. See also 〈www.eg.bucknell.edu/~dcollins/research/qcliterature.html〉.
-
-
-
-
12
-
-
33646637191
-
-
An exposition (suitable for the nonspecialist readers of this journal) of what is now termed the RSA public key system can be found in Ref. 7, pp. 122-127
-
An exposition (suitable for the nonspecialist readers of this journal) of what is now termed the RSA public key system can be found in Ref. 7, pp. 122-127.
-
-
-
-
13
-
-
84944878354
-
-
CRC, Boca Raton, FL, Chap. 8
-
An important reference, probably useful to cryptography specialists only, is A. Menezes, P. van Oorschot, and S. Vanstone, Handbook of Applied Cryptography (CRC, Boca Raton, FL, 1996), Chap. 8.
-
(1996)
Handbook of Applied Cryptography
-
-
Menezes, A.1
Van Oorschot, P.2
Vanstone, S.3
-
16
-
-
0003727003
-
-
Scribner, New York, For the definitions adopted here, see
-
D. Kahn, The Codebreakers: The Story of Secret Writing (Scribner, New York, 1996). For the definitions adopted here, see pp. xv-xviii and 989.
-
(1996)
The Codebreakers: The Story of Secret Writing
-
-
Kahn, D.1
-
17
-
-
0004034591
-
-
Doubleday, New York, especially Chaps. 6 and 7
-
S. Singh, The Code Book (Doubleday, New York, 1999), especially Chaps. 6 and 7.
-
(1999)
The Code Book
-
-
Singh, S.1
-
18
-
-
0036013605
-
Quantum cryptography
-
pp. 147-148, and Ref. 16, pp. 268-273
-
N. Gisin, Grégoire Ribordy, Wolfgang Tittel, and Hugo Zbinden, "Quantum cryptography," Rev. Mod. Phys. 74, 145-195 (2002), pp. 147-148, and Ref. 16, pp. 268-273.
-
(2002)
Rev. Mod. Phys.
, vol.74
, pp. 145-195
-
-
Gisin, N.1
Ribordy, G.2
Tittel, W.3
Zbinden, H.4
-
19
-
-
33646642120
-
-
Reference 15, pp. 71-88
-
Reference 15, pp. 71-88.
-
-
-
-
20
-
-
33646651505
-
-
Reference 15, pp. 93-105
-
Reference 15, pp. 93-105.
-
-
-
-
21
-
-
33646646527
-
The gold-bug
-
published in 1843. See, for example, Doubleday, New York
-
"The Gold-Bug," published in 1843. See, for example, Complete Stories and Poems of Edgar Allan Poe (Doubleday, New York, 1966), pp. 70 and 819.
-
(1966)
Complete Stories and Poems of Edgar Allan Poe
, pp. 70
-
-
-
22
-
-
33646644214
-
The adventure of the dancing men
-
See, for example, Doubleday, New York
-
"The Adventure of the Dancing Men." See, for example, The Complete Sherlock Holmes (Doubleday, New York, 1966), p. 593.
-
(1966)
The Complete Sherlock Holmes
, pp. 593
-
-
-
23
-
-
33646662688
-
-
Reference 16, pp. 20-25, and Ref. 15, pp. 99-105, provide detailed illustrative cryptanalyses of such cryptograms
-
Reference 16, pp. 20-25, and Ref. 15, pp. 99-105, provide detailed illustrative cryptanalyses of such cryptograms.
-
-
-
-
24
-
-
33646647874
-
-
Reference 16, Chap. 4, describes the Enigma machine and recounts the remarkable story of how its cryptograms were cryptanalyzed
-
Reference 16, Chap. 4, describes the Enigma machine and recounts the remarkable story of how its cryptograms were cryptanalyzed.
-
-
-
-
25
-
-
0003588996
-
-
Simon and Schuster, New York, Chap. 4
-
See also A. Hodges, Alan Turing: The Enigma (Simon and Schuster, New York, 1983), Chap. 4.
-
(1983)
Alan Turing: The Enigma
-
-
Hodges, A.1
-
26
-
-
33646656883
-
-
note
-
Actually it is possible, though intrinsically inconvenient, for Alice and Bob to establish a secure key via conventional communication channels without meeting, as was discovered in 1976; see Ref. 16, pp. 253-267. Secure key distribution also is possible (in theory at least) via "quantum channels," for example, channels that carry pairs of spin 1/2 particles whose spin orientations can be measured by Alice and Bob; see Ref. 14. These secure key distribution schemes are beyond the scope of this paper.
-
-
-
-
27
-
-
33646650759
-
-
I do not pretend that this analogy between cryptographic keys and safes is original. See, for example, Ref. 17
-
I do not pretend that this analogy between cryptographic keys and safes is original. See, for example, Ref. 17.
-
-
-
-
28
-
-
33646640577
-
-
Reference 16, pp. 245-249 and 379
-
Reference 16, pp. 245-249 and 379.
