Lecture

Results: 18028



#Item
31Mathematical analysis / Mathematics / Mathematical logic / Set theory / Operator theory / Code / Inner model theory / Partial differential equations / Complex analysis / Omega-regular language / Differential forms on a Riemann surface

Lecture 20, Tues April 4: Shor, Quantum Fourier Transform Last time we started in on Shor’s algorithm, a quantum algorithm that can factor ​N​ into ​p​×​q​ in polynomial time by reducing the problem to per

Add to Reading List

Source URL: www.scottaaronson.com

Language: English - Date: 2018-08-26 18:23:30
32Quantum mechanics / Physics / Theoretical computer science / Quantum information science / Quantum computing / Quantum states / Quantum algorithms / Qubit / Quantum superposition / Hadamard transform / Quantum entanglement / Matrix

CPSC: Quantum Computation John Watrous, University of Calgary Lecture 1: Overview of quantum information January 10, 2006

Add to Reading List

Source URL: cs.uwaterloo.ca

Language: English - Date: 2017-09-07 13:00:10
33Cryptographic protocols / Electromagnetism / Garbled circuit / Secure multi-party computation / IP / Theory of computation / NC / Electronic circuit / Applied mathematics / Commitment scheme

CS 294 – Secure Computation February 16 and 18, 2016 Lecture 9 and 10: Malicious Security - GMW Compiler and Cut and Choose, OT Extension

Add to Reading List

Source URL: people.eecs.berkeley.edu

Language: English - Date: 2016-03-10 13:39:26
34Quantum information science / Theoretical computer science / Quantum mechanics / Quantum computing / Superconducting quantum computing / Qubit / Quantum simulator / Quantum teleportation / Quantum algorithm / Trapped ion quantum computer / Quantum supremacy / D-Wave Systems

Lecture 29, Thurs May 4: Experimental Realizations of QC In this course, we’ve had 28 lectures about the theory of quantum computing and information. So it behooves us to take one lecture to survey the current state of

Add to Reading List

Source URL: www.scottaaronson.com

Language: English - Date: 2018-08-26 18:24:06
35Cryptography / Cryptographic hash functions / HMAC / Message authentication code / Hash function / Collision attack / MD5 / Collision resistance / SHA-1 / Crypt / One-way compression function / Security of cryptographic hash functions

An abridged version of this paper appears in Advances in Cryptology – Crypto 96 Proceedings, Lecture Notes in Computer Science Vol. 1109, N. Koblitz ed., Springer-Verlag, 1996. Keying Hash Functions for Message Authent

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2006-02-10 14:35:40
36Quantum mechanics / Physics / Quantum measurement / Interpretations of quantum mechanics / Quantum information science / Quantum computing / Many-worlds interpretation / Measurement problem / Schrdinger's cat / Quantum entanglement / Qubit / Copenhagen interpretation

Lecture 12, Thurs Feb 23: Interpretation of QM (Copenhagen, Dynamical Collapse, MWI, Decoherence) At this point in the course, we’re finally in a position to step back and ask,“What is quantum mechanics telling us ab

Add to Reading List

Source URL: www.scottaaronson.com

Language: English - Date: 2018-10-17 18:15:19
37Computational complexity theory / Theoretical computer science / Theory of computation / Complexity classes / Quantum computing / Quantum complexity theory / Emerging technologies / Quantum algorithm / BQP / PP / P versus NP problem / NP

Lecture 24, Tues April 18: Collision and Other Applications of Grover We’ve seen the application of Grover’s algorithm to searching game trees. Now let’s see another important application, to… The Collision Probl

Add to Reading List

Source URL: www.scottaaronson.com

Language: English - Date: 2018-08-26 18:23:45
38Quantum mechanics / Physics / Theoretical physics / Chemistry / Mathematical formulation of quantum mechanics / Quantum superposition / Unitary transformation / Quantum computing / Hamiltonian / Quantum algorithm / Degenerate energy levels / Schrdinger equation

Lecture 25, Thurs April 20: Hamiltonians Now we’ll move on to our second-to-last unit… Hamiltonians and the Adiabatic Algorithm We’ve seen how it’s an open question whether quantum computers can solve ​NP​-co

Add to Reading List

Source URL: www.scottaaronson.com

Language: English - Date: 2018-09-06 04:47:45
39Quantum mechanics / Physics / Quantum measurement / Metaphysics / Interpretations of quantum mechanics / Quantum information science / Hidden variable theory / De BroglieBohm theory / Bell's theorem / Hidden-variable theory / Local hidden-variable theory / Quantum entanglement

Lecture 13, Tues Feb 28: Hidden Variables, Bell’s Inequality In the last lecture, we discussed four different attitudes people take toward quantum mechanics: Copenhagen, “shut up and calculate,” dynamical collapse,

Add to Reading List

Source URL: www.scottaaronson.com

Language: English - Date: 2018-10-17 18:15:24
40Cryptography / Hashing / Pseudorandomness / HMAC / Pseudorandom function family / Cryptographic hash function / Hash function / Oracle machine / Block cipher

A preliminary version of this paper appears in Advances in Cryptology – CRYPTO ’06, Lecture Notes in Computer Science Vol. 4117 , C. Dwork ed., Springer-Verlag, 2006. This is the full version. New Proofs for NMAC and

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2006-08-14 17:10:52
UPDATE