-
1
-
-
34748841353
-
Elementary gates for quantum computation
-
Barenco, A., C. H. Bennett, R. Cleve, D. P. DiVincenzo, N. Margolus, P. Shor, T. Sleator, J. Smolin, and H. Weinfurter, “Elementary gates for quantum computation,” Phys. Rev. A 52, 3457–3467 (1995).
-
(1995)
Phys. Rev. A
, vol.52
, pp. 3457-3467
-
-
Barenco, A.1
Bennett, C.H.2
Cleve, R.3
DiVincenzo, D.P.4
Margolus, N.5
Shor, P.6
Sleator, T.7
Smolin, J.8
Weinfurter, H.9
-
2
-
-
3042642770
-
Deterministic quantum teleportation of atomic qubits
-
Barrett, M. D., J. Chiaverini, T. Schaetz, J. Britton, W. M. Itano, J. D. Jost, E. Knill, C. Langer, D. Leibfried, R. Ozeri, and D. J. Wineland, “Deterministic quantum teleportation of atomic qubits,” Nature 429, 737 (2004).
-
(2004)
Nature
, vol.429
-
-
Barrett, M.D.1
Chiaverini, J.2
Schaetz, T.3
Britton, J.4
Itano, W.M.5
Jost, J.D.6
Knill, E.7
Langer, C.8
Leibfried, D.9
Ozeri, R.10
Wineland, D.J.11
-
3
-
-
74549224309
-
Principles of quantum computation and information
-
(World Scientific, Singapore
-
Benenti, G., G. Casati, and G. Strini, Principles of Quantum Computation and Information, Volume I: Basic Concepts (World Scientific, Singapore, 2004).
-
(2004)
Volume I: Basic Concepts
-
-
Benenti, G.1
Casati, G.2
Strini, G.3
-
4
-
-
0015680909
-
Logical reversibility of computation
-
Bennett, C. H., “Logical reversibility of computation,” IBM J. Res. Develop. 17, 525–532 (1973).
-
(1973)
IBM J. Res. Develop
, vol.17
, pp. 525-532
-
-
Bennett, C.H.1
-
5
-
-
0026626314
-
Experimental quantum cryptography
-
Bennett, C. H., F. Bessette, G. Brassard, L. Salvail, and J. Smolin, “Experimental quantum cryptography,” J. Cryptol. 5, 3–28 (1992).
-
(1992)
J. Cryptol
, vol.5
, pp. 3-28
-
-
Bennett, C.H.1
Bessette, F.2
Brassard, G.3
Salvail, L.4
Smolin, J.5
-
6
-
-
0003259517
-
Quantum cryptography: Public key distribution and coin tossing
-
Bangalore, India, December 1984 (IEEE, New York
-
Bennett, C. H., and G. Brassard, “Quantum cryptography: Public key distribution and coin tossing,” in Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, December 1984 (IEEE, New York, 1984), pp. 175–179.
-
(1984)
Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing
, pp. 175-179
-
-
Bennett, C.H.1
Brassard, G.2
-
7
-
-
0023985539
-
Privacy amplification by public discussion
-
Bennett, C. H., G. Brassard, and J.-M. Robert, “Privacy amplification by public discussion,” SIAM J. Comput. 17, 210–229 (1988).
-
(1988)
SIAM J. Comput
, vol.17
, pp. 210-229
-
-
Bennett, C.H.1
Brassard, G.2
Robert, J.-M.3
-
8
-
-
0002977948
-
Quantum cryptography
-
Bennett, C. H., G. Brassard, and A. K. Ekert, “Quantum cryptography,” Sci. Am. 267(4), 50 (Oct. 1992).
-
(1992)
Sci. Am
, vol.267
, Issue.4
-
-
Bennett, C.H.1
Brassard, G.2
Ekert, A.K.3
-
9
-
-
4243059985
-
Teleporting an unknown quantum state via dual classical and einstein-podolsky-rosen channels
-
Bennett, C. H., G. Brassard, C. Crépeau, R. Jozsa, A. Peres, and W. K. Wootters, “Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels,” Phys. Rev. Lett. 70, 1895–1899 (1993).
-
(1993)
Phys. Rev. Lett
, vol.70
, pp. 1895-1899
-
-
Bennett, C.H.1
Brassard, G.2
Crépeau, C.3
Jozsa, R.4
Peres, A.5
Wootters, W.K.6
-
10
-
-
0029405656
-
Generalized privacy amplification
-
Nov
-
Bennett, C. H., G. Brassard, C. Crépeau, and U. M. Maurer, “Generalized privacy amplification,” IEEE Trans. Inf. Theory, 41(6), 1915–1923 (Nov. 1995).
