Quantum Computation and Information Security

Quantum Computation and Information Security

via YouTube Direct link

What about eavesdropping?

16 of 26

16 of 26

What about eavesdropping?

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Quantum Computation and Information Security

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Secure Communication
  3. 3 RSA encryption Ron Rivest, Adi Shamir, and Leonard Adleman - Choose two prime numbers and multiply
  4. 4 How hard is factoring?
  5. 5 Thought experiment: Schrodinger's Cat
  6. 6 1 hour later, the cat is 50% dead
  7. 7 50% alive, 50% dead
  8. 8 Introducing the quantum bit (qubit)
  9. 9 A Qubit is in a complex state, with infinite possibilities
  10. 10 Building a Qubit
  11. 11 Aside on cryptography • Alice and Bob want to communicate
  12. 12 Polarizing Light
  13. 13 Represent Bits as Polarized Light
  14. 14 Measuring Photons
  15. 15 Quantum Key Distribution
  16. 16 What about eavesdropping?
  17. 17 Key Validation
  18. 18 Classical computers can be built from NAND gates only
  19. 19 Quantum Computers can be built from CNOT gates and single-qubit operators
  20. 20 Experimental demonstration of 2 qubits
  21. 21 Factoring N=15: Construct a function
  22. 22 Factoring N=15: Find the period
  23. 23 Factoring N=15: Apply QFT
  24. 24 Factor 15: Find the factors
  25. 25 How fast is Shor's algorithm?
  26. 26 Summary

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.