Quantum Computing Fundamentals (Paperback)
Chuck Easttom
- 出版商: Addison Wesley
- 出版日期: 2021-06-01
- 定價: $2,600
- 售價: 9.5 折 $2,470
- 語言: 英文
- 頁數: 384
- 裝訂: Quality Paper - also called trade paper
- ISBN: 0136793819
- ISBN-13: 9780136793816
-
相關分類:
量子計算
-
相關翻譯:
量子計算導論:從線性代數到量子編程 (簡中版)
立即出貨 (庫存 < 4)
買這商品的人也買了...
-
$1,380$1,352 -
$290$276 -
$1,860$1,823 -
$940$700 -
$1,840$1,748 -
$680$646 -
$1,380$1,352 -
$990Mastering Bitcoin: Programming the Open Blockchain (Paperback),2E
-
$1,950$1,911 -
$1,600$1,568 -
$1,400$1,372 -
$2,980$2,920 -
$2,106Mastering Ethereum: Building Smart Contracts and Dapps
-
$1,650$1,617 -
$4,840$4,598 -
$1,680$1,646 -
$1,680$1,646 -
$560$504 -
$3,160$3,002 -
$680$537 -
$980$833 -
$1,200$1,176 -
$714$678 -
$1,372Gravity: An Introduction to Einstein's General Relativity (Hardcover)
-
$1,780$1,744
相關主題
商品描述
ONE-VOLUME INTRODUCTION TO QUANTUM COMPUTING
- Clearly explains core concepts, terminology, and techniques
- Covers the foundational physics, math, and information theory you need
- Provides hands-on practice with quantum programming
- The perfect beginner’s guide for anyone interested in a quantum computing career
Dr. Chuck Easttom brings together complete coverage of basic quantum computing concepts, terminology, and issues, along with key skills to get you started.
Drawing on 30+ years as a computer science instructor, consultant, and researcher, Easttom demystifies the field’s underlying technical concepts and math, shows how quantum computing systems are designed and built, explains their implications for cyber security, and previews advances in quantum-resistant cryptography. Writing clearly and simply, he introduces two of today’s leading quantum programming languages, Microsoft Q# and QASM, and guides you through sample projects. Throughout, tests, projects, and review questions help you deepen and apply your knowledge.
Whether you’re a student, professional, or manager, this guide will prepare you for the quantum computing revolution--and expand your career options, too.
- Master the linear algebra and other mathematical skills you’ll need
- Explore key physics ideas such as quantum states and uncertainty
- Review data structures, algorithms, and computing complexity
- Work with probability and set theory in quantum computing
- Familiarize yourself with basic quantum theory and formulae
- Understand quantum entanglement and quantum key distribution
- Discover how quantum computers are architected and built
- Explore several leading quantum algorithms
- Compare quantum and conventional asymmetric algorithms
- See how quantum computing might break traditional cryptography
- Discover several approaches to quantum-resistant cryptography
- Start coding with Q#, Microsoft’s quantum programming language
- Simulate quantum gates and algorithms with QASM
商品描述(中文翻譯)
量子計算的一卷式入門
- 清楚解釋核心概念、術語和技術
- 涵蓋基礎物理、數學和資訊理論
- 提供量子編程的實踐經驗
- 對於任何對量子計算職業感興趣的初學者來說,這是完美的入門指南
Chuck Easttom博士匯集了基本量子計算概念、術語和問題的完整內容,以及讓您入門所需的關鍵技能。
Easttom以30多年的計算機科學教師、顧問和研究人員的經驗,對該領域的基礎技術概念和數學進行了解說,展示了量子計算系統的設計和構建方式,解釋了它們對網絡安全的影響,並預覽了量子抗攻擊加密的進展。他以清晰簡單的方式介紹了當今兩種領先的量子編程語言,Microsoft Q#和QASM,並引導您完成示例項目。在整個過程中,測試、項目和複習問題幫助您加深和應用您的知識。
