|
|
|
|
LEADER |
03309nam a22005655i 4500 |
001 |
978-3-540-89304-2 |
003 |
DE-He213 |
005 |
20170131054021.0 |
007 |
cr nn 008mamaa |
008 |
100301s2008 gw | s |||| 0|eng d |
020 |
|
|
|a 9783540893042
|9 978-3-540-89304-2
|
024 |
7 |
|
|a 10.1007/978-3-540-89304-2
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.6-76.66
|
072 |
|
7 |
|a UM
|2 bicssc
|
072 |
|
7 |
|a COM051000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.11
|2 23
|
245 |
1 |
0 |
|a Theory of Quantum Computation, Communication, and Cryptography
|h [electronic resource] :
|b Third Workshop, TQC 2008 Tokyo, Japan, January 30 - February 1, 2008. Revised Selected Papers /
|c edited by Yasuhito Kawano, Michele Mosca.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 2008.
|
300 |
|
|
|a VII, 118 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 5106
|
505 |
0 |
|
|a Classical and Quantum Algorithms for Exponential Congruences -- Quantum Algorithms for Evaluating Min-Max Trees -- Irreversibility of Entanglement Loss -- Quadratic Form Expansions for Unitaries -- Improved Constructions of Quantum Automata -- An Application of the Deutsch-Jozsa Algorithm to Formal Languages and the Word Problem in Groups -- An Elementary Optical Gate for Expanding Symmetrically Shared Entanglement -- Security Bounds for Quantum Cryptography with Finite Resources -- On the Design and Optimization of a Quantum Polynomial-Time Attack on Elliptic Curve Cryptography -- Architecture of a Quantum Multicomputer Implementing Shor’s Algorithm.
|
520 |
|
|
|a This book constitutes the thoroughly refereed post-workshop proceedings of the Third Workshop on Theory of Quantum Computation, Communication, and Cryptography, TQC 2008, held in Tokyo, Japan, in January/February 2008. The 10 revised full papers presented were carefully selected during two rounds of reviewing and improvement. The papers present current original research and focus on theoretical aspects of quantum computation, quantum communication, and quantum cryptography, which are part of a larger interdisciplinary field that casts information science in a quantum mechanical framework.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Computer programming.
|
650 |
|
0 |
|a Coding theory.
|
650 |
|
0 |
|a Computers.
|
650 |
|
0 |
|a Algorithms.
|
650 |
|
0 |
|a Computer science
|x Mathematics.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Programming Techniques.
|
650 |
2 |
4 |
|a Mathematics of Computing.
|
650 |
2 |
4 |
|a Theory of Computation.
|
650 |
2 |
4 |
|a Algorithm Analysis and Problem Complexity.
|
650 |
2 |
4 |
|a Computation by Abstract Devices.
|
650 |
2 |
4 |
|a Coding and Information Theory.
|
700 |
1 |
|
|a Kawano, Yasuhito.
|e editor.
|
700 |
1 |
|
|a Mosca, Michele.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783540893035
|
830 |
|
0 |
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 5106
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-540-89304-2
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (Springer-11645)
|