1 |
Peter W. Shor, "Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer," arXiv.org, vol. quant-ph. 27-Aug-1995.
|
2 |
Lov K. Grover, "A fast quantum mechanical algorithm for database search," arXiv.org, vol. quant-ph. 29-May-1996.
|
3 |
C. H. Bennett, G. Brassard, "Quantum cryptography: public key distribution and coin tossing," in Proc. of IEEE Int. Conf. on Comp., Syst. and Sig. Proc., pp. 175-179, Bangalore, India, Dec. 1984
|
4 |
Charles H. Bennett, Gilles Brassard, Claude Crepeau, Richard Jozsa, Asher Peres, William K. Wootters, "Teleporting an Unknown Quantum State via Dual Classical and Einstein-Podolsky-Rosen Channels," Phys. Rev. Lett. vol. 70, num. 13, pp. 1895-1899 Mar. 1993
DOI
ScienceOn
|
5 |
Samuel L. Braunstein, Peter van Loock, "Quantum information with continuous variables," Rev. Mod. Phys, vol. 77, Apr. 2005
|
6 |
P. W. Shor, "Scheme for reducing decoherence in quantum computer memory," Phys. Rev. A vol. 52, num. 4, pp. 2493-2496 May. 1995.
DOI
|
7 |
Wootters, William; Zurek, Wojciech, " A Single Quantum Cannot be Cloned," Nature vol. 299 pp. 802-803, Oct. 1982.
DOI
|
8 |
Daniel Gottesman, "Stabilizer Codes and Quantum Error Correction," arXiv.org, vol. quant-ph. 28-May-1997.
|
9 |
Richard L. Barnes, "Stabilizer Codes for Continuousvariable Quantum Error Correction," arXiv.org, vol. quant-ph. 13-May-2004.
|