-
(1995)
IEEE Trans. Inf. Theory
, vol.41
, Issue.6
, pp. 1915-1923
-
-
Bennett, C.H.1
Brassard, G.2
Crépeau, C.3
Maurer, U.M.4
-
11
-
-
4243789313
-
Purification of noisy entanglement and faithful teleportation via noisy channels
-
Bennett, C. H., G. Brassard, S. Popescu, B. Schumacher, J.A. Smolin, and W.K. Wootters, “Purification of noisy entanglement and faithful teleportation via noisy channels,” Phys. Rev. Lett. 76, 722–725 (1996a).
-
(1996)
Phys. Rev. Lett
, vol.76
, pp. 722-725
-
-
Bennett, C.H.1
Brassard, G.2
Popescu, S.3
Schumacher, B.4
Smolin, J.A.5
Wootters, W.K.6
-
12
-
-
4243216277
-
Mixed state entanglement and quantum error correction
-
Bennett, C. H., D.P. DiVincenzo, J.A. Smolin, and W.K. Wootters, “Mixed state entanglement and quantum error correction,” Phys. Rev. A 54, 3824 (1996b).
-
(1996)
Phys. Rev. A
, vol.54
-
-
Bennett, C.H.1
DiVincenzo, D.P.2
Smolin, J.A.3
Wootters, W.K.4
-
13
-
-
0027297425
-
Near shannon limit error-correction coding and decoding: Turbo codes
-
Geneva, Switzerland
-
Berrou, C., A. Glavieux, and P. Thitimijashima, “Near Shannon limit error-correction coding and decoding: Turbo codes,” in Proceedings of the 1993 IEEE International Conference on Communications, Geneva, Switzerland, 1993, pp. 1064–1070.
-
(1993)
Proceedings of the 1993 IEEE International Conference on Communications
, pp. 1064-1070
-
-
Berrou, C.1
Glavieux, A.2
Thitimijashima, P.3
-
14
-
-
0033702887
-
A proof of the security of quantum key distribution
-
ACM Press, New York
-
Biham, E., M. Boyer, P. O. Boykin, T. Mor, and V. Roychowdhury, “A proof of the security of quantum key distribution,” in Proceedings of the 32nd Annual ACM Symposium on Theory of Computing (ACM Press, New York, 2000).
-
(2000)
Proceedings of the 32Nd Annual ACM Symposium on Theory of Computing
-
-
Biham, E.1
Boyer, M.2
Boykin, P.O.3
Mor, T.4
Roychowdhury, V.5
-
15
-
-
0004131973
-
-
Springer, Berlin
-
Bouwmeester, D., A. K. Ekert, and A. Zeilinger, editors, The Physics of Quantum Information: Quantum Cryptography, Quantum Teleportation, Quantum Computation (Springer, Berlin, 2000).
-
(2000)
The Physics of Quantum Information: Quantum Cryptography, Quantum Teleportation, Quantum Computation
-
-
Bouwmeester, D.1
Ekert, A.K.2
Zeilinger, A.3
-
16
-
-
85027496257
-
Secret-key reconciliation by public discussion
-
Brassard, G., and L. Salvail, “Secret-key reconciliation by public discussion,” Lect. Notes Comput. Sci. 765, 410–423 (1993).
-
(1993)
Lect. Notes Comput. Sci
, vol.765
, pp. 410-423
-
-
Brassard, G.1
Salvail, L.2
-
17
-
-
2442492740
-
Quantum repeaters: The role of imperfect local operations in quantum communication
-
Briegel, H.-J., W. Dür, J. I. Cirac, and P. Zoller, “Quantum repeaters: The role of imperfect local operations in quantum communication,” Phys. Rev. Lett. 81, 5932–5935 (1998).
-
(1998)
Phys. Rev. Lett
, vol.81
, pp. 5932-5935
-
-
Briegel, H.-J.1
Dür, W.2
Cirac, J.I.3
Zoller, P.4
-
18
-
-
0033307882
-
On universal and fault-tolerant quantum computing:Anovel basis and a new constructive proof of universality for shors basis
-
IEEE Computer Society Press, Los Alamitos, CA
-
Boykin, P. O., T. Mor, M. Pulver, V. Rowchowdhury, and F. Vatan, “On universal and fault-tolerant quantum computing:Anovel basis and a new constructive proof of universality for Shor’s basis,” in Proceedings of the 40th Annual Symposium on Foundations of Computer Science (FOCS’99) (IEEE Computer Society Press, Los Alamitos, CA, 1999), pp. 486–494.
