43,95 €
43,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
22 °P sammeln
43,95 €
43,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
22 °P sammeln
Als Download kaufen
43,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
22 °P sammeln
Jetzt verschenken
43,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
22 °P sammeln
  • Format: PDF

This book offers an accessible and engaging introduction to quantum cryptography, assuming no prior knowledge in quantum computing. Essential background theory and mathematical techniques are introduced and applied in the analysis and design of quantum cryptographic protocols. The title explores several important applications such as quantum key distribution, quantum money, and delegated quantum computation, while also serving as a self-contained introduction to the field of quantum computing. With frequent illustrations and simple examples relevant to quantum cryptography, this title focuses…mehr

  • Geräte: PC
  • mit Kopierschutz
  • eBook Hilfe
  • Größe: 7.93MB
  • FamilySharing(5)
Produktbeschreibung
This book offers an accessible and engaging introduction to quantum cryptography, assuming no prior knowledge in quantum computing. Essential background theory and mathematical techniques are introduced and applied in the analysis and design of quantum cryptographic protocols. The title explores several important applications such as quantum key distribution, quantum money, and delegated quantum computation, while also serving as a self-contained introduction to the field of quantum computing. With frequent illustrations and simple examples relevant to quantum cryptography, this title focuses on building intuition and challenges readers to understand the basis of cryptographic security. Frequent worked examples and mid-chapter exercises allow readers to extend their understanding, and in-text quizzes, end-of-chapter homework problems, and recommended further reading reinforce and broaden understanding. Online resources available to instructors include interactive computational problems in Julia, videos, lecture slides, and a fully worked solutions manual.

Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.

Autorenporträt
Thomas Vidick is Professor in the Department Computer Science and Applied Mathematics at the Weizmann Institute of Science in Israel. He received his Ph.D. from UC Berkeley in 2011, followed by two years of postdoctoral research at the Massachusetts Institute of Technology, where he worked on quantum complexity and cryptography. He joined the Computer Science Faculty at the California Institute of Technology in 2014, and became Professor in 2018. In 2022 he took a leave from CalTech to start his current position at the Weizmann Institute. Professor Vidick is best known for his research on device-independence, including the first security proof of device-independent quantum key distribution. In 2019 he received a Presidential Early-Career Award, and in 2021 was named a Simons Investigator at CalTech. In 2023 he received the Michael and Sheila Held prize from the National Academy of Sciences for his work in quantum cryptography and quantum complexity.