Completed
Lecture 44 : Quantum Cryptography-II
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Quantum Information and Computing
Automatically move to the next video in the Classroom when playback concludes
- 1 Lecture 1 : Why Quantum Computing?
- 2 Lecture 2 : Postulates of Quantum Mechanics I
- 3 Lecture 3 : Postulates of Quantum Mechanics II
- 4 Lecture 4 : Qubit- The smallest unit
- 5 Lecture 5 : Qubit- Bloch sphere representation
- 6 Lecture 6 : Multiple Qubit States and Quantum Gates
- 7 Lecture 7 : Quantum Gates
- 8 Lecture 8 : Quantum Circuts
- 9 Lecture 9 : No-Cloning Theorem and Quantum Teleportation
- 10 Lecture 10 : Super Dense Coding
- 11 Lecture 11 : Density Matrix-I
- 12 Lecture 12 : Density Matrix-II
- 13 Lecture 13 : Bloch Sphere and Density Matrix
- 14 Lecture 14 : Measurement Postulates-I
- 15 Lecture 15 : Measurement Postulates-II
- 16 Lecture 16 : Simple Algorithms-Deutsch Algorithm
- 17 Lecture 17 : Deutsch-Josza & Bernstein-Vazirani Algorithms
- 18 Lecture 18 : Simon Problem
- 19 Lecture 19 : Grover's Search Algorithm - I
- 20 Lecture 20 : Grover's Search Algorithm - II
- 21 Lecture 21 : Grover's Search Algorithm - III
- 22 Lecture 22 : Grover's Search Algorithm - IV
- 23 Lecture 23 : Quantum Fourier Transform
- 24 Lecture 24 : Period Finding and QFT
- 25 Lecture 25 : Implementing QFT
- 26 Lecture 26 : Implementing QFT-3 qubits (and more)
- 27 Lecture 27 : Shor's Factorization Algorithm
- 28 Lecture 28 : Shor's Factorization Algorithm-Implementation
- 29 Lecture 29 : Shor's Algorithm-Continued Fraction
- 30 Lecture 30 : Quantum Error Correction-I
- 31 Lecture 31 : Quantum Error Correction-II Three Qubit Code
- 32 Lecture 32 : Quantum Error Correction-III Shor's 9 Qubit Code-I
- 33 Lecture 33 : Quantum Error Correction-IV Shor's 9 Qubit Code-II
- 34 Lecture 34 : Classical Information Theory
- 35 Lecture 35 : Shannon Entropy
- 36 Lecture 36 : Shannon's Noiseless Coding Theorem
- 37 Lecture 37 : Ven Neumann Entropy
- 38 Lecture 38 : EPR and Bell's Inequalities - I
- 39 Lecture 39 : EPR and Bell's Inequalities - II
- 40 Lecture 40 : EPR and Bell's Inequalities - III
- 41 Lecture 41 : Cryptography-RSA Algorithm-I
- 42 Lecture 42 : Cryptography-RSA Algorithm-II
- 43 Lecture 43 : Quantum Cryptography-I
- 44 Lecture 44 : Quantum Cryptography-II
- 45 Lecture 45 : Experimental Aspects of Quantum Computing - I
- 46 Lecture 46 : Experimental Aspects of Quantum Computing - II