Index

a posteriori, 225

a priori, 225

Abelian group, 234

Abelian stabiliser problem, 121

additive group, 234

adjoint, 230

Adlemann, L. M., 199

ALL-IP concept, 213

amplitude amplification, 72, 79, 131

asymmetric cryptography, 190

B92 protocol, 206, 209

Bardeen, J., 3

base station, 172

Bayes formula, 224, 225

BB84 protocol, 202, 209

beam splitter, 72

Bell inequality, 35, 42, 202, 208

Bell pairs, 29, 64, 6669

Bell states, 29, 49, 57, 64, 6669

Bell, J. S., 42, 208

Bennett, Ch. H., 68, 209, 210

bit-flip gate, 20, 21

blind detection, 184

Bloch sphere, 16, 17, 19, 20

Bloch, F., 16

Bohr, N., 33, 38

Bolyai, J., 13

BPSK, 176

Brassard, G., 209

Brattain, W. H., 3

Broglie, M., 33

burst, 176, 179

CAC, 170

call admission control, 170

CDMA, 170, 174

cdma2000, 171

channel equalization, 184

characteristic equation system, 230

Chinese remainder theorem, 193, 238

CHSH inequality, 3537, 42, 49, 50

ciphering, 186

CNOT gate, 26, 66, 68

co-primes, 100, 233, 234

code breaking, 186

code division multiple access, 170

commutative group, 234

completeness relation, 15, 44, 52, 229

complex baseband-equivalent description, 175, 245

computational basis, 15

conditional probability, 223

congruence, 194, 233, 238

congruent, 232

constructive interference, 72, 77, 102, 108, 111, 268

continued fraction, 107, 235

controlled NOT, 26

convergents, 107, 235

convolutional encoder, 190

Copenhagen interpretation, 33, 37

counting, 138

cryptoanalysis, 186

cryptography, 186, 201

cryptology, 186

decision theory, 225

decoherence, ...

Get Quantum Computing and Communications: An Engineering Approach now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.