無論您是學生、專業人士還是經理,本指南都將為您準備量子計算革命,並擴大您的職業選擇。
- 掌握您所需的線性代數和其他數學技能
- 探索量子狀態和不確定性等重要物理概念
- 審查數據結構、算法和計算複雜性
- 在量子計算中使用概率和集合理論
- 熟悉基本的量子理論和公式
- 理解量子糾纏和量子密鑰分發
- 了解量子計算機的架構和構建方式
- 探索幾種領先的量子算法
- 比較量子和傳統的非對稱算法
- 看看量子計算如何破解傳統的加密方法
- 探索幾種抗量子攻擊的加密方法
- 開始使用Q#,Microsoft的量子編程語言
- 使用QASM模擬量子門和算法
作者簡介
Dr. Chuck Easttom is the author of 31 books, including several on computer security, forensics, and cryptography. His books are used at more than 60 universities. He has also authored scientific papers (more than 70 so far) on digital forensics, cyber warfare, cryptography, and applied mathematics. He is an inventor with 22 computer science patents. He holds a Doctor of Science in cyber security (dissertation topic: a study of lattice-based cryptographic algorithms for post-quantum computing). He also has a Ph.D. in Technology, focusing on nanotechnology (dissertation title: "The Effects of Complexity on Carbon Nanotube Failures") and a Ph.D. in Computer Science (dissertation title: "On the Application of Graph Theory to Digital Forensics"). He also has three master's degrees (one in applied computer science, one in education, and one in systems engineering). He is a senior member of the IEEE and a senior member of the ACM (Association of Computing Machinery) as well as a member of IACR (International Association of Cryptological Research) and INCOSE (International Council on Systems Engineering). He is also a distinguished speaker of the ACM and a distinguished visitor of the IEEE Computer Society. He currently is an adjunct lecturer for Georgetown University.
作者簡介(中文翻譯)
Dr. Chuck Easttom是31本書的作者,其中包括幾本關於電腦安全、鑑識和密碼學的書籍。他的書籍在60多所大學中使用。他還撰寫了科學論文(迄今為止超過70篇),涉及數字鑑識、網絡戰爭、密碼學和應用數學。他是一位擁有22項計算機科學專利的發明家。他擁有一個博士學位,專攻網絡安全(論文題目:後量子計算的基於格的密碼算法研究)。他還擁有一個技術博士學位,專注於納米技術(論文題目:“複雜性對碳納米管失效的影響”),以及一個計算機科學博士學位(論文題目:“圖論在數字鑑識中的應用”)。他還擁有三個碩士學位(應用計算機科學、教育和系統工程各一個)。他是IEEE的高級會員,也是ACM(計算機協會)的高級會員,還是IACR(國際密碼學研究協會)和INCOSE(國際系統工程委員會)的成員。他還是ACM的傑出演講者和IEEE計算機協會的傑出訪問學者。他目前是喬治城大學的兼職講師。
目錄大綱
Preface xvii
Part I Preparatory Material
Chapter 1: Introduction to Essential Linear Algebra 2
1.1 What Is Linear Algebra?.. . . . . . . . . . . . . . . . . . . . 3
1.2 Some Basic Algebra.. . . . . . . . . . . . . . . . . . . . . 4
1.3 Matrix Math.. . . . . . . . . . . . . . . . . . . . . . . . 10
1.4 Vectors and Vector Spaces.. . . . . . . . . . . . . . . . . . 23
1.5 Set Theory.. . . . . . . . . . . . . . . . . . . . . . . . . 25
1.6 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . 29
Test Your Skills. . . . . . . . . . . . . . . . . . . . . . . 29
Chapter 2: Complex Numbers 32
2.1 What Are Complex Numbers?.. . . . . . . . . . . . . . . . . 32
2.2 Algebra of Complex Numbers.. . . . . . . . . . . . . . . . . 34
2.3 Complex Numbers Graphically.. . . . . . . . . . . . . . . . 38
2.4 Vector Representations of Complex Numbers.. . . . . . . . . . 45
2.5 Pauli Matrices.. . . . . . . . . . . . . . . . . . . . . . . 48
2.6 Transcendental Numbers.. . . . . . . . . . . . . . . . . . . 56
2.7 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . 58