-
(1999)
Proceedings of the 40Th Annual Symposium on Foundations of Computer Science (FOCS’99)
, pp. 486-494
-
-
Boykin, P.O.1
Mor, T.2
Pulver, M.3
Rowchowdhury, V.4
Vatan, F.5
-
19
-
-
0036997507
-
Practical scheme to share a secret key through a quantum channel with a 27.6% bit error rate
-
Chau, H. F., “Practical scheme to share a secret key through a quantum channel with a 27.6% bit error rate,” Phys. rev. A 66, 60302 (2002).
-
(2002)
Phys. Rev. A
, vol.66
-
-
Chau, H.F.1
-
20
-
-
0022198802
-
The bit extraction problem of t-resilient functions
-
Portland, Oregon
-
Chor, B., O. Goldreich, J. Hastad, J. Friedmann, S. Rudich, and R. Smolensky, “The bit extraction problem of t-resilient functions,” in Proceedings of the 26thIEEESymposium on Foundations of Computer Science, Portland, Oregon, 1985, pp. 396–407.
-
(1985)
Proceedings of the 26Thieeesymposium on Foundations of Computer Science
, pp. 396-407
-
-
Chor, B.1
Goldreich, O.2
Hastad, J.3
Friedmann, J.4
Rudich, S.5
Smolensky, R.6
-
21
-
-
11744326454
-
Experimental implementation of fast quantum searching
-
Chuang, I. L., N. Gershenfeld, and M. Kubinec, “Experimental implementation of fast quantum searching,” Phys. Rev. Lett. 80, 3408–3411 (1998).
-
(1998)
Phys. Rev. Lett
, vol.80
, pp. 3408-3411
-
-
Chuang, I.L.1
Gershenfeld, N.2
Kubinec, M.3
-
22
-
-
0027610980
-
Modifications to the number field sieve
-
Coppersmith, D., “Modifications to the number field sieve,” J. Cryptology 6, 169–180 (1993).
-
(1993)
J. Cryptology
, vol.6
, pp. 169-180
-
-
Coppersmith, D.1
-
23
-
-
0003260561
-
An approximate fourier transform useful in quantum factoring
-
Coppersmith, D., “An approximate Fourier transform useful in quantum factoring,” IBM Research Report RC 19642 (1994).
-
(1994)
IBM Research Report RC 19642
-
-
Coppersmith, D.1
-
26
-
-
6144265213
-
Quantum privacy amplification and the security of quantum cryptography over noisy channels
-
Deutsch, D., A. Ekert, R. Jozsa, C. Macchiavello, S. Popescu, and A. Sanpera, “Quantum privacy amplification and the security of quantum cryptography over noisy channels,” Phys. Rev. Lett. 77, 2818–2821 (1996).
-
(1996)
Phys. Rev. Lett
, vol.77
, pp. 2818-2821
-
-
Deutsch, D.1
Ekert, A.2
Jozsa, R.3
Macchiavello, C.4
Popescu, S.5
Sanpera, A.6
-
27
-
-
0022421379
-
Quantum theory, the church-turing principle and the universal quantum computer
-
Deutsch, D., “Quantum theory, the Church-Turing Principle and the universal quantum computer,” Proc. Roy. Soc. Lond. A 400, 97 (1985).
-
(1985)
Proc. Roy. Soc. Lond. A
, vol.400
-
-
Deutsch, D.1
-
28
-
-
33750978344
-
Communication by epr devices
-
Dieks, D. “Communication by EPR devices” Phys. Lett. A 92, 271–272 (1982).
-
(1982)
Phys. Lett. A
, vol.92
, pp. 271-272
-
-
Dieks, D.1
-
29
-
-
33751021446
-
Two-bit gates are universal for quantum computation
-
DiVincenzo, D. P., “Two-bit gates are universal for quantum computation,” Phys. Rev. A 51, 1015–1022 (1995).
-
(1995)
Phys. Rev. A
, vol.51
, pp. 1015-1022
-
-
DiVincenzo, D.P.1
-
31
-
-
0343152990
-
Quantum cryptography based on bells theorem
-
Ekert, A. K., “Quantum cryptography based on Bell’s theorem” Phys. Rev. Lett. 67, 661–663 (1991).