-
-
-
-
29
-
-
84860953554
-
-
especially the link to a decimal-to-ASCII chart
-
ASCII is the acronym for the American Standard Code for Information Interchange. For more information on ASCII, see 〈www.jimprice.com/jimasc. htm〉, especially the link to a decimal-to-ASCII chart.
-
-
-
-
30
-
-
0003461554
-
-
Addison-Wesley, Reading, MA
-
See any textbook on elementary number theory, for example, K. H. Rosen, Elementary Number Theory and its Applications (Addison-Wesley, Reading, MA, 1993), pp. 119-125.
-
(1993)
Elementary Number Theory and Its Applications
, pp. 119-125
-
-
Rosen, K.H.1
-
31
-
-
33646663999
-
-
Reference 12, especially p. 292
-
Reference 12, especially p. 292.
-
-
-
-
33
-
-
33847249399
-
-
See also "TWIRL and RSA key size," 〈www.rsasecurity.com/ rsalabs/node.asp?id=2004〉.
-
TWIRL and RSA Key Size
-
-
-
34
-
-
0011308340
-
-
as updated by Wim van Dam, June
-
A. Ekert, "Quantum cryptoanalysis - Introduction" (as updated by Wim van Dam, June 1999), 〈www.qubit.org/library/intros/cryptana. html〉.
-
(1999)
Quantum Cryptoanalysis - Introduction
-
-
Ekert, A.1
-
35
-
-
33646646916
-
-
Scientific Director Pittsburgh Supercomputing Center, private communication
-
R. Roskies, Scientific Director Pittsburgh Supercomputing Center, private communication.
-
-
-
Roskies, R.1
-
36
-
-
84860951991
-
-
(NASA 4/30/04)
-
"How Old is the Universe?" (NASA 4/30/04) at 〈map.gsfc.nasa.gov/m_uni/uni_ 101age.html〉.
-
How Old Is the Universe?
-
-
-
37
-
-
33646641651
-
-
Reference 9, pp. 164-166
-
Reference 9, pp. 164-166.
-
-
-
-
40
-
-
33646640748
-
-
Reference 35, pp. 242-258
-
Reference 35, pp. 242-258.
-
-
-
-
42
-
-
84860949144
-
-
"RSA-160 is factored!" 〈www.rsasecurity.com/rsalabs/node. asp?id=2097〉.
-
RSA-160 Is Factored!
-
-
-
44
-
-
33646667423
-
-
Reference 35, p. 265
-
Reference 35, p. 265.
-
-
-
-
46
-
-
33646667592
-
-
Reference 7, p. 35
-
Reference 7, p. 35.
-
-
-
-
47
-
-
33646666845
-
It is fairly easy, in practice, to produce large primes. It is, however, very difficult to produce a theoretical justification for the success of the method
-
Springer, New York
-
P. Ribenboim, The New Book of Prime Number Records (Springer, New York, 1995), p. 156, writes: "It is fairly easy, in practice, to produce large primes. It is, however, very difficult to produce a theoretical justification for the success of the method."
-
(1995)
The New Book of Prime Number Records
, pp. 156
-
-
Ribenboim, P.1
-
48
-
-
33646644793
-
Selling primes
-
2N, whereas factoring N to find its prime factors p and q requires computing times subexponential in L (as we have discussed, assuming only classical computers are available)
-
2N, whereas factoring N to find its prime factors p and q requires computing times subexponential in L (as we have discussed, assuming only classical computers are available).
-
(1995)
Math. Mag.
, vol.68
, pp. 175-182
-
-
Ribenboim, P.1
-
49
-
-
33646637591
-
-
note
-
A recent test run demonstrated that even with an RSA key number of 2048 binary bits (that is, an RSA-617) a message consisting of approximately 32 000 ASCII characters could be routinely enciphered and deciphered in times of the order of seconds and at most minutes, respectively, employing merely a 700 MHz desktop computer (hardly a supercomputer). For example, using block sizes of 52 ASCII characters (recall Sec. II C), the encryption and decryption times were 1.46 and 30.3 s, respectively. Sam Scheinman, software engineer consultant, private communication.
-
-
-
-
50
-
-
33646659771
-
-
Reference 28, pp. 278-279
-
Reference 28, pp. 278-279.
-
-
-
-
51
-
-
33646661057
-
-
Reference 35, p. 386
-
Reference 35, p. 386.
-
-
-
-
52
-
-
33646663817
-
-
Reference 42, p. 94
-
Reference 42, p. 94.
-
-
-
-
53
-
-
0001534053
-
Discrete logarithms: The past and the future
-
A. Odlyzko, "Discrete logarithms: The past and the future," Designs, Codes, Cryptogr. 19, 129-145 (2000).
-
(2000)
Designs, Codes, Cryptogr.
, vol.19
, pp. 129-145
-
-
Odlyzko, A.1
-
54
-
-
33646641650
-
-
quant-ph/0401019, cf, especially
-
J. Eisen and M. Wolf, "Quantum computing," quant-ph/0401019, cf, especially, p. 16.
-
Quantum Computing
, pp. 16
-
-
Eisen, J.1
Wolf, M.2
-
55
-
-
33646668713
-
-
See, for example, Ref. 6, Chap. 7
-
See, for example, Ref. 6, Chap. 7.