Chapter 3: Basic Physics for Quantum Computing 60
3.1 The Journey to Quantum.. . . . . . . . . . . . . . . . . . . 61
3.2 Quantum Physics Essentials.. . . . . . . . . . . . . . . . . 65
3.3 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . 77
Test Your Skills. . . . . . . . . . . . . . . . . . . . . . . 77
Chapter 4: Fundamental Computer Science for Quantum Computing 80
4.1 Data Structures.. . . . . . . . . . . . . . . . . . . . . . . 81
4.2 Algorithms.. . . . . . . . . . . . . . . . . . . . . . . . . 88
4.3 Computational Complexity.. . . . . . . . . . . . . . . . . . 93
4.4 Coding Theory.. . . . . . . . . . . . . . . . . . . . . . . 95
4.5 Logic Gates.. . . . . . . . . . . . . . . . . . . . . . . . 96
4.6 Computer Architecture.. . . . . . . . . . . . . . . . . . . 100
4.7 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . 103
Test Your Skills. . . . . . . . . . . . . . . . . . . . . . . 103
Chapter 5: Basic Information Theory 106
5.1 Basic Probability.. . . . . . . . . . . . . . . . . . . . . . 107
5.2 Set Theory.. . . . . . . . . . . . . . . . . . . . . . . . 108
5.3 Information Theory.. . . . . . . . . . . . . . . . . . . . . 112
5.4 Quantum Information.. . . . . . . . . . . . . . . . . . . . 118
5.5 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . 120
Test Your Skills. . . . . . . . . . . . . . . . . . . . . . . 120
Part II Basic Quantum Computing
Chapter 6: Basic Quantum Theory 122
6.1 Further with Quantum Mechanics.. . . . . . . . . . . . . . . 123
6.2 Quantum Decoherence.. . . . . . . . . . . . . . . . . . . 129
6.3 Quantum Electrodynamics.. . . . . . . . . . . . . . . . . . 131
6.4 Quantum Chromodynamics.. . . . . . . . . . . . . . . . . 133
6.5 Feynman Diagram.. . . . . . . . . . . . . . . . . . . . . 134
6.6 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . 136
Test Your Skills. . . . . . . . . . . . . . . . . . . . . . . 136
Chapter 7: Quantum Entanglement and QKD 138
7.1 Quantum Entanglement.. . . . . . . . . . . . . . . . . . . 138
7.2 Interpretation.. . . . . . . . . . . . . . . . . . . . . . . 143
7.3 QKE.. . . . . . . . . . . . . . . . . . . . . . . . . . . 146
7.4 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . 151
Test Your Skills. . . . . . . . . . . . . . . . . . . . . . . 152
Chapter 8: Quantum Architecture 154
8.1 Further with Qubits.. . . . . . . . . . . . . . . . . . . . . 154
8.2 Quantum Gates.. . . . . . . . . . . . . . . . . . . . . . 158
8.3 More with Gates.. . . . . . . . . . . . . . . . . . . . . . 166
8.4 Quantum Circuits. . . . . . . . . . . . . . . . . . . . . . 167
8.5 The D-Wave Quantum Architecture.. . . . . . . . . . . . . . 169
8.6 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . 172
Test Your Skills. . . . . . . . . . . . . . . . . . . . . . . 172
Chapter 9: Quantum Hardware 174
9.1 Qubits.. . . . . . . . . . . . . . . . . . . . . . . . . . 174
9.2 How Many Qubits Are Needed?. . . . . . . . . . . . . . . . 181
9.3 Addressing Decoherence.. . . . . . . . . . . . . . . . . . 182
9.4 Topological Quantum Computing.. . . . . . . . . . . . . . . 186