-
(1991)
Phys. Rev. Lett
, vol.67
, pp. 661-663
-
-
Ekert, A.K.1
-
32
-
-
0030520263
-
Quantum computation and shors factoring algorithm
-
Ekert, A., and R. Jozsa, “Quantum computation and Shor’s factoring algorithm,” Rev. Mod. Phys. 68, 733–753 (1996).
-
(1996)
Rev. Mod. Phys
, vol.68
, pp. 733-753
-
-
Ekert, A.1
Jozsa, R.2
-
33
-
-
33746302924
-
-
e-print quant-ph/0503058
-
Elliott, C., A. Colvin, D. Pearson, O. Pikalo, J. Schlafer, and H. Yeh, “Current status of theDARPAQuantum Network,” e-print quant-ph/0503058, available at http://www.arXiv.org (2005).
-
(2005)
Current Status of Thedarpaquantum Network
-
-
Elliott, C.1
Colvin, A.2
Pearson, D.3
Pikalo, O.4
Schlafer, J.5
Yeh, H.6
-
34
-
-
5344222062
-
Optimal eavesdropping in quantum cryptography. I. information bound and optimal strategy
-
Fuchs, C. A., N. Gisin, R. B. Griffiths, C.-S. Niu, and A. Peres, “Optimal eavesdropping in quantum cryptography. I. Information bound and optimal strategy,” Phys. Rev. A 56, 1163–1172 (1997).
-
(1997)
Phys. Rev. A
, vol.56
, pp. 1163-1172
-
-
Fuchs, C.A.1
Gisin, N.2
Griffiths, R.B.3
Niu, C.-S.4
Peres, A.5
-
37
-
-
21244493696
-
Shors factoring algorithm and modern cryptography. An illustration of the capabilities inherent in quantum computers
-
Gerjuoy, E., “Shor’s factoring algorithm and modern cryptography. An illustration of the capabilities inherent in quantum computers,” Am. J. Phys. 73, 521 (2005).
-
(2005)
Am. J. Phys
, vol.73
-
-
Gerjuoy, E.1
-
38
-
-
0036013605
-
Quantum cryptography
-
Gisin, N., G. Ribordy, W. Tittel, and H. Zbinden, “Quantum cryptography,” Rev. Mod. Phys. 74, 145–195 (2002).
-
(2002)
Rev. Mod. Phys
, vol.74
, pp. 145-195
-
-
Gisin, N.1
Ribordy, G.2
Tittel, W.3
Zbinden, H.4
-
39
-
-
0003741896
-
-
Jones and Bartlett, Sudbury, MA
-
Greenstein, George, and Arthur G. Zajonc, The Quantum Challenge: Modern Research on the Foundations of Quantum Mechanics (Jones and Bartlett, Sudbury, MA, 1997).
-
(1997)
The Quantum Challenge: Modern Research on the Foundations of Quantum Mechanics
-
-
Greenstein, G.1
Zajonc, A.G.2
-
42
-
-
4243807288
-
Quantum mechanics helps in searching for a needle in a haystack
-
Grover, L., “Quantum mechanics helps in searching for a needle in a haystack,” Phys. Rev. Lett. 79, 325 (1997).
-
(1997)
Phys. Rev. Lett
, vol.79
-
-
Grover, L.1
-
43
-
-
84943817322
-
Error detecting and error correcting codes
-
Hamming, R.W., “Error detecting and error correcting codes,” Bell Syst. Tech. J., 29, 147–160 (1950).
-
(1950)
Bell Syst. Tech. J
, vol.29
, pp. 147-160
-
-
Hamming, R.W.1
-
46
-
-
0040052002
-
“quantumcomputations: Algorithms and error correction
-
Kitaev, A.Y.,“Quantumcomputations: Algorithms and error correction,” Russ. Math. Surv. 52, 1191–1249 (1997).
-
(1997)
Russ. Math. Surv
, vol.52
, pp. 1191-1249
-
-
Kitaev, A.Y.1
-
48
-
-
27144544067
-
Lower and upper bounds on the secret-key rate for quantum key distribution protocols using one-way classical communication
-
Kraus, B., N. Gisin, and R. Renner, “Lower and upper bounds on the secret-key rate for quantum key distribution protocols using one-way classical communication,” Phys. Rev. Lett. 95, 080501 (2005).
