Home > Quantum Computing

Post–Quantum Cryptography – A Primer

1. Introduction Traditionally, information security needed encryption, authentication, key management, non-repudiation and authorization which were being met using several techniques. Standardization of algorithms by National Institute of Standards and Technology (NIST) has facilitated international communication for banking and information transfer using these standards. Encryption can be carried out using Advanced Encryption Standard (AES) using variable block lengths

Read More

The Essence of Quantum Computing
Part 3 of 3 Part Series

Author   Rajendra K. Bera Chief Mentor, Acadinnet   Vikram Menon Confident Bellatrix Part III – Measurement and interpretation   In Part I we laid the foundation on which quantum algorithms are built. In part II we harnessed such exotic aspects of quantum mechanics as superposition, entanglement and collapse of quantum states to show how powerful quantum algorithms can

Read More

The Essence of Quantum Computing
Part 2 of 3 Part Series

Author Rajendra K. Bera Chief Mentor, Acadinnet Part II - Algorithms   In Part I we laid the foundation on which quantum algorithms are built. In this part we harness such exotic aspects as superposition, entanglement and collapse of quantum states of that foundation to show how powerful quantum algorithms can be constructed for efficient

Read More

The Essence of Quantum Computing

Authors   Rajendra K. Bera Chief Mentor, Acadinnet Abstract   It now appears that quantum computers are poised to enter the world of computing and establish its dominance, especially, in the cloud. Turing machines (classical computers) tied to the laws of classical physics will not vanish from our lives but begin to play a subordinate role

Read More