Essays about: "Kvantdator"
Showing result 1 - 5 of 20 essays containing the word Kvantdator.
-
1. Probabilistic Exact Inversion of 2-qubit Bipartite Unitary Operations using Local Operations and Classical Communication
University essay from KTH/FysikAbstract : A distributed quantum computer holds the potential to emulate a larger quantumcomputer by being partitioned it into smaller modules where local operations (LO)can be applied, and classical communication (CC) can be utilized between thesemodules. Finding algorithms under LOCC restrictions is crucial for leveraging thecapabilities of distributed quantum computing, This thesis explores probabilisticexact LOCC supermaps, that maps 2-qubit bipartite unitary operations to its inver-sion and complex conjugation. READ MORE
-
2. The Rise of the Quantum Computing Industry – Identifying the key barriers of adoption of QC-technology as a service
University essay from Blekinge Tekniska Högskola/Institutionen för industriell ekonomiAbstract : The future is here. New digital, disruptive innovations are changing and affecting industries across society. And the emerging Quantum Computing (QC) industry is not an exception. READ MORE
-
3. Simulating the Impact of Noise on Quantum Walk Algorithm
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Quantum computing has recently shown promise for improving the efficiency of some classical algorithms. However, quantum computing suffers from issues in reliability due to the fundamental problem of quantum mechanics called decoherence. READ MORE
-
4. Comparative Study Between a Quantum Walk with a Hadamard Coin and a Classical Random Walk
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : A comparative study of the classical random walk and a quantum random walk with the Hadamard coin. The overarching algorithm for a random walk is the same in either the classical or quantum case, but how they are implemented differ. By utilizing the properties of quantum computing the results produced from the two algorithms also differ. READ MORE
-
5. A Side-Channel Attack on Masked and Shuffled Implementations of M-LWE and M-LWR Cryptography : A case study of Kyber and Saber
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In response to the threat of a future, large-scale, quantum computer, the American National Institute of Standards and Technology (NIST) initiated a competition for designs of quantum-resistant cryptographic primitives. In 2022, the lattice-based Module-Learning With Errors (M-LWE) scheme Kyber emerged as the winner to be standardized. READ MORE