Logo

A Rosetta Stone for Quantum Mechanics with an Introduction to Quantum Computation

Small book cover: A Rosetta Stone for Quantum Mechanics with an Introduction to Quantum Computation

A Rosetta Stone for Quantum Mechanics with an Introduction to Quantum Computation
by

Publisher: arXiv
Number of pages: 97

Description:
The purpose of these lecture notes is to provide readers, who have some mathematical background but little or no exposure to quantum mechanics and quantum computation, with enough material to begin reading the research literature in quantum computation and quantum information theory.

Home page url

Download or read it online for free here:
Download link
(640KB, PDF)

Similar books

Book cover: Basic Concepts in Quantum InformationBasic Concepts in Quantum Information
by - arXiv
These notes will present a brief introduction to the basic theoretical concepts behind the 'second quantum revolution'. They also provide an introduction to 'circuit QED', which offers an architecture for constructing quantum information processors.
(8974 views)
Book cover: Basic Concepts in Quantum ComputationBasic Concepts in Quantum Computation
by - arXiv
Contents: Qubits, gates and networks; Quantum arithmetic and function evaluations; Algorithms and their complexity; From interferometers to computers; The first quantum algorithms; Quantum search; Optimal phase estimation; and more.
(9662 views)
Book cover: Quantum Information: primitive notions and quantum correlationsQuantum Information: primitive notions and quantum correlations
by - arXiv
I rapidly review the basic notions of quantum physics and many primitives of quantum information. The second part is devoted to a detailed introduction to the topic of quantum correlations, covering the evidence for failure of alternative theories...
(6559 views)
Book cover: A brief introduction of quantum cryptography for engineersA brief introduction of quantum cryptography for engineers
by - arXiv
We present the principles behind quantum key distribution and discuss a few well-known QKD protocols. We focus more on the implementation of QKD protocols rather than security analysis. Another topic covered here is the security of QKD systems.
(13758 views)