-
-
-
-
57
-
-
0040577405
-
Quantum computing
-
V. Scarani, "Quantum computing," Am. J. Phys. 66, 956-960 (1998).
-
(1998)
Am. J. Phys.
, vol.66
, pp. 956-960
-
-
Scarani, V.1
-
58
-
-
33646647289
-
-
Reference 52, p. 12
-
Reference 52, p. 12.
-
-
-
-
59
-
-
33646667591
-
-
Reference 1, especially Eq. (35)
-
Reference 1, especially Eq. (35).
-
-
-
-
60
-
-
33646637791
-
-
See, for example, Ref. 6, Chap. 4
-
See, for example, Ref. 6, Chap. 4.
-
-
-
-
61
-
-
33646660558
-
-
Reference 35, p. 7
-
Reference 35, p. 7.
-
-
-
-
62
-
-
33646670049
-
-
Reference 7, especially pp. 136-137
-
Reference 7, especially pp. 136-137.
-
-
-
-
63
-
-
33646670583
-
-
See, for example, Ref. 6, pp. 18-19
-
See, for example, Ref. 6, pp. 18-19.
-
-
-
-
64
-
-
33646645009
-
-
Reference 6, pp. 194-198
-
Reference 6, pp. 194-198.
-
-
-
-
65
-
-
33646642301
-
-
Reference 6, pp. 217-220
-
Reference 6, pp. 217-220.
-
-
-
-
66
-
-
33646655788
-
-
Reference 28, pp. 394-403
-
Reference 28, pp. 394-403.
-
-
-
-
67
-
-
0003766834
-
-
Clarendon, Oxford, Sec. 10.15, for a proof of the theorem
-
See, for example, Ref. 5. These authors refer to G. H. Hardy and E. M. Wright, An Introduction to the Theory of Numbers (Clarendon, Oxford, 1965), Sec. 10.15, for a proof of the theorem.
-
(1965)
An Introduction to the Theory of Numbers
-
-
Hardy, G.H.1
Wright, E.M.2
-
68
-
-
33646643062
-
-
Reference 35, p. 11
-
Reference 35, p. 11.
-
-
-
-
69
-
-
33646657793
-
-
Reference 44, pp. 319-320
-
Reference 44, pp. 319-320.
-
-
-
-
70
-
-
33646663630
-
-
Addison-Wesley, Reading, MA, 3rd ed., and 300 (see Problem 8)
-
D. E. Knuth, The Art of Computer Programming (Addison-Wesley, Reading, MA, 1981), 3rd ed., Vol. 2, pp. 290 and 300 (see Problem 8).
-
(1981)
The Art of Computer Programming
, vol.2
, pp. 290
-
-
Knuth, D.E.1
-
71
-
-
0035924370
-
Experimental realization of Shor's quantum factoring algorithm using nuclear magnetic resonance
-
L. Vandersypen, Matthias Steffen, Gregory Breyta, Costantino S. Yannoni, Mark H. Sherwood, and Isaac L. Chuang, "Experimental realization of Shor's quantum factoring algorithm using nuclear magnetic resonance," Nature (London) 414, 883-887 (2001).
-
(2001)
Nature (London)
, vol.414
, pp. 883-887
-
-
Vandersypen, L.1
Steffen, M.2
Breyta, G.3
Yannoni, C.S.4
Sherwood, M.H.5
Chuang, I.L.6
-
72
-
-
33646666457
-
-
Reference 28, pp. 201-204
-
Reference 28, pp. 201-204.
-
-
-
-
73
-
-
33646669666
-
-
Reference 28, p. 187
-
Reference 28, p. 187;
-
-
-
-
74
-
-
0038661827
-
-
University of Chicago, Chicago, quotes the date of Fermat's Little Theorem
-
L. E. Dickson, Modern Elementary Theory of Numbers (University of Chicago, Chicago, 1939), p. 12, quotes the date of Fermat's Little Theorem.
-
(1939)
Modern Elementary Theory of Numbers
, pp. 12
-
-
Dickson, L.E.1
-
75
-
-
33646660557
-
-
Reference 28, pp. 80-84
-
Reference 28, pp. 80-84.
-
-
-
-
76
-
-
33646636409
-
-
Reference 42, pp. 6-7
-
Reference 42, pp. 6-7.
-
-
-
-
77
-
-
33646639286
-
-
Reference 28, p. 61; Ref. 66, p. 295
-
Reference 28, p. 61; Ref. 66, p. 295.
-
-
-
-
78
-
-
33646645574
-
-
Reference 28, p. 210
-
Reference 28, p. 210.
-
-
-
-
79
-
-
33646637790
-
-
Reference 28, pp. 132-133
-
Reference 28, pp. 132-133.
-
-
-
|