-
(2005)
Phys. Rev. Lett
, vol.80501
-
-
Kraus, B.1
Gisin, N.2
Renner, R.3
-
49
-
-
0000132092
-
Perfect quantum error correction code
-
Laflamme, R., C. Miquel, J.-P. Paz, and W. H. Zurek, “Perfect quantum error correction code,” Phys. Rev. Lett. 77, 198 (1996).
-
(1996)
Phys. Rev. Lett
, vol.77
-
-
Laflamme, R.1
Miquel, C.2
Paz, J.-P.3
Zurek, W.H.4
-
52
-
-
0033605546
-
Unconditional security of quantum key distribution over arbitrarily long distances
-
Lo, H.-K., and H. F. Chau, “Unconditional security of quantum key distribution over arbitrarily long distances,” Science 283, 2050 (1999).
-
(1999)
Science
, vol.283
-
-
Lo, H.-K.1
Chau, H.F.2
-
53
-
-
0003482738
-
-
World Scientific, Singapore
-
Lo, H.-K., S. Popescu, and T. Spiller, editors, Introduction to Quantum Computation and Information (World Scientific, Singapore, 2001).
-
(2001)
Introduction to Quantum Computation and Information
-
-
Lo, H.-K.1
Popescu, S.2
Spiller, T.3
-
54
-
-
0030219216
-
Near shannon limit performance of low density parity check codes
-
MacKay, D. J. C., and R. M. Neal, “Near Shannon limit performance of low density parity check codes,” Electron. Lett. 32(18), 1645–1646 (1996).
-
(1996)
Electron. Lett
, vol.32
, Issue.18
, pp. 1645-1646
-
-
MacKay, D.1
Neal, R.M.2
-
56
-
-
3042730516
-
Unconditional security in quantum cryptography
-
Mayers, D., “Unconditional security in quantum cryptography,” JACM 48, 351–406 (2001).
-
(2001)
JACM
, vol.48
, pp. 351-406
-
-
Mayers, D.1
-
57
-
-
0037239692
-
From cbits to qbits: Teaching computer scientists quantum mechanics
-
Mermin, N. D., “From Cbits to Qbits: Teaching computer scientists quantum mechanics,” Am. J. Phys. 71, 23–30 (2003).
-
(2003)
Am. J. Phys
, vol.71
, pp. 23-30
-
-
Mermin, N.D.1
-
64
-
-
0004247960
-
-
Elsevier, New York
-
Pless, V., Huffman, W. C., editors, Handbook of Coding Theory, Vols. I and II (Elsevier, New York, 1998).
-
(1998)
Handbook of Coding Theory
, vol.1-2
-
-
Pless, V.1
Huffman, W.C.2
-
65
-
-
0004203815
-
Fault-tolerant quantum computation
-
edited by H.-K. Lo, T. Spiller, and S. Popescu (World Scientific, Singapore
-
Preskill, J., “Fault-tolerant quantum computation,” in Quantum Information and Computation, edited by H.-K. Lo, T. Spiller, and S. Popescu (World Scientific, Singapore, 1998).
-
(1998)
Quantum Information and Computation
-
-
Preskill, J.1
-
67
-
-
0003145851
-
On the foundations of information theory
-
Rényi, A., “On the foundations of information theory,” Rev. Int. Statist. Inst. 33, 1 (1965).
-
(1965)
Rev. Int. Statist. Inst
, vol.33
-
-
Rényi, A.1
-
68
-
-
3042644957
-
Deterministic quantum teleportation with atoms
-
Riebe, M., H. Häffner, C. F. Roos, W. Hänsel, J. Benhelm, G. P. T. Lancaster, T. W. Körber, C. Becher, F. Schmidt-Kaler, D. F. V. James, and R. Blatt, “Deterministic quantum teleportation with atoms,” Nature 429, 734 (2004).
-
(2004)
Nature
, vol.429
-
-
Riebe, M.1
Häffner, H.2
Roos, C.F.3
Hänsel, W.4
Benhelm, J.5
Lancaster, G.P.6
Körber, T.W.7
Becher, C.8
Schmidt-Kaler, F.9
James, D.F.10
Blatt, R.11
-
69
-
-
0000313016
-
An introduction to quantum computing for non-physicists
-
Rieffel, E. G., and W. Polak, “An introduction to quantum computing for non-physicists,” ACM Comput. Surv. 32, 300–335 (2000).
-
(2000)
ACM Comput. Surv
, vol.32
, pp. 300-335
-
-
Rieffel, E.G.1
Polak, W.2
-
71
-
-
84940644968
-
A mathematical theory of communication
-
Shannon, C. E., “A mathematical theory of communication,” Bell Syst. Tech. J., 27, 379–423, 623–656 (1948).
