Theory of Quantum Computation, Communication, and Cryptography: Third Workshop, TQC 2008 Tokyo, Japan, January 30 - February 1, 2008. Revised Selected Papers

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the thoroughly refereed post-workshop proceedings of the Third Workshop on Theory of Quantum Computation, Communication, and Cryptography, TQC 2008, held in Tokyo, Japan, in January/February 2008.

The 10 revised full papers presented were carefully selected during two rounds of reviewing and improvement. The papers present current original research and focus on theoretical aspects of quantum computation, quantum communication, and quantum cryptography, which are part of a larger interdisciplinary field that casts information science in a quantum mechanical framework.

Author(s): Wim van Dam, Igor E. Shparlinski (auth.), Yasuhito Kawano, Michele Mosca (eds.)
Series: Lecture Notes in Computer Science 5106
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2008

Language: English
Pages: 118
Tags: Theory of Computation; Algorithm Analysis and Problem Complexity; Computation by Abstract Devices; Coding and Information Theory; Discrete Mathematics in Computer Science; Quantum Computing, Information and Physics

Front Matter....Pages -
Classical and Quantum Algorithms for Exponential Congruences....Pages 1-10
Quantum Algorithms for Evaluating Min - Max Trees....Pages 11-15
Irreversibility of Entanglement Loss....Pages 16-28
Quadratic Form Expansions for Unitaries....Pages 29-46
Improved Constructions of Quantum Automata....Pages 47-56
An Application of the Deutsch-Jozsa Algorithm to Formal Languages and the Word Problem in Groups....Pages 57-69
An Elementary Optical Gate for Expanding Symmetrically Shared Entanglement....Pages 70-82
Security Bounds for Quantum Cryptography with Finite Resources....Pages 83-95
On the Design and Optimization of a Quantum Polynomial-Time Attack on Elliptic Curve Cryptography....Pages 96-104
Architecture of a Quantum Multicomputer Implementing Shor’s Algorithm....Pages 105-114
Back Matter....Pages -