000 | 03453nam a22006015i 4500 | ||
---|---|---|---|
001 | 978-3-540-89304-2 | ||
003 | DE-He213 | ||
005 | 20160624102124.0 | ||
007 | cr nn 008mamaa | ||
008 | 100301s2008 gw | s |||| 0|eng d | ||
020 |
_a9783540893042 _9978-3-540-89304-2 |
||
024 | 7 |
_a10.1007/978-3-540-89304-2 _2doi |
|
050 | 4 | _aQA75.5-76.95 | |
072 | 7 |
_aUY _2bicssc |
|
072 | 7 |
_aUYA _2bicssc |
|
072 | 7 |
_aCOM014000 _2bisacsh |
|
072 | 7 |
_aCOM031000 _2bisacsh |
|
082 | 0 | 4 |
_a004.0151 _223 |
245 | 1 | 0 |
_aTheory of Quantum Computation, Communication, and Cryptography _h[electronic resource] : _bThird Workshop, TQC 2008 Tokyo, Japan, January 30 - February 1, 2008. Revised Selected Papers / _cedited by Yasuhito Kawano, Michele Mosca. |
260 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg, _c2008. |
|
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg, _c2008. |
|
300 |
_aVII, 118 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v5106 |
|
505 | 0 | _aClassical and Quantum Algorithms for Exponential Congruences -- Quantum Algorithms for Evaluating Min-Max Trees -- Irreversibility of Entanglement Loss -- Quadratic Form Expansions for Unitaries -- Improved Constructions of Quantum Automata -- An Application of the Deutsch-Jozsa Algorithm to Formal Languages and the Word Problem in Groups -- An Elementary Optical Gate for Expanding Symmetrically Shared Entanglement -- Security Bounds for Quantum Cryptography with Finite Resources -- On the Design and Optimization of a Quantum Polynomial-Time Attack on Elliptic Curve Cryptography -- Architecture of a Quantum Multicomputer Implementing Shor’s Algorithm. | |
520 | _aThis book constitutes the thoroughly refereed post-workshop proceedings of the Third Workshop on Theory of Quantum Computation, Communication, and Cryptography, TQC 2008, held in Tokyo, Japan, in January/February 2008. The 10 revised full papers presented were carefully selected during two rounds of reviewing and improvement. The papers present current original research and focus on theoretical aspects of quantum computation, quantum communication, and quantum cryptography, which are part of a larger interdisciplinary field that casts information science in a quantum mechanical framework. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aCoding theory. | |
650 | 0 | _aInformation theory. | |
650 | 0 | _aComputer software. | |
650 | 0 | _aComputational complexity. | |
650 | 0 | _aQuantum computing. | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aTheory of Computation. |
650 | 2 | 4 | _aAlgorithm Analysis and Problem Complexity. |
650 | 2 | 4 | _aComputation by Abstract Devices. |
650 | 2 | 4 | _aCoding and Information Theory. |
650 | 2 | 4 | _aDiscrete Mathematics in Computer Science. |
650 | 2 | 4 | _aQuantum Computing, Information and Physics. |
700 | 1 |
_aKawano, Yasuhito. _eeditor. |
|
700 | 1 |
_aMosca, Michele. _eeditor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9783540893035 |
786 | _dSpringer | ||
830 | 0 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v5106 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-540-89304-2 |
942 |
_2EBK8305 _cEBK |
||
999 |
_c37599 _d37599 |