-
(1948)
Bell Syst. Tech. J.
, vol.27
-
-
Shannon, C.E.1
-
72
-
-
84890522850
-
Communication theory of secrecy systems
-
Shannon, C. E., “Communication theory of secrecy systems,” Bell. Sys. Tech. J. 28, 656 (1949).
-
(1949)
Bell. Sys. Tech. J
, vol.28
-
-
Shannon, C.E.1
-
73
-
-
85115374351
-
Algorithms for quantum computation: Discrete logarithms and factoring
-
edited by S. Goldwasser (IEEE Computer Society Press, Los Alamitos, CA
-
Shor, P. W., “Algorithms for quantum computation: Discrete logarithms and factoring,” in Proceedings of the 35th Annual Symposium on the Foundations of Computer Science, edited by S. Goldwasser (IEEE Computer Society Press, Los Alamitos, CA, 1994), pp. 124–134.
-
(1994)
Proceedings of the 35Th Annual Symposium on the Foundations of Computer Science
, pp. 124-134
-
-
Shor, P.W.1
-
74
-
-
33746738958
-
Scheme for reducing decoherence in a quantum computer memory
-
Shor, P., “Scheme for reducing decoherence in a quantum computer memory,” Phys. Rev. A 52, 2493 (1995).
-
(1995)
Phys. Rev. A
, vol.52
-
-
Shor, P.1
-
75
-
-
0142051871
-
Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer
-
Shor, P. W. “Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer,” SIAM J. Comput. 26, 1484 (1997).
-
(1997)
SIAM J. Comput
, vol.26
-
-
Shor, P.W.1
-
76
-
-
0347090658
-
Simple proof of security of the bb84 quantum key distribution protocol
-
Shor, P.W., and J. Preskill, “Simple proof of security of the BB84 quantum key distribution protocol,” Phys. Rev. Lett. 85, 441 (2000).
-
(2000)
Phys. Rev. Lett
, vol.85
-
-
Shor, P.W.1
Preskill, J.2
-
81
-
-
33645084007
-
Experimental study of high speed polarization-coding quantum key distribution with siftedkey rates over mbit/s
-
Tang, X., L. Ma, A. Mink, A. Nakassis, H. Xu, B. Hershman, J.C. Bienfang, D. Su, R. F. Boisvert, C.W. Clark, and C. J. Williams. “Experimental study of high speed polarization-coding quantum key distribution with siftedkey rates over Mbit/s,” Optics Express 14, 2062 (2006).
-
(2006)
Optics Express
, vol.14
-
-
Tang, X.1
Ma, L.2
Mink, A.3
Nakassis, A.4
Xu, H.5
Hershman, B.6
Bienfang, J.C.7
Su, D.8
Boisvert, R.F.9
Clark, C.W.10
Williams, C.J.11
-
82
-
-
0035924370
-
Experimental realization of shors quantum factoring algorithm using nuclear magnetic resonance
-
Vandersypen, L. M. K., M. Steffen, G. Breyta, C. S. Yannoni, M. H. Sherwood, and I. L. Chuang, “Experimental realization of Shor’s quantum factoring algorithm using nuclear magnetic resonance,” Nature 414, 883– 887 (2001).
-
(2001)
Nature
, vol.414
-
-
Vandersypen, L.1
Steffen, M.2
Breyta, G.3
Yannoni, C.S.4
Sherwood, M.H.5
Chuang, I.L.6
-
84
-
-
0001998264
-
Conjugate coding
-
Wiesner, S., “Conjugate coding,” SIGACT News 15, 77 (1983).
-
(1983)
SIGACT News
, vol.15
-
-
Wiesner, S.1
-
85
-
-
33746708860
-
A single quantum cannot be cloned
-
Wootters, W. K., and W. H. Zurek, “A single quantum cannot be cloned,” Nature 299, 802–803 (1982).
-
(1982)
Nature
, vol.299
, pp. 802-803
-
-
Wootters, W.K.1
Zurek, W.H.2
-
86
-
-
18744370660
-
Bells-inequality experiments using independent-particle sources
-
Yurke, B. and D. Stoler, “Bell’s-inequality experiments using independent-particle sources,” Phys. Rev. A 46, 2229 (1992).
-
(1992)
Phys. Rev. A
, vol.46
-
-
Yurke, B.1
Stoler, D.2
|