9.5 Quantum Essentials.. . . . . . . . . . . . . . . . . . . . 187
9.6 Quantum Networking.. . . . . . . . . . . . . . . . . . . . 188
9.7 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . 191
Test Your Skills. . . . . . . . . . . . . . . . . . . . . . . 191
Chapter 10: Quantum Algorithms 194
10.1 What Is an Algorithm?. . . . . . . . . . . . . . . . . . . . 194
10.2 Deutsch’s Algorithm.. . . . . . . . . . . . . . . . . . . . 197
10.3 Deutsch-Jozsa Algorithm.. . . . . . . . . . . . . . . . . . 199
10.4 Bernstein-Vazirani Algorithm.. . . . . . . . . . . . . . . . . 201
10.5 Simon’s Algorithm.. . . . . . . . . . . . . . . . . . . . . 202
10.6 Shor’s Algorithm.. . . . . . . . . . . . . . . . . . . . . . 203
10.7 Grover’s Algorithm. . . . . . . . . . . . . . . . . . . . . 209
10.8 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . 211
Test Your Skills. . . . . . . . . . . . . . . . . . . . . . . 211
Part III Quantum Computing and Cryptography
Chapter 11: Current Asymmetric Algorithms 212
11.1 RSA. . . . . . . . . . . . . . . . . . . . . . . . . . . 213
11.2 Diffie-Hellman.. . . . . . . . . . . . . . . . . . . . . . . 216
11.3 Elliptic Curve.. . . . . . . . . . . . . . . . . . . . . . . 219
11.4 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . 227
Test Your Skills. . . . . . . . . . . . . . . . . . . . . . . 227
Chapter 12: The Impact of Quantum Computing on Cryptography 228
12.1 Asymmetric Cryptography.. . . . . . . . . . . . . . . . . . 229
12.2 Specific Algorithms.. . . . . . . . . . . . . . . . . . . . . 231
12.3 Specific Applications. . . . . . . . . . . . . . . . . . . . 233
12.3.1 Digital Certificates. . . . . . . . . . . . . . . . . . 233
12.3.2 SSL/TLS. . . . . . . . . . . . . . . . . . . . . . 234
12.4 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . 241
Test Your Skills. . . . . . . . . . . . . . . . . . . . . . . 241
Chapter 13: Lattice-based Cryptography 244
13.1 Lattice-Based Mathematical Problems.. . . . . . . . . . . . . 245
13.2 Cryptographic Algorithms. . . . . . . . . . . . . . . . . . 249
13.3 Solving Lattice Problems.. . . . . . . . . . . . . . . . . . 256
13.4 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . 259
Test Your Skills. . . . . . . . . . . . . . . . . . . . . . . 259
Chapter 14: Multivariate Cryptography 262
14.1 Mathematics.. . . . . . . . . . . . . . . . . . . . . . . 262
14.2 Matsumoto-Imai.. . . . . . . . . . . . . . . . . . . . . . 264
14.3 Hidden Field Equations. . . . . . . . . . . . . . . . . . . 266
14.4 Multivariate Quadratic Digital Signature Scheme (MQDSS).. . . . 268
14.5 SFLASH.. . . . . . . . . . . . . . . . . . . . . . . . . 269
14.6 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . 271
Test Your Skills. . . . . . . . . . . . . . . . . . . . . . . 271
Chapter 15: Other Approaches to Quantum Resistant Cryptography 274
15.1 Hash Functions.. . . . . . . . . . . . . . . . . . . . . . 274
15.2 Code-Based Cryptography.. . . . . . . . . . . . . . . . . 279
15.3 Supersingular Isogeny Key Exchange.. . . . . . . . . . . . . 281
15.4 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . 289
Test Your Skills. . . . . . . . . . . . . . . . . . . . . . . 289
Part IV Quantum Programming
Chapter 16: Working with Q# 292
16.1 Basic Programming Concepts.. . . . . . . . . . . . . . . . 292
16.2 Getting Started with Q#.. . . . . . . . . . . . . . . . . . . 298
16.3 Grover’s Algorithm. . . . . . . . . . . . . . . . . . . . . 303
16.4 Deutsch-Jozsa Algorithm.. . . . . . . . . . . . . . . . . . 307
16.5 Bit Flipping.. . . . . . . . . . . . . . . . . . . . . . . . 310
16.6 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . 311
Test Your Skills. . . . . . . . . . . . . . . . . . . . . . . 311
Chapter 17: Working with QASM 314
17.1 Basic Programming Concepts.. . . . . . . . . . . . . . . . 315
17.2 Getting Started with QASM.. . . . . . . . . . . . . . . . . 319
17.3 Quantum Error Correction. . . . . . . . . . . . . . . . . . 320
17.4 Grover’s Algorithm. . . . . . . . . . . . . . . . . . . . . 322
17.5 Deutsch-Jozsa Algorithm.. . . . . . . . . . . . . . . . . . 326
17.6 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . 328
Test Your Skills. . . . . . . . . . . . . . . . . . . . . . . 328
Appendix: Answers to Test Your Skills Questions 330
目錄大綱(中文翻譯)
前言 xvii
第一部分:預備材料
第一章:基礎線性代數介紹 2
1.1 什麼是線性代數?.. . . . . . . . . . . . . . . . . . . . 3
1.2 一些基本代數.. . . . . . . . . . . . . . . . . . . . . 4
1.3 矩陣運算.. . . . . . . . . . . . . . . . . . . . . . . 10
1.4 向量和向量空間.. . . . . . . . . . . . . . . . . . 23
1.5 集合論.. . . . . . . . . . . . . . . . . . . . . . . . 25
1.6 總結.. . . . . . . . . . . . . . . . . . . . . . . . 29
測試你的技能.. . . . . . . . . . . . . . . . . . . . . . 29
第二章:複數 32
2.1 什麼是複數?.. . . . . . . . . . . . . . . . . . . . 32
2.2 複數的代數.. . . . . . . . . . . . . . . . . . . . . 34
2.3 複數的圖形表示.. . . . . . . . . . . . . . . . . . 38
2.4 複數的向量表示.. . . . . . . . . . . . . . . . . . 45
2.5 Pauli 矩陣.. . . . . . . . . . . . . . . . . . . . . 48
2.6 超越數.. . . . . . . . . . . . . . . . . . . . . . . 56
2.7 總結.. . . . . . . . . . . . . . . . . . . . . . . . 58
第三章:量子計算的基礎物理學 60
3.1 通往量子的旅程.. . . . . . . . . . . . . . . . . . 61
3.2 量子物理的基本要素.. . . . . . . . . . . . . . . . 65
3.3 總結.. . . . . . . . . . . . . . . . . . . . . . . . 77
測試你的技能.. . . . . . . . . . . . . . . . . . . . . . 77
第四章:量子計算的基礎計算機科學 80
4.1 數據結構.. . . . . . . . . . . . . . . . . . . . . . 81
4.2 算法.. . . . . . . . . . . . . . . . . . . . . . . . 88
4.3 計算複雜性.. . . . . . . . . . . . . . . . . . . . 93
4.4 編碼理論.. . . . . . . . . . . . . . . . . . . . . . 95
4.5 邏輯閘.. . . . . . . . . . . . . . . . . . . . . . . 96
4.6 計算機架構.. . . . . . . . . . . . . . . . . . . 100
4.7 總結.. . . . . . . . . . . . . . . . . . . . . . . . 103
測試你的技能.. . . . . . . . . . . . . . . . . . . . . . 103
第五章:基礎資訊理論 106
5.1 基本概率.. . . . . . . . . . . . . . . . . . . . . . 107
5.2 集合論.. . . . . . . . . . . . . . . . . . . . . . . 108
5.3 資訊理論.. . . . . . . . . . . . . . . . . . . . . 112
5.4 量子資訊.. . . . . . . . . . . . . . . . . . . . . 118
5.5 總結.. . . . . . . . . . . . . . . . . . . . . . . . 120
測試你的技能.. . . . . . . . . . . . . . . . . . . . . . 120
第二部分:基礎量